From 3bdd9b5d728a7ec885b102324c144a710b9a6e01 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 28 Feb 2021 16:00:40 +0000 Subject: [PATCH 001/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27807.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27807.json diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json new file mode 100644 index 00000000000..9f9f6760427 --- /dev/null +++ b/2021/27xxx/CVE-2021-27807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 8624df39a6d4a0ac90b8de290918fbbd490ce682 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 28 Feb 2021 19:00:40 +0000 Subject: [PATCH 002/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21149.json | 5 +++++ 2021/21xxx/CVE-2021-21150.json | 5 +++++ 2021/21xxx/CVE-2021-21151.json | 5 +++++ 2021/21xxx/CVE-2021-21152.json | 5 +++++ 2021/21xxx/CVE-2021-21153.json | 5 +++++ 2021/21xxx/CVE-2021-21154.json | 5 +++++ 2021/21xxx/CVE-2021-21155.json | 5 +++++ 2021/21xxx/CVE-2021-21156.json | 5 +++++ 2021/21xxx/CVE-2021-21157.json | 5 +++++ 9 files changed, 45 insertions(+) diff --git a/2021/21xxx/CVE-2021-21149.json b/2021/21xxx/CVE-2021-21149.json index e85047b0dc2..9e7e4c41351 100644 --- a/2021/21xxx/CVE-2021-21149.json +++ b/2021/21xxx/CVE-2021-21149.json @@ -54,6 +54,11 @@ "url": "https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html", "refsource": "MISC", "name": "https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21150.json b/2021/21xxx/CVE-2021-21150.json index 78879355923..75a8cf242fe 100644 --- a/2021/21xxx/CVE-2021-21150.json +++ b/2021/21xxx/CVE-2021-21150.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1172192", "refsource": "MISC", "name": "https://crbug.com/1172192" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21151.json b/2021/21xxx/CVE-2021-21151.json index 00bad8049b1..37a76bad182 100644 --- a/2021/21xxx/CVE-2021-21151.json +++ b/2021/21xxx/CVE-2021-21151.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1165624", "refsource": "MISC", "name": "https://crbug.com/1165624" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21152.json b/2021/21xxx/CVE-2021-21152.json index 58f1d190aba..a7d4d2b2c60 100644 --- a/2021/21xxx/CVE-2021-21152.json +++ b/2021/21xxx/CVE-2021-21152.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1166504", "refsource": "MISC", "name": "https://crbug.com/1166504" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21153.json b/2021/21xxx/CVE-2021-21153.json index 4732757e207..fa972f4cdcc 100644 --- a/2021/21xxx/CVE-2021-21153.json +++ b/2021/21xxx/CVE-2021-21153.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1155974", "refsource": "MISC", "name": "https://crbug.com/1155974" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21154.json b/2021/21xxx/CVE-2021-21154.json index 080b6bcf0cd..444c20400d2 100644 --- a/2021/21xxx/CVE-2021-21154.json +++ b/2021/21xxx/CVE-2021-21154.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1173269", "refsource": "MISC", "name": "https://crbug.com/1173269" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21155.json b/2021/21xxx/CVE-2021-21155.json index 90980f3df56..4f7cb465571 100644 --- a/2021/21xxx/CVE-2021-21155.json +++ b/2021/21xxx/CVE-2021-21155.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1175500", "refsource": "MISC", "name": "https://crbug.com/1175500" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21156.json b/2021/21xxx/CVE-2021-21156.json index 379e5720249..64d4615073a 100644 --- a/2021/21xxx/CVE-2021-21156.json +++ b/2021/21xxx/CVE-2021-21156.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1177341", "refsource": "MISC", "name": "https://crbug.com/1177341" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, diff --git a/2021/21xxx/CVE-2021-21157.json b/2021/21xxx/CVE-2021-21157.json index f57cb0bb0d9..c30503b8101 100644 --- a/2021/21xxx/CVE-2021-21157.json +++ b/2021/21xxx/CVE-2021-21157.json @@ -54,6 +54,11 @@ "url": "https://crbug.com/1170657", "refsource": "MISC", "name": "https://crbug.com/1170657" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa764a8531", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/" } ] }, From efc15870b96461c8539eac209ff5066725b248ff Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 28 Feb 2021 20:00:40 +0000 Subject: [PATCH 003/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23336.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index 45be6fbef64..770cd42f819 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -129,6 +129,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-907f3bacae", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-7c1bb32d13", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/" } ] }, From 5c4a00d2647690955ec314e349a6959ae73f6300 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 01:00:41 +0000 Subject: [PATCH 004/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27225.json | 75 +++++++++++++++++++++++++++++++--- 2021/27xxx/CVE-2021-27799.json | 2 +- 2 files changed, 70 insertions(+), 7 deletions(-) diff --git a/2021/27xxx/CVE-2021-27225.json b/2021/27xxx/CVE-2021-27225.json index 400c01a816d..a415e52fdd9 100644 --- a/2021/27xxx/CVE-2021-27225.json +++ b/2021/27xxx/CVE-2021-27225.json @@ -1,18 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27225", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27225", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://doc.dataiku.com/dss/latest/", + "refsource": "MISC", + "name": "https://doc.dataiku.com/dss/latest/" + }, + { + "refsource": "CONFIRM", + "name": "https://doc.dataiku.com/dss/8.0/security/advisories/cve-2021-27225.html", + "url": "https://doc.dataiku.com/dss/8.0/security/advisories/cve-2021-27225.html" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:L/S:U/UI:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27799.json b/2021/27xxx/CVE-2021-27799.json index d17a87b9c08..5cd84ecb4ba 100644 --- a/2021/27xxx/CVE-2021-27799.json +++ b/2021/27xxx/CVE-2021-27799.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.19.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code." + "value": "ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.9.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code." } ] }, From 3fc4e3df2d45f3f484da19c892de09d7eb1bfa84 Mon Sep 17 00:00:00 2001 From: David Black Date: Mon, 1 Mar 2021 15:07:13 +1100 Subject: [PATCH 005/845] Revert changes to CVE-2020-29448 CVE-2020-29453 CVE-2020-36232 CVE-2020-36233 CVE-2020-4027 CVE-2021-26068 --- 2020/29xxx/CVE-2020-29448.json | 48 ++++++++++++++++++++++++++++++---- 2020/29xxx/CVE-2020-29453.json | 48 ++++++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36232.json | 29 +++++++++++++++----- 2020/36xxx/CVE-2020-36233.json | 48 ++++++++++++++++++++++++++++++---- 2020/4xxx/CVE-2020-4027.json | 33 ++++++++++++++++++++--- 2021/26xxx/CVE-2021-26068.json | 9 +++++-- 6 files changed, 188 insertions(+), 27 deletions(-) diff --git a/2020/29xxx/CVE-2020-29448.json b/2020/29xxx/CVE-2020-29448.json index 0d909b0809c..7fc04d59854 100644 --- a/2020/29xxx/CVE-2020-29448.json +++ b/2020/29xxx/CVE-2020-29448.json @@ -13,17 +13,55 @@ "product": { "product_data": [ { - "product_name": "Confluence Server, Confluence Data Center", + "product_name": "Confluence Server", "version": { "version_data": [ { - "version_value": "before version 6.13.18" + "version_value": "6.13.18", + "version_affected": "<" }, { - "version_value": "from 6.14.0 before 7.4.6" + "version_value": "6.14.0", + "version_affected": ">=" }, { - "version_value": "from 7.5.0 before 7.8.3" + "version_value": "7.4.6", + "version_affected": "<" + }, + { + "version_value": "7.5.0", + "version_affected": ">=" + }, + { + "version_value": "7.8.3", + "version_affected": "<" + } + ] + } + }, + { + "product_name": "Confluence Data Center", + "version": { + "version_data": [ + { + "version_value": "6.13.18", + "version_affected": "<" + }, + { + "version_value": "6.14.0", + "version_affected": ">=" + }, + { + "version_value": "7.4.6", + "version_affected": "<" + }, + { + "version_value": "7.5.0", + "version_affected": ">=" + }, + { + "version_value": "7.8.3", + "version_affected": "<" } ] } @@ -66,4 +104,4 @@ } ] } -} \ No newline at end of file +} diff --git a/2020/29xxx/CVE-2020-29453.json b/2020/29xxx/CVE-2020-29453.json index 1bfa32b8bc6..4c7f6e8cbab 100644 --- a/2020/29xxx/CVE-2020-29453.json +++ b/2020/29xxx/CVE-2020-29453.json @@ -13,17 +13,55 @@ "product": { "product_data": [ { - "product_name": "Jira Server, Jira Data Center", + "product_name": "Jira Server", "version": { "version_data": [ { - "version_value": "before version 8.5.11" + "version_value": "8.5.11", + "version_affected": "<" }, { - "version_value": "from 8.6.0 before 8.13.3" + "version_value": "8.6.0", + "version_affected": ">=" }, { - "version_value": "from 8.14.0 before 8.15.0" + "version_value": "8.13.3", + "version_affected": "<" + }, + { + "version_value": "8.14.0", + "version_affected": ">=" + }, + { + "version_value": "8.15.0", + "version_affected": "<" + } + ] + } + }, + { + "product_name": "Jira Data Center", + "version": { + "version_data": [ + { + "version_value": "8.5.11", + "version_affected": "<" + }, + { + "version_value": "8.6.0", + "version_affected": ">=" + }, + { + "version_value": "8.13.3", + "version_affected": "<" + }, + { + "version_value": "8.14.0", + "version_affected": ">=" + }, + { + "version_value": "8.15.0", + "version_affected": "<" } ] } @@ -66,4 +104,4 @@ } ] } -} \ No newline at end of file +} diff --git a/2020/36xxx/CVE-2020-36232.json b/2020/36xxx/CVE-2020-36232.json index baa2cc9fe64..dff35209d59 100644 --- a/2020/36xxx/CVE-2020-36232.json +++ b/2020/36xxx/CVE-2020-36232.json @@ -17,19 +17,36 @@ "version": { "version_data": [ { - "version_value": "before version 4.2.37" + "version_value": "4.2.37", + "version_affected": "<" }, { - "version_value": "from version 4.3.0 before 4.3.14" + "version_value": "4.3.0", + "version_affected": ">=" }, { - "version_value": "from version 4.3.2.0 before 4.3.2.4" + "version_value": "4.3.14", + "version_affected": "<" }, { - "version_value": "from version 4.4.0 before 4.4.12" + "version_value": "4.3.2.0", + "version_affected": ">=" }, { - "version_value": "from version 5.0.0 before 5.0.1" + "version_value": "4.3.2.4", + "version_affected": "<" + }, + { + "version_value": "4.4.0", + "version_affected": ">=" + }, + { + "version_value": "4.4.12", + "version_affected": "<" + }, + { + "version_value": "5.0.0", + "version_affected": "=" } ] } @@ -72,4 +89,4 @@ } ] } -} \ No newline at end of file +} diff --git a/2020/36xxx/CVE-2020-36233.json b/2020/36xxx/CVE-2020-36233.json index b8547285954..38daf89b0b5 100644 --- a/2020/36xxx/CVE-2020-36233.json +++ b/2020/36xxx/CVE-2020-36233.json @@ -13,17 +13,55 @@ "product": { "product_data": [ { - "product_name": "Bitbucket Server, Data Center", + "product_name": "Bitbucket Server", "version": { "version_data": [ { - "version_value": "before version 6.10.9" + "version_value": "6.10.9", + "version_affected": "<" }, { - "version_value": "7.x before 7.6.4" + "version_value": "7.0.0", + "version_affected": ">=" }, { - "version_value": "from version 7.7.0 before 7.10.1" + "version_value": "7.6.4", + "version_affected": "<" + }, + { + "version_value": "7.7.0", + "version_affected": ">=" + }, + { + "version_value": "7.10.1", + "version_affected": "<" + } + ] + } + }, + { + "product_name": "Bitbucket Data Center", + "version": { + "version_data": [ + { + "version_value": "6.10.9", + "version_affected": "<" + }, + { + "version_value": "7.0.0", + "version_affected": ">=" + }, + { + "version_value": "7.6.4", + "version_affected": "<" + }, + { + "version_value": "7.7.0", + "version_affected": ">=" + }, + { + "version_value": "7.10.1", + "version_affected": "<" } ] } @@ -71,4 +109,4 @@ } ] } -} \ No newline at end of file +} diff --git a/2020/4xxx/CVE-2020-4027.json b/2020/4xxx/CVE-2020-4027.json index 80dcc23f9d5..714c1481d33 100644 --- a/2020/4xxx/CVE-2020-4027.json +++ b/2020/4xxx/CVE-2020-4027.json @@ -13,14 +13,39 @@ "product": { "product_data": [ { - "product_name": "Confluence Server, Confluence Data Center", + "product_name": "Confluence Server", "version": { "version_data": [ { - "version_value": "before version 7.4.5" + "version_value": "7.4.5", + "version_affected": "<" }, { - "version_value": "from version 7.5.0 before 7.5.1" + "version_value": "7.5.0", + "version_affected": ">=" + }, + { + "version_value": "7.5.1", + "version_affected": "<" + } + ] + } + }, + { + "product_name": "Confluence Data Center", + "version": { + "version_data": [ + { + "version_value": "7.4.5", + "version_affected": "<" + }, + { + "version_value": "7.5.0", + "version_affected": ">=" + }, + { + "version_value": "7.5.1", + "version_affected": "<" } ] } @@ -63,4 +88,4 @@ } ] } -} \ No newline at end of file +} diff --git a/2021/26xxx/CVE-2021-26068.json b/2021/26xxx/CVE-2021-26068.json index 003f05b5692..01680140bcc 100644 --- a/2021/26xxx/CVE-2021-26068.json +++ b/2021/26xxx/CVE-2021-26068.json @@ -17,7 +17,12 @@ "version": { "version_data": [ { - "version_value": "from 0.0.3 before 2.0.15" + "version_value": "0.0.3", + "version_affected": ">=" + }, + { + "version_value": "2.0.15", + "version_affected": "<" } ] } @@ -60,4 +65,4 @@ } ] } -} \ No newline at end of file +} From 6d3499f97276d7a0c0b772476f87c1f680fa7fdf Mon Sep 17 00:00:00 2001 From: David Black Date: Mon, 1 Mar 2021 15:07:28 +1100 Subject: [PATCH 006/845] Add CVE-2020-36240 --- 2020/36xxx/CVE-2020-36240.json | 82 +++++++++++++++++++++++++++------- 1 file changed, 67 insertions(+), 15 deletions(-) diff --git a/2020/36xxx/CVE-2020-36240.json b/2020/36xxx/CVE-2020-36240.json index 8ed7ad328fa..ce59777d12c 100644 --- a/2020/36xxx/CVE-2020-36240.json +++ b/2020/36xxx/CVE-2020-36240.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-36240", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "security@atlassian.com", + "DATE_PUBLIC": "2021-02-28T00:00:00", + "ID": "CVE-2020-36240", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Crowd", + "version": { + "version_data": [ + { + "version_value": "4.0.4", + "version_affected": "<" + }, + { + "version_value": "4.1.0", + "version_affected": ">=" + }, + { + "version_value": "4.1.2", + "version_affected": "<" + } + ] + } + } + ] + }, + "vendor_name": "Atlassian" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary File Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.atlassian.com/browse/CWD-5685" + } + ] + } +} From cc189737be45f453aab4acfbbb53a6ba0db67c4a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 08:00:47 +0000 Subject: [PATCH 007/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27808.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27809.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27810.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27811.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27812.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27813.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27814.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27815.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27816.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27817.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27818.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27819.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27820.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27821.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27822.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27823.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27824.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27825.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27826.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27827.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27828.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27829.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27830.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27831.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27832.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27833.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27834.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27835.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27836.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27837.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27838.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27839.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27840.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27841.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27842.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27843.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27844.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27845.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27846.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27847.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27848.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27849.json | 18 ++++++++++++++++++ 42 files changed, 756 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27808.json create mode 100644 2021/27xxx/CVE-2021-27809.json create mode 100644 2021/27xxx/CVE-2021-27810.json create mode 100644 2021/27xxx/CVE-2021-27811.json create mode 100644 2021/27xxx/CVE-2021-27812.json create mode 100644 2021/27xxx/CVE-2021-27813.json create mode 100644 2021/27xxx/CVE-2021-27814.json create mode 100644 2021/27xxx/CVE-2021-27815.json create mode 100644 2021/27xxx/CVE-2021-27816.json create mode 100644 2021/27xxx/CVE-2021-27817.json create mode 100644 2021/27xxx/CVE-2021-27818.json create mode 100644 2021/27xxx/CVE-2021-27819.json create mode 100644 2021/27xxx/CVE-2021-27820.json create mode 100644 2021/27xxx/CVE-2021-27821.json create mode 100644 2021/27xxx/CVE-2021-27822.json create mode 100644 2021/27xxx/CVE-2021-27823.json create mode 100644 2021/27xxx/CVE-2021-27824.json create mode 100644 2021/27xxx/CVE-2021-27825.json create mode 100644 2021/27xxx/CVE-2021-27826.json create mode 100644 2021/27xxx/CVE-2021-27827.json create mode 100644 2021/27xxx/CVE-2021-27828.json create mode 100644 2021/27xxx/CVE-2021-27829.json create mode 100644 2021/27xxx/CVE-2021-27830.json create mode 100644 2021/27xxx/CVE-2021-27831.json create mode 100644 2021/27xxx/CVE-2021-27832.json create mode 100644 2021/27xxx/CVE-2021-27833.json create mode 100644 2021/27xxx/CVE-2021-27834.json create mode 100644 2021/27xxx/CVE-2021-27835.json create mode 100644 2021/27xxx/CVE-2021-27836.json create mode 100644 2021/27xxx/CVE-2021-27837.json create mode 100644 2021/27xxx/CVE-2021-27838.json create mode 100644 2021/27xxx/CVE-2021-27839.json create mode 100644 2021/27xxx/CVE-2021-27840.json create mode 100644 2021/27xxx/CVE-2021-27841.json create mode 100644 2021/27xxx/CVE-2021-27842.json create mode 100644 2021/27xxx/CVE-2021-27843.json create mode 100644 2021/27xxx/CVE-2021-27844.json create mode 100644 2021/27xxx/CVE-2021-27845.json create mode 100644 2021/27xxx/CVE-2021-27846.json create mode 100644 2021/27xxx/CVE-2021-27847.json create mode 100644 2021/27xxx/CVE-2021-27848.json create mode 100644 2021/27xxx/CVE-2021-27849.json diff --git a/2021/27xxx/CVE-2021-27808.json b/2021/27xxx/CVE-2021-27808.json new file mode 100644 index 00000000000..8ca8b7a16fa --- /dev/null +++ b/2021/27xxx/CVE-2021-27808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27809.json b/2021/27xxx/CVE-2021-27809.json new file mode 100644 index 00000000000..5462b443aca --- /dev/null +++ b/2021/27xxx/CVE-2021-27809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27810.json b/2021/27xxx/CVE-2021-27810.json new file mode 100644 index 00000000000..e03333312c6 --- /dev/null +++ b/2021/27xxx/CVE-2021-27810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27811.json b/2021/27xxx/CVE-2021-27811.json new file mode 100644 index 00000000000..ce5791873bc --- /dev/null +++ b/2021/27xxx/CVE-2021-27811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27812.json b/2021/27xxx/CVE-2021-27812.json new file mode 100644 index 00000000000..83eec032d9c --- /dev/null +++ b/2021/27xxx/CVE-2021-27812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27813.json b/2021/27xxx/CVE-2021-27813.json new file mode 100644 index 00000000000..95bd5a74be1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27814.json b/2021/27xxx/CVE-2021-27814.json new file mode 100644 index 00000000000..25121356554 --- /dev/null +++ b/2021/27xxx/CVE-2021-27814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27815.json b/2021/27xxx/CVE-2021-27815.json new file mode 100644 index 00000000000..fdd48238333 --- /dev/null +++ b/2021/27xxx/CVE-2021-27815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27816.json b/2021/27xxx/CVE-2021-27816.json new file mode 100644 index 00000000000..b265ceba0af --- /dev/null +++ b/2021/27xxx/CVE-2021-27816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27817.json b/2021/27xxx/CVE-2021-27817.json new file mode 100644 index 00000000000..07c18dc64bc --- /dev/null +++ b/2021/27xxx/CVE-2021-27817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27818.json b/2021/27xxx/CVE-2021-27818.json new file mode 100644 index 00000000000..a272aae2cb2 --- /dev/null +++ b/2021/27xxx/CVE-2021-27818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27819.json b/2021/27xxx/CVE-2021-27819.json new file mode 100644 index 00000000000..035338262e8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27820.json b/2021/27xxx/CVE-2021-27820.json new file mode 100644 index 00000000000..a0e04413b4d --- /dev/null +++ b/2021/27xxx/CVE-2021-27820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27821.json b/2021/27xxx/CVE-2021-27821.json new file mode 100644 index 00000000000..437056c00dc --- /dev/null +++ b/2021/27xxx/CVE-2021-27821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27822.json b/2021/27xxx/CVE-2021-27822.json new file mode 100644 index 00000000000..17819b397f5 --- /dev/null +++ b/2021/27xxx/CVE-2021-27822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27823.json b/2021/27xxx/CVE-2021-27823.json new file mode 100644 index 00000000000..d985e663b6a --- /dev/null +++ b/2021/27xxx/CVE-2021-27823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27824.json b/2021/27xxx/CVE-2021-27824.json new file mode 100644 index 00000000000..0c587d633dc --- /dev/null +++ b/2021/27xxx/CVE-2021-27824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27825.json b/2021/27xxx/CVE-2021-27825.json new file mode 100644 index 00000000000..b9c7d53d9c3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27825.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27825", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27826.json b/2021/27xxx/CVE-2021-27826.json new file mode 100644 index 00000000000..31c806dd3f1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27826.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27826", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27827.json b/2021/27xxx/CVE-2021-27827.json new file mode 100644 index 00000000000..1cf264b92da --- /dev/null +++ b/2021/27xxx/CVE-2021-27827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27828.json b/2021/27xxx/CVE-2021-27828.json new file mode 100644 index 00000000000..f329ee16e5e --- /dev/null +++ b/2021/27xxx/CVE-2021-27828.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27828", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27829.json b/2021/27xxx/CVE-2021-27829.json new file mode 100644 index 00000000000..fba7fc90787 --- /dev/null +++ b/2021/27xxx/CVE-2021-27829.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27829", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27830.json b/2021/27xxx/CVE-2021-27830.json new file mode 100644 index 00000000000..c1554ae336a --- /dev/null +++ b/2021/27xxx/CVE-2021-27830.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27830", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27831.json b/2021/27xxx/CVE-2021-27831.json new file mode 100644 index 00000000000..57bddac6e59 --- /dev/null +++ b/2021/27xxx/CVE-2021-27831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27832.json b/2021/27xxx/CVE-2021-27832.json new file mode 100644 index 00000000000..1685fb42d2c --- /dev/null +++ b/2021/27xxx/CVE-2021-27832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27833.json b/2021/27xxx/CVE-2021-27833.json new file mode 100644 index 00000000000..22ff6f542e8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27834.json b/2021/27xxx/CVE-2021-27834.json new file mode 100644 index 00000000000..c2c32168458 --- /dev/null +++ b/2021/27xxx/CVE-2021-27834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27835.json b/2021/27xxx/CVE-2021-27835.json new file mode 100644 index 00000000000..2178b388fea --- /dev/null +++ b/2021/27xxx/CVE-2021-27835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27836.json b/2021/27xxx/CVE-2021-27836.json new file mode 100644 index 00000000000..7e5b5440885 --- /dev/null +++ b/2021/27xxx/CVE-2021-27836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27837.json b/2021/27xxx/CVE-2021-27837.json new file mode 100644 index 00000000000..f056d6d3176 --- /dev/null +++ b/2021/27xxx/CVE-2021-27837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27838.json b/2021/27xxx/CVE-2021-27838.json new file mode 100644 index 00000000000..68de13ca621 --- /dev/null +++ b/2021/27xxx/CVE-2021-27838.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27838", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27839.json b/2021/27xxx/CVE-2021-27839.json new file mode 100644 index 00000000000..462cd53ddc9 --- /dev/null +++ b/2021/27xxx/CVE-2021-27839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27840.json b/2021/27xxx/CVE-2021-27840.json new file mode 100644 index 00000000000..dfa9c978c26 --- /dev/null +++ b/2021/27xxx/CVE-2021-27840.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27840", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27841.json b/2021/27xxx/CVE-2021-27841.json new file mode 100644 index 00000000000..e067706c96b --- /dev/null +++ b/2021/27xxx/CVE-2021-27841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27842.json b/2021/27xxx/CVE-2021-27842.json new file mode 100644 index 00000000000..a51cd87023d --- /dev/null +++ b/2021/27xxx/CVE-2021-27842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27843.json b/2021/27xxx/CVE-2021-27843.json new file mode 100644 index 00000000000..ff7fa3959fb --- /dev/null +++ b/2021/27xxx/CVE-2021-27843.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27843", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27844.json b/2021/27xxx/CVE-2021-27844.json new file mode 100644 index 00000000000..7bdd7644fce --- /dev/null +++ b/2021/27xxx/CVE-2021-27844.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27844", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27845.json b/2021/27xxx/CVE-2021-27845.json new file mode 100644 index 00000000000..97ac27ba2e7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27846.json b/2021/27xxx/CVE-2021-27846.json new file mode 100644 index 00000000000..e37b6392558 --- /dev/null +++ b/2021/27xxx/CVE-2021-27846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27847.json b/2021/27xxx/CVE-2021-27847.json new file mode 100644 index 00000000000..b6a2d62de4f --- /dev/null +++ b/2021/27xxx/CVE-2021-27847.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27847", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27848.json b/2021/27xxx/CVE-2021-27848.json new file mode 100644 index 00000000000..a380d303bb3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27849.json b/2021/27xxx/CVE-2021-27849.json new file mode 100644 index 00000000000..131172b7fa9 --- /dev/null +++ b/2021/27xxx/CVE-2021-27849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 2460b739b9e73bd15c87a2ca18c68a28fc10101c Mon Sep 17 00:00:00 2001 From: Monsieur Francis Perron Date: Mon, 1 Mar 2021 12:48:42 +0100 Subject: [PATCH 008/845] Remove DISPUTED status on CVE-2020-13702, and update the references and CVSS score --- 2020/13xxx/CVE-2020-13702.json | 22 ++++++++++++++-------- 1 file changed, 14 insertions(+), 8 deletions(-) diff --git a/2020/13xxx/CVE-2020-13702.json b/2020/13xxx/CVE-2020-13702.json index 99947509885..0a84e9a7577 100644 --- a/2020/13xxx/CVE-2020-13702.json +++ b/2020/13xxx/CVE-2020-13702.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "** DISPUTED ** The Rolling Proximity Identifier used in the Apple/Google Exposure Notification API beta through 2020-05-29 enables attackers to circumvent Bluetooth Smart Privacy because there is a secondary temporary UID. An attacker with access to Beacon or IoT networks can seamlessly track individual device movement via a Bluetooth LE discovery mechanism. NOTE: this is disputed because the specification states \"The advertiser address, Rolling Proximity Identifier, and Associated Encrypted Metadata shall be changed synchronously so that they cannot be linked\" and therefore the purported tracking actually cannot occur. The original reporter says that synchronous changes only occur in one direction, not both directions." + "value": "The Rolling Proximity Identifier used in the Apple/Google Exposure Notification API beta through 2020-05-29 enables attackers to circumvent Bluetooth Smart Privacy because there is a secondary temporary UID. An attacker with access to Beacon or IoT networks can seamlessly track individual device movement via a Bluetooth LE discovery mechanism." } ] }, @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697", + "url": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697" + }, { "refsource": "MISC", "name": "https://github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200611.pdf", @@ -82,15 +87,16 @@ "impact": { "cvss": { "attackComplexity": "LOW", - "attackVector": "NETWORK", + "attackVector": "ADJACENT", "availabilityImpact": "NONE", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", "privilegesRequired": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:H/PR:N/S:C/UI:N", - "version": "3.0" + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AC:L/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:N", + "version": "3.1" } } -} \ No newline at end of file +} From 81becc5466b09e96d9a91d518fe9ebe6cbbbd990 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Mon, 1 Mar 2021 11:55:21 +0000 Subject: [PATCH 009/845] Two Tomcat issues public --- 2021/25xxx/CVE-2021-25122.json | 77 ++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25329.json | 88 +++++++++++++++++++++++++++++++--- 2 files changed, 151 insertions(+), 14 deletions(-) diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index c8b9f444fa3..c8d0c9f352f 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -1,18 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-25122", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Apache Tomcat h2c request mix-up" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Tomcat", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Apache Tomcat 10", + "version_value": "10.0.2" + }, + { + "version_affected": "<", + "version_name": "Apache Tomcat 9", + "version_value": "9.0.42" + }, + { + "version_affected": "<", + "version_name": "Apache Tomcat 8.5", + "version_value": "8.5.62" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2021/25xxx/CVE-2021-25329.json b/2021/25xxx/CVE-2021-25329.json index 1ef4d6beceb..2f71cb5080c 100644 --- a/2021/25xxx/CVE-2021-25329.json +++ b/2021/25xxx/CVE-2021-25329.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-25329", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Incomplete fix for CVE-2020-9484" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Tomcat", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Apache Tomcat 10", + "version_value": "10.0.0" + }, + { + "version_affected": "<", + "version_name": "Apache Tomcat 9", + "version_value": "9.0.41" + }, + { + "version_affected": "<", + "version_name": "Apache Tomcat 8.5", + "version_value": "8.5.61" + }, + { + "version_affected": "<", + "version_name": "Apache Tomcat 7", + "version_value": "7.0.107" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was identified by Trung Pham of Viettel Cyber Security." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote code execution via session persistence" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From 50c47539fe9a65a8ff0e14305114c577a13bcc71 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 12:00:44 +0000 Subject: [PATCH 010/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21290.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 5d92d2df7d7..e2be4a1c496 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -91,6 +91,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210211 [SECURITY] [DLA 2555-1] netty security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00016.html" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210301 [jira] [Created] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-dev] 20210301 [jira] [Created] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E" } ] }, From d6d7107407092a2d774634e0637c2481fa904ee0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 13:00:49 +0000 Subject: [PATCH 011/845] "-Synchronized-Data." --- 2020/17xxx/CVE-2020-17523.json | 5 +++++ 2020/27xxx/CVE-2020-27223.json | 10 +++++++--- 2020/9xxx/CVE-2020-9484.json | 25 +++++++++++++++++++++++++ 2021/25xxx/CVE-2021-25122.json | 32 +++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25329.json | 32 +++++++++++++++++++++++++++++--- 5 files changed, 95 insertions(+), 9 deletions(-) diff --git a/2020/17xxx/CVE-2020-17523.json b/2020/17xxx/CVE-2020-17523.json index 36d54c4c0c4..a18122b2a15 100644 --- a/2020/17xxx/CVE-2020-17523.json +++ b/2020/17xxx/CVE-2020-17523.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[activemq-gitbox] 20210210 [GitHub] [activemq] ehossack-aws opened a new pull request #614: Update shiro to 1.7.1", "url": "https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec454cfa5baec4ad0ffae235@%3Cgitbox.activemq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[activemq-issues] 20210301 [jira] [Created] (AMQ-8159) High severity security issues found in Apache Shiro v.1.7.0", + "url": "https://lists.apache.org/thread.html/rd4b613e121438b97e3eb263cac3137caddb1dbd8f648b73a4f1898a6@%3Cissues.activemq.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 26ba63c7683..3dca7ac0cbe 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -34,7 +34,6 @@ "version_affected": "=", "version_value": "11.0.0" } - ] } } @@ -48,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values." + "value": "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of \u201cquality\u201d (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values." } ] }, @@ -75,7 +74,12 @@ "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7", "refsource": "CONFIRM", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7" + }, + { + "refsource": "MLIST", + "name": "[karaf-user] 20210301 Re: Jetty security defect", + "url": "https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E" } ] } -} +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index 9eee71b9b4c..8e5decbffcc 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -173,6 +173,31 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210301 svn commit: r1887027 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml", + "url": "https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E" } ] }, diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index c8d0c9f352f..47398d8bf63 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -70,12 +70,38 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E", + "name": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-announce] 20210301 [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", + "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20210301 [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", + "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210301 [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", + "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210301 svn commit: r1887027 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml", + "url": "https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20210301 [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", + "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25329.json b/2021/25xxx/CVE-2021-25329.json index 2f71cb5080c..c7d3293d593 100644 --- a/2021/25xxx/CVE-2021-25329.json +++ b/2021/25xxx/CVE-2021-25329.json @@ -81,12 +81,38 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E", + "name": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-dev] 20210301 svn commit: r1887027 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml", + "url": "https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", + "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file From 5b591ff5b1fbbadda4301cb69fc9a985078a5e15 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Mon, 1 Mar 2021 15:51:20 +0000 Subject: [PATCH 012/845] Add AsterixDB entry and note it may be rejected. See CVE Publication Service Request 941606 --- 2020/9xxx/CVE-2020-9479.json | 73 ++++++++++++++++++++++++++++++++---- 1 file changed, 66 insertions(+), 7 deletions(-) diff --git a/2020/9xxx/CVE-2020-9479.json b/2020/9xxx/CVE-2020-9479.json index 3a91690eaf6..18db9976d71 100644 --- a/2020/9xxx/CVE-2020-9479.json +++ b/2020/9xxx/CVE-2020-9479.json @@ -1,18 +1,77 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-9479", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "unzip directory traversal" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache AsterixDB", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "Apache AsterixDB", + "version_value": "git" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was discovered by Yiming Xiang of NSFOCUS" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d.\n\nNote: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "directory traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.openwall.com/lists/oss-security/2020/08/08/2" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From a447d113478ad111d1e37b2597b38086207695ad Mon Sep 17 00:00:00 2001 From: Christopher Buckingham Date: Mon, 1 Mar 2021 15:58:17 +0000 Subject: [PATCH 013/845] Added CVE-2020-7929 --- 2020/7xxx/CVE-2020-7929.json | 86 +++++++++++++++++++++++++++++++++--- 1 file changed, 80 insertions(+), 6 deletions(-) diff --git a/2020/7xxx/CVE-2020-7929.json b/2020/7xxx/CVE-2020-7929.json index 3cd9f4e73f7..dc87cf8982b 100644 --- a/2020/7xxx/CVE-2020-7929.json +++ b/2020/7xxx/CVE-2020-7929.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cna@mongodb.com", + "DATE_PUBLIC": "2021-02-26T17:00:00.000Z", "ID": "CVE-2020-7929", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Specially crafted regex query can cause DoS" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MongoDB Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.6", + "version_value": "3.6.21" + }, + { + "version_affected": "<", + "version_name": "4.0", + "version_value": "4.0.20" + } + ] + } + } + ] + }, + "vendor_name": "MongoDB Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects: MongoDB Inc. MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-185 Incorrect Regular Expression" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://jira.mongodb.org/browse/SERVER-51083" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file From 438b97ebcae4832df737f061377c428e3cc95ce6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 16:00:43 +0000 Subject: [PATCH 014/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27218.json | 5 ++ 2020/9xxx/CVE-2020-9479.json | 9 ++-- 2020/9xxx/CVE-2020-9484.json | 5 ++ 2020/9xxx/CVE-2020-9494.json | 5 ++ 2021/21xxx/CVE-2021-21290.json | 15 ++++++ 2021/25xxx/CVE-2021-25122.json | 5 ++ 2021/25xxx/CVE-2021-25329.json | 5 ++ 2021/25xxx/CVE-2021-25829.json | 96 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25830.json | 76 ++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25831.json | 76 ++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25832.json | 81 +++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25833.json | 76 ++++++++++++++++++++++++--- 2021/27xxx/CVE-2021-27850.json | 18 +++++++ 13 files changed, 438 insertions(+), 34 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27850.json diff --git a/2020/27xxx/CVE-2020-27218.json b/2020/27xxx/CVE-2020-27218.json index 25b565f8671..a183fd6b10e 100644 --- a/2020/27xxx/CVE-2020-27218.json +++ b/2020/27xxx/CVE-2020-27218.json @@ -602,6 +602,11 @@ "refsource": "MLIST", "name": "[nifi-commits] 20210222 svn commit: r1886814 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E" } ] } diff --git a/2020/9xxx/CVE-2020-9479.json b/2020/9xxx/CVE-2020-9479.json index 18db9976d71..38a270cd056 100644 --- a/2020/9xxx/CVE-2020-9479.json +++ b/2020/9xxx/CVE-2020-9479.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d.\n\nNote: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB" + "value": "When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d. Note: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB" } ] }, @@ -66,12 +66,13 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.openwall.com/lists/oss-security/2020/08/08/2" + "refsource": "MISC", + "url": "https://www.openwall.com/lists/oss-security/2020/08/08/2", + "name": "https://www.openwall.com/lists/oss-security/2020/08/08/2" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index 8e5decbffcc..24c57e1c3cc 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -198,6 +198,11 @@ "refsource": "MLIST", "name": "[tomcat-announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210301 CVE-2021-25329: Apache Tomcat Incomplete fix for CVE-2020-9484", + "url": "http://www.openwall.com/lists/oss-security/2021/03/01/2" } ] }, diff --git a/2020/9xxx/CVE-2020-9494.json b/2020/9xxx/CVE-2020-9494.json index b246a36bb04..fa347bdc933 100644 --- a/2020/9xxx/CVE-2020-9494.json +++ b/2020/9xxx/CVE-2020-9494.json @@ -59,6 +59,11 @@ "refsource": "DEBIAN", "name": "DSA-4710", "url": "https://www.debian.org/security/2020/dsa-4710" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210301 CVE-2021-25329: Apache Tomcat Incomplete fix for CVE-2020-9484", + "url": "http://www.openwall.com/lists/oss-security/2021/03/01/2" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index e2be4a1c496..8198c2682a1 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -101,6 +101,21 @@ "refsource": "MLIST", "name": "[kafka-dev] 20210301 [jira] [Created] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290", "url": "https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210301 [jira] [Assigned] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr opened a new pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E" } ] }, diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index 47398d8bf63..e227b64f8e7 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -98,6 +98,11 @@ "refsource": "MLIST", "name": "[announce] 20210301 [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", "url": "https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210301 CVE-2021-25122: Apache Tomcat h2c request mix-up", + "url": "http://www.openwall.com/lists/oss-security/2021/03/01/1" } ] }, diff --git a/2021/25xxx/CVE-2021-25329.json b/2021/25xxx/CVE-2021-25329.json index c7d3293d593..da14359c7e6 100644 --- a/2021/25xxx/CVE-2021-25329.json +++ b/2021/25xxx/CVE-2021-25329.json @@ -109,6 +109,11 @@ "refsource": "MLIST", "name": "[tomcat-announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence)", "url": "https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210301 CVE-2021-25329: Apache Tomcat Incomplete fix for CVE-2020-9484", + "url": "http://www.openwall.com/lists/oss-security/2021/03/01/2" } ] }, diff --git a/2021/25xxx/CVE-2021-25829.json b/2021/25xxx/CVE-2021-25829.json index 7ab46ff8f8e..c66d980c18c 100644 --- a/2021/25xxx/CVE-2021-25829.json +++ b/2021/25xxx/CVE-2021-25829.json @@ -1,17 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25829", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25829", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ONLYOFFICE/DocumentServer", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/DocumentServer" + }, + { + "url": "https://github.com/ONLYOFFICE/core", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.10/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1722", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.10/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1722" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Comments.h#L299", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Comments.h#L299" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Core.h#L161", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Core.h#L161" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/NotesMaster.h#L148", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/NotesMaster.h#L148" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/NotesSlide.h#L141", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/NotesSlide.h#L141" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Presentation.h#L277", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Presentation.h#L277" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Theme.h#L277", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Theme.h#L277" } ] } diff --git a/2021/25xxx/CVE-2021-25830.json b/2021/25xxx/CVE-2021-25830.json index 7281d23b377..6b798f557af 100644 --- a/2021/25xxx/CVE-2021-25830.json +++ b/2021/25xxx/CVE-2021-25830.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25830", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25830", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.2.0.236-v5.6.4.13. An attacker must request the conversion of the crafted file from DOCT into DOCX format. Using the chain of two other bugs related to improper string handling, an attacker can achieve remote code execution on DocumentServer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ONLYOFFICE/DocumentServer", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/DocumentServer" + }, + { + "url": "https://github.com/ONLYOFFICE/core", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/UniFill.cpp#L343", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/UniFill.cpp#L343" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L241", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L241" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918" } ] } diff --git a/2021/25xxx/CVE-2021-25831.json b/2021/25xxx/CVE-2021-25831.json index a09a5daf219..1fa9697e9a3 100644 --- a/2021/25xxx/CVE-2021-25831.json +++ b/2021/25xxx/CVE-2021-25831.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25831", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25831", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. An attacker must request the conversion of the crafted file from PPTT into PPTX format. Using the chain of two other bugs related to improper string handling, a remote attacker can obtain remote code execution on DocumentServer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ONLYOFFICE/DocumentServer", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/DocumentServer" + }, + { + "url": "https://github.com/ONLYOFFICE/core", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L241", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L241" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/Fills/BlipFill.cpp#L328", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/Fills/BlipFill.cpp#L328" } ] } diff --git a/2021/25xxx/CVE-2021-25832.json b/2021/25xxx/CVE-2021-25832.json index 817253402a1..7db572c9393 100644 --- a/2021/25xxx/CVE-2021-25832.json +++ b/2021/25xxx/CVE-2021-25832.json @@ -1,17 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25832", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25832", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap buffer overflow vulnerability inside of BMP image processing was found at [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v6.0.0. Using this vulnerability, an attacker is able to gain remote code executions on DocumentServer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ONLYOFFICE/DocumentServer", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/DocumentServer" + }, + { + "url": "https://github.com/ONLYOFFICE/core", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/DesktopEditor/cximage/CxImage/ximabmp.cpp#L358", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/DesktopEditor/cximage/CxImage/ximabmp.cpp#L358" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/DesktopEditor/cximage/CxImage/ximabmp.cpp#L354", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/DesktopEditor/cximage/CxImage/ximabmp.cpp#L354" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L424", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L424" + }, + { + "url": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L428", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L428" } ] } diff --git a/2021/25xxx/CVE-2021-25833.json b/2021/25xxx/CVE-2021-25833.json index 6300d17e3d0..cbfa4b98cbb 100644 --- a/2021/25xxx/CVE-2021-25833.json +++ b/2021/25xxx/CVE-2021-25833.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25833", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25833", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A file extension handling issue was found in [server] module of ONLYOFFICE DocumentServer v4.2.0.71-v5.6.0.21. The file extension is controlled by an attacker through the request data and leads to arbitrary file overwriting. Using this vulnerability, a remote attacker can obtain remote code execution on DocumentServer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ONLYOFFICE/DocumentServer", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/DocumentServer" + }, + { + "url": "https://github.com/ONLYOFFICE/server", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/server" + }, + { + "url": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/DocService/sources/converterservice.js#L200", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/DocService/sources/converterservice.js#L200" + }, + { + "url": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L593", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L593" + }, + { + "url": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L283", + "refsource": "MISC", + "name": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L283" } ] } diff --git a/2021/27xxx/CVE-2021-27850.json b/2021/27xxx/CVE-2021-27850.json new file mode 100644 index 00000000000..2adc716c071 --- /dev/null +++ b/2021/27xxx/CVE-2021-27850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 6d7adb02d87edf49e7830b6a6c454360e9a9b5dd Mon Sep 17 00:00:00 2001 From: Christopher Buckingham Date: Mon, 1 Mar 2021 16:09:43 +0000 Subject: [PATCH 015/845] Added CVE-2018-25004 --- 2018/25xxx/CVE-2018-25004.json | 86 +++++++++++++++++++++++++++++++--- 1 file changed, 80 insertions(+), 6 deletions(-) diff --git a/2018/25xxx/CVE-2018-25004.json b/2018/25xxx/CVE-2018-25004.json index a80cc4c146d..7e4f85303a5 100644 --- a/2018/25xxx/CVE-2018-25004.json +++ b/2018/25xxx/CVE-2018-25004.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cna@mongodb.com", + "DATE_PUBLIC": "2021-02-26T17:00:00.000Z", "ID": "CVE-2018-25004", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Invariant failure when explaining a find with a UUID" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MongoDB Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.6", + "version_value": "3.6.11" + }, + { + "version_affected": "<", + "version_name": "4.0", + "version_value": "4.0.6" + } + ] + } + } + ] + }, + "vendor_name": "MongoDB Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:F/RL:U/RC:C", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://jira.mongodb.org/browse/SERVER-38275" + } + ] + }, + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file From 39b97cece2def96ae10de9f65e636025be692f3a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 17:00:44 +0000 Subject: [PATCH 016/845] "-Synchronized-Data." --- 2018/25xxx/CVE-2018-25004.json | 5 +- 2020/13xxx/CVE-2020-13957.json | 15 ++++ 2020/36xxx/CVE-2020-36240.json | 138 +++++++++++++++++---------------- 2020/7xxx/CVE-2020-7929.json | 5 +- 2021/23xxx/CVE-2021-23968.json | 5 ++ 2021/23xxx/CVE-2021-23969.json | 5 ++ 2021/23xxx/CVE-2021-23973.json | 5 ++ 2021/23xxx/CVE-2021-23978.json | 5 ++ 2021/3xxx/CVE-2021-3355.json | 10 +++ 9 files changed, 121 insertions(+), 72 deletions(-) diff --git a/2018/25xxx/CVE-2018-25004.json b/2018/25xxx/CVE-2018-25004.json index 7e4f85303a5..1b2f34ed3f6 100644 --- a/2018/25xxx/CVE-2018-25004.json +++ b/2018/25xxx/CVE-2018-25004.json @@ -81,8 +81,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://jira.mongodb.org/browse/SERVER-38275" + "refsource": "MISC", + "url": "https://jira.mongodb.org/browse/SERVER-38275", + "name": "https://jira.mongodb.org/browse/SERVER-38275" } ] }, diff --git a/2020/13xxx/CVE-2020-13957.json b/2020/13xxx/CVE-2020-13957.json index 5d04ea3993c..cbf811d1be1 100644 --- a/2020/13xxx/CVE-2020-13957.json +++ b/2020/13xxx/CVE-2020-13957.json @@ -128,6 +128,21 @@ "refsource": "MLIST", "name": "[bigtop-dev] 20210225 [GitHub] [bigtop] JunHe77 opened a new pull request #743: BIGTOP-3507: CVE-2020-13957 mitigation backport", "url": "https://lists.apache.org/thread.html/rf1a32f00017e83ff29a74be2de02e28e4302dddb5f14c624e297a8c0@%3Cdev.bigtop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bigtop-dev] 20210301 [GitHub] [bigtop] iwasakims merged pull request #743: BIGTOP-3507: CVE-2020-13957 mitigation backport", + "url": "https://lists.apache.org/thread.html/r2a6600fe9afd502c04d26fd112823ec3f3c3ad1b4a289d10567a78a0@%3Cdev.bigtop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bigtop-issues] 20210301 [jira] [Resolved] (BIGTOP-3507) Solr: CVE-2020-13957 mitigation backport", + "url": "https://lists.apache.org/thread.html/r3da9895cea476bcee2557531bebd4e8f6f367dc3ea900a65e2f51cd8@%3Cissues.bigtop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bigtop-commits] 20210301 [bigtop] branch master updated: BIGTOP-3507: CVE-2020-13957 mitigation backport (#743)", + "url": "https://lists.apache.org/thread.html/rb2f1c7fd3d3ea719dfac4706a80e6affddecae8663dda04e1335347f@%3Ccommits.bigtop.apache.org%3E" } ] }, diff --git a/2020/36xxx/CVE-2020-36240.json b/2020/36xxx/CVE-2020-36240.json index ce59777d12c..617de44f8dd 100644 --- a/2020/36xxx/CVE-2020-36240.json +++ b/2020/36xxx/CVE-2020-36240.json @@ -1,70 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2021-02-28T00:00:00", - "ID": "CVE-2020-36240", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Crowd", - "version": { - "version_data": [ - { - "version_value": "4.0.4", - "version_affected": "<" - }, - { - "version_value": "4.1.0", - "version_affected": ">=" - }, - { - "version_value": "4.1.2", - "version_affected": "<" - } - ] - } - } - ] - }, - "vendor_name": "Atlassian" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Arbitrary File Read" - } + "CVE_data_meta": { + "ASSIGNER": "security@atlassian.com", + "DATE_PUBLIC": "2021-02-28T00:00:00", + "ID": "CVE-2020-36240", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Crowd", + "version": { + "version_data": [ + { + "version_value": "4.0.4", + "version_affected": "<" + }, + { + "version_value": "4.1.0", + "version_affected": ">=" + }, + { + "version_value": "4.1.2", + "version_affected": "<" + } + ] + } + } + ] + }, + "vendor_name": "Atlassian" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://jira.atlassian.com/browse/CWD-5685" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary File Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.atlassian.com/browse/CWD-5685", + "refsource": "MISC", + "name": "https://jira.atlassian.com/browse/CWD-5685" + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7929.json b/2020/7xxx/CVE-2020-7929.json index dc87cf8982b..68d6fad9c27 100644 --- a/2020/7xxx/CVE-2020-7929.json +++ b/2020/7xxx/CVE-2020-7929.json @@ -81,8 +81,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://jira.mongodb.org/browse/SERVER-51083" + "refsource": "MISC", + "url": "https://jira.mongodb.org/browse/SERVER-51083", + "name": "https://jira.mongodb.org/browse/SERVER-51083" } ] }, diff --git a/2021/23xxx/CVE-2021-23968.json b/2021/23xxx/CVE-2021-23968.json index b32736d3f85..3b5b8ed89e8 100644 --- a/2021/23xxx/CVE-2021-23968.json +++ b/2021/23xxx/CVE-2021-23968.json @@ -83,6 +83,11 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1687342", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1687342" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23969.json b/2021/23xxx/CVE-2021-23969.json index f84de1af069..6a98bceec4b 100644 --- a/2021/23xxx/CVE-2021-23969.json +++ b/2021/23xxx/CVE-2021-23969.json @@ -83,6 +83,11 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542194", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1542194" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23973.json b/2021/23xxx/CVE-2021-23973.json index b344a222a91..25b492ac906 100644 --- a/2021/23xxx/CVE-2021-23973.json +++ b/2021/23xxx/CVE-2021-23973.json @@ -83,6 +83,11 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1690976", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1690976" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23978.json b/2021/23xxx/CVE-2021-23978.json index 6d9a3768607..a69120baa3a 100644 --- a/2021/23xxx/CVE-2021-23978.json +++ b/2021/23xxx/CVE-2021-23978.json @@ -83,6 +83,11 @@ "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=786797%2C1682928%2C1687391%2C1687597", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=786797%2C1682928%2C1687391%2C1687597" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3355.json b/2021/3xxx/CVE-2021-3355.json index ba64115f9f6..687e03652cb 100644 --- a/2021/3xxx/CVE-2021-3355.json +++ b/2021/3xxx/CVE-2021-3355.json @@ -61,6 +61,16 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Peithon/1c628ded0c4fc96c6331c3cce1d0c69b", + "url": "https://gist.github.com/Peithon/1c628ded0c4fc96c6331c3cce1d0c69b" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49598", + "url": "https://www.exploit-db.com/exploits/49598" } ] } From ccf4aa47d8adf10ea0f46c0eb45061e78e70e7d8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 18:00:43 +0000 Subject: [PATCH 017/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13702.json | 14 ++++----- 2020/9xxx/CVE-2020-9479.json | 5 ++++ 2021/21xxx/CVE-2021-21972.json | 5 ++++ 2021/22xxx/CVE-2021-22114.json | 50 +++++++++++++++++++++++++++++-- 2021/25xxx/CVE-2021-25914.json | 55 ++++++++++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27851.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27852.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27853.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27854.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27855.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27856.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27857.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27858.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27859.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27860.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27861.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27862.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27863.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27864.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27865.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27866.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27867.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27868.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27869.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27870.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27871.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27872.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27873.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27874.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27875.json | 18 +++++++++++ 2021/3xxx/CVE-2021-3111.json | 5 ++++ 2021/3xxx/CVE-2021-3378.json | 5 ++++ 2021/3xxx/CVE-2021-3418.json | 18 +++++++++++ 33 files changed, 594 insertions(+), 13 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27851.json create mode 100644 2021/27xxx/CVE-2021-27852.json create mode 100644 2021/27xxx/CVE-2021-27853.json create mode 100644 2021/27xxx/CVE-2021-27854.json create mode 100644 2021/27xxx/CVE-2021-27855.json create mode 100644 2021/27xxx/CVE-2021-27856.json create mode 100644 2021/27xxx/CVE-2021-27857.json create mode 100644 2021/27xxx/CVE-2021-27858.json create mode 100644 2021/27xxx/CVE-2021-27859.json create mode 100644 2021/27xxx/CVE-2021-27860.json create mode 100644 2021/27xxx/CVE-2021-27861.json create mode 100644 2021/27xxx/CVE-2021-27862.json create mode 100644 2021/27xxx/CVE-2021-27863.json create mode 100644 2021/27xxx/CVE-2021-27864.json create mode 100644 2021/27xxx/CVE-2021-27865.json create mode 100644 2021/27xxx/CVE-2021-27866.json create mode 100644 2021/27xxx/CVE-2021-27867.json create mode 100644 2021/27xxx/CVE-2021-27868.json create mode 100644 2021/27xxx/CVE-2021-27869.json create mode 100644 2021/27xxx/CVE-2021-27870.json create mode 100644 2021/27xxx/CVE-2021-27871.json create mode 100644 2021/27xxx/CVE-2021-27872.json create mode 100644 2021/27xxx/CVE-2021-27873.json create mode 100644 2021/27xxx/CVE-2021-27874.json create mode 100644 2021/27xxx/CVE-2021-27875.json create mode 100644 2021/3xxx/CVE-2021-3418.json diff --git a/2020/13xxx/CVE-2020-13702.json b/2020/13xxx/CVE-2020-13702.json index 0a84e9a7577..18535c43027 100644 --- a/2020/13xxx/CVE-2020-13702.json +++ b/2020/13xxx/CVE-2020-13702.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "MISC", - "name": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697", - "url": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697" - }, { "refsource": "MISC", "name": "https://github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200611.pdf", @@ -81,6 +76,11 @@ "refsource": "MISC", "name": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697c3cae0a56ae3464c2c6cbe31b69e", "url": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697c3cae0a56ae3464c2c6cbe31b69e" + }, + { + "refsource": "MISC", + "name": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697", + "url": "https://github.com/google/exposure-notifications-internals/commit/8f751a666697" } ] }, @@ -94,9 +94,9 @@ "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", - "baseScore": 4.3, + "baseScore": 4.3, "vectorString": "CVSS:3.1/AC:L/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:N", "version": "3.1" } } -} +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9479.json b/2020/9xxx/CVE-2020-9479.json index 38a270cd056..9d0c254eb8d 100644 --- a/2020/9xxx/CVE-2020-9479.json +++ b/2020/9xxx/CVE-2020-9479.json @@ -69,6 +69,11 @@ "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2020/08/08/2", "name": "https://www.openwall.com/lists/oss-security/2020/08/08/2" + }, + { + "refsource": "MLIST", + "name": "[asterixdb-dev] 20210301 Re: [EXT] Re: CVE Publication Service Request 941606", + "url": "https://lists.apache.org/thread.html/r4cc9cc9c54573babf821c31d5d410fb260d1cd416dc1b225d587be9b@%3Cdev.asterixdb.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21972.json b/2021/21xxx/CVE-2021-21972.json index 35d1c50655f..53bbc99cc5b 100644 --- a/2021/21xxx/CVE-2021-21972.json +++ b/2021/21xxx/CVE-2021-21972.json @@ -67,6 +67,11 @@ "refsource": "CONFIRM", "name": "https://www.vmware.com/security/advisories/VMSA-2021-0002.html", "url": "https://www.vmware.com/security/advisories/VMSA-2021-0002.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html", + "url": "http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22114.json b/2021/22xxx/CVE-2021-22114.json index 582938853e1..88c5de00ccb 100644 --- a/2021/22xxx/CVE-2021-22114.json +++ b/2021/22xxx/CVE-2021-22114.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22114", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@vmware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Spring Integration Zip extension", + "version": { + "version_data": [ + { + "version_value": "spring-integration-zip versions prior to 1.0.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary file write vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://tanzu.vmware.com/security/cve-2021-22114", + "url": "https://tanzu.vmware.com/security/cve-2021-22114" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder." } ] } diff --git a/2021/25xxx/CVE-2021-25914.json b/2021/25xxx/CVE-2021-25914.json index 4041e85ceb8..71d5f4fa9a4 100644 --- a/2021/25xxx/CVE-2021-25914.json +++ b/2021/25xxx/CVE-2021-25914.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-25914", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "object-collider", + "version": { + "version_data": [ + { + "version_value": "1.0.0, 1.0.1, 1.0.2, 1.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914" + }, + { + "refsource": "MISC", + "name": "https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5", + "url": "https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2021/27xxx/CVE-2021-27851.json b/2021/27xxx/CVE-2021-27851.json new file mode 100644 index 00000000000..3ee85db4506 --- /dev/null +++ b/2021/27xxx/CVE-2021-27851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27852.json b/2021/27xxx/CVE-2021-27852.json new file mode 100644 index 00000000000..0c226852e13 --- /dev/null +++ b/2021/27xxx/CVE-2021-27852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27853.json b/2021/27xxx/CVE-2021-27853.json new file mode 100644 index 00000000000..bb9c71025c4 --- /dev/null +++ b/2021/27xxx/CVE-2021-27853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27854.json b/2021/27xxx/CVE-2021-27854.json new file mode 100644 index 00000000000..fe89ab067cc --- /dev/null +++ b/2021/27xxx/CVE-2021-27854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27855.json b/2021/27xxx/CVE-2021-27855.json new file mode 100644 index 00000000000..9e4cf7eb872 --- /dev/null +++ b/2021/27xxx/CVE-2021-27855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27856.json b/2021/27xxx/CVE-2021-27856.json new file mode 100644 index 00000000000..b59fde63e25 --- /dev/null +++ b/2021/27xxx/CVE-2021-27856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27857.json b/2021/27xxx/CVE-2021-27857.json new file mode 100644 index 00000000000..fcee9842aa1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27858.json b/2021/27xxx/CVE-2021-27858.json new file mode 100644 index 00000000000..17396f1358f --- /dev/null +++ b/2021/27xxx/CVE-2021-27858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27859.json b/2021/27xxx/CVE-2021-27859.json new file mode 100644 index 00000000000..cbc9a367f5b --- /dev/null +++ b/2021/27xxx/CVE-2021-27859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27860.json b/2021/27xxx/CVE-2021-27860.json new file mode 100644 index 00000000000..fefd64fbe94 --- /dev/null +++ b/2021/27xxx/CVE-2021-27860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27861.json b/2021/27xxx/CVE-2021-27861.json new file mode 100644 index 00000000000..c52154379c3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27861.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27861", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27862.json b/2021/27xxx/CVE-2021-27862.json new file mode 100644 index 00000000000..af4e12f0070 --- /dev/null +++ b/2021/27xxx/CVE-2021-27862.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27862", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27863.json b/2021/27xxx/CVE-2021-27863.json new file mode 100644 index 00000000000..bb6228b8363 --- /dev/null +++ b/2021/27xxx/CVE-2021-27863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27864.json b/2021/27xxx/CVE-2021-27864.json new file mode 100644 index 00000000000..03b86412375 --- /dev/null +++ b/2021/27xxx/CVE-2021-27864.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27864", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27865.json b/2021/27xxx/CVE-2021-27865.json new file mode 100644 index 00000000000..5cb8c690166 --- /dev/null +++ b/2021/27xxx/CVE-2021-27865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27866.json b/2021/27xxx/CVE-2021-27866.json new file mode 100644 index 00000000000..15183440fef --- /dev/null +++ b/2021/27xxx/CVE-2021-27866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27867.json b/2021/27xxx/CVE-2021-27867.json new file mode 100644 index 00000000000..9602ea66fa8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27868.json b/2021/27xxx/CVE-2021-27868.json new file mode 100644 index 00000000000..a9eae3d3e1c --- /dev/null +++ b/2021/27xxx/CVE-2021-27868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27869.json b/2021/27xxx/CVE-2021-27869.json new file mode 100644 index 00000000000..83079d17900 --- /dev/null +++ b/2021/27xxx/CVE-2021-27869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27870.json b/2021/27xxx/CVE-2021-27870.json new file mode 100644 index 00000000000..4a75d8a3643 --- /dev/null +++ b/2021/27xxx/CVE-2021-27870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27871.json b/2021/27xxx/CVE-2021-27871.json new file mode 100644 index 00000000000..69cb1adcee4 --- /dev/null +++ b/2021/27xxx/CVE-2021-27871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27872.json b/2021/27xxx/CVE-2021-27872.json new file mode 100644 index 00000000000..8d7b92ef7bd --- /dev/null +++ b/2021/27xxx/CVE-2021-27872.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27872", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27873.json b/2021/27xxx/CVE-2021-27873.json new file mode 100644 index 00000000000..dcb10c649ff --- /dev/null +++ b/2021/27xxx/CVE-2021-27873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27874.json b/2021/27xxx/CVE-2021-27874.json new file mode 100644 index 00000000000..b44fc9db4b6 --- /dev/null +++ b/2021/27xxx/CVE-2021-27874.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27874", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27875.json b/2021/27xxx/CVE-2021-27875.json new file mode 100644 index 00000000000..155b76a54d2 --- /dev/null +++ b/2021/27xxx/CVE-2021-27875.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27875", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3111.json b/2021/3xxx/CVE-2021-3111.json index 70445b867ed..b201c3260c5 100644 --- a/2021/3xxx/CVE-2021-3111.json +++ b/2021/3xxx/CVE-2021-3111.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/Quadron-Research-Lab/CVE/blob/main/CVE-2021-3111.pdf", "url": "https://github.com/Quadron-Research-Lab/CVE/blob/main/CVE-2021-3111.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html" } ] } diff --git a/2021/3xxx/CVE-2021-3378.json b/2021/3xxx/CVE-2021-3378.json index ff5ec34e171..fefc0d1f023 100644 --- a/2021/3xxx/CVE-2021-3378.json +++ b/2021/3xxx/CVE-2021-3378.json @@ -56,6 +56,11 @@ "url": "https://github.com/erberkan/fortilogger_arbitrary_fileupload", "refsource": "MISC", "name": "https://github.com/erberkan/fortilogger_arbitrary_fileupload" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html", + "url": "http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html" } ] } diff --git a/2021/3xxx/CVE-2021-3418.json b/2021/3xxx/CVE-2021-3418.json new file mode 100644 index 00000000000..5e0f3b6e251 --- /dev/null +++ b/2021/3xxx/CVE-2021-3418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d02dc723bf0f7808febc56419d6054a82f56e345 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 19:00:41 +0000 Subject: [PATCH 018/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23336.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index 770cd42f819..bb70f9c1981 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -134,6 +134,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-7c1bb32d13", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b1843407ca", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/" } ] }, From 28f5d20ba44350d0b074866fa00663eb658b76b1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 20:00:41 +0000 Subject: [PATCH 019/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13956.json | 25 +++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3419.json | 18 ++++++++++++++++++ 2 files changed, 43 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3419.json diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 32c4c5f6fec..77c6c5e12ac 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -88,6 +88,31 @@ "refsource": "MLIST", "name": "[turbine-commits] 20210203 svn commit: r1886168 - in /turbine/core/trunk: ./ conf/ conf/test/ src/java/org/apache/turbine/services/urlmapper/ src/test/org/apache/turbine/services/urlmapper/ src/test/org/apache/turbine/services/urlmapper/model/ xdocs/howto/", "url": "https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210301 [jira] [Updated] (HIVE-24837) Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210301 [jira] [Assigned] (HIVE-24837) Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-gitbox] 20210301 [GitHub] [hive] hsnusonic opened a new pull request #2032: HIVE-24837 Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20210301 [jira] [Created] (HIVE-24837) Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210301 [jira] [Work logged] (HIVE-24837) Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2021/3xxx/CVE-2021-3419.json b/2021/3xxx/CVE-2021-3419.json new file mode 100644 index 00000000000..d1250f7984d --- /dev/null +++ b/2021/3xxx/CVE-2021-3419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 83e7ffabaf1c40267029b6fded7dc1f26a2cbf22 Mon Sep 17 00:00:00 2001 From: DellEMCProductSecurity Date: Mon, 1 Mar 2021 15:20:04 -0500 Subject: [PATCH 020/845] Added 2 CVEs --- 2021/21xxx/CVE-2021-21515.json | 71 +++++++++++++++++++++++++++++----- 2021/21xxx/CVE-2021-21517.json | 71 +++++++++++++++++++++++++++++----- 2 files changed, 124 insertions(+), 18 deletions(-) diff --git a/2021/21xxx/CVE-2021-21515.json b/2021/21xxx/CVE-2021-21515.json index 84e0a1bf2a7..399f54b13c2 100644 --- a/2021/21xxx/CVE-2021-21515.json +++ b/2021/21xxx/CVE-2021-21515.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21515", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-23", + "ID": "CVE-2021-21515", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SourceOne", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "7.2SP10-HF2" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "Dell EMC SourceOne, versions 7.2SP10 and prior, contain a Stored Cross-Site Scripting vulnerability. A remote low privileged attacker may potentially exploit this vulnerability, to hijack user sessions or to trick a victim application user to unknowingly send arbitrary requests to the server." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000183430/dsa-2021-043-dell-emc-sourceone-java-script-xss-stored-vulnerability" } ] } diff --git a/2021/21xxx/CVE-2021-21517.json b/2021/21xxx/CVE-2021-21517.json index 8b4086f54df..fdf443243b8 100644 --- a/2021/21xxx/CVE-2021-21517.json +++ b/2021/21xxx/CVE-2021-21517.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21517", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-25", + "ID": "CVE-2021-21517", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SRS Policy Manager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "7.0" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "SRS Policy Manager 6.X is affected by an XML External Entity Injection (XXE) vulnerability due to a misconfigured XML parser that processes user-supplied DTD input without sufficient validation. A remote unauthenticated attacker can potentially exploit this vulnerability to read system files as a non-root user and may be able to temporarily disrupt the ESRS service." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000183576/dsa-2021-045-dell-emc-srs-policy-manager-security-update-for-external-entity-injection-vulnerability" } ] } From f45442bc0206cd85feea2de55a110c2f0dfa331d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 21:00:50 +0000 Subject: [PATCH 021/845] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11996.json | 5 +++ 2020/13xxx/CVE-2020-13898.json | 4 +-- 2020/13xxx/CVE-2020-13899.json | 4 +-- 2020/13xxx/CVE-2020-13900.json | 4 +-- 2020/13xxx/CVE-2020-13901.json | 4 +-- 2020/28xxx/CVE-2020-28243.json | 10 ++++++ 2021/21xxx/CVE-2021-21515.json | 43 ++++++++++++------------ 2021/21xxx/CVE-2021-21517.json | 43 ++++++++++++------------ 2021/27xxx/CVE-2021-27317.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27318.json | 61 ++++++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3332.json | 56 +++++++++++++++++++++++++++---- 11 files changed, 227 insertions(+), 68 deletions(-) diff --git a/2020/11xxx/CVE-2020-11996.json b/2020/11xxx/CVE-2020-11996.json index 6ab7b735eff..de65600c1e7 100644 --- a/2020/11xxx/CVE-2020-11996.json +++ b/2020/11xxx/CVE-2020-11996.json @@ -164,6 +164,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "refsource": "MLIST", + "name": "[ofbiz-notifications] 20210301 [jira] [Updated] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)", + "url": "https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2@%3Cnotifications.ofbiz.apache.org%3E" } ] }, diff --git a/2020/13xxx/CVE-2020-13898.json b/2020/13xxx/CVE-2020-13898.json index a5d1b77dd21..302955043a2 100644 --- a/2020/13xxx/CVE-2020-13898.json +++ b/2020/13xxx/CVE-2020-13898.json @@ -69,8 +69,8 @@ }, { "refsource": "MISC", - "name": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13898", - "url": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13898" + "name": "https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898", + "url": "https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898" } ] } diff --git a/2020/13xxx/CVE-2020-13899.json b/2020/13xxx/CVE-2020-13899.json index 324db54a747..b04ccc406de 100644 --- a/2020/13xxx/CVE-2020-13899.json +++ b/2020/13xxx/CVE-2020-13899.json @@ -64,8 +64,8 @@ }, { "refsource": "MISC", - "name": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13899", - "url": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13899" + "name": "https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13899", + "url": "https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13899" } ] } diff --git a/2020/13xxx/CVE-2020-13900.json b/2020/13xxx/CVE-2020-13900.json index 3b9e6827cd4..0b7cd34701d 100644 --- a/2020/13xxx/CVE-2020-13900.json +++ b/2020/13xxx/CVE-2020-13900.json @@ -69,8 +69,8 @@ }, { "refsource": "MISC", - "name": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13900", - "url": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13900" + "name": "https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900", + "url": "https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900" } ] } diff --git a/2020/13xxx/CVE-2020-13901.json b/2020/13xxx/CVE-2020-13901.json index 47a794ec924..51e87eea3b6 100644 --- a/2020/13xxx/CVE-2020-13901.json +++ b/2020/13xxx/CVE-2020-13901.json @@ -64,8 +64,8 @@ }, { "refsource": "MISC", - "name": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13901", - "url": "https://github.com/merrychap/CVEs/tree/master/CVE-2020-13901" + "name": "https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13901", + "url": "https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13901" } ] } diff --git a/2020/28xxx/CVE-2020-28243.json b/2020/28xxx/CVE-2020-28243.json index e6bf1f444f1..d59653fb3a5 100644 --- a/2020/28xxx/CVE-2020-28243.json +++ b/2020/28xxx/CVE-2020-28243.json @@ -56,6 +56,16 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "MISC", + "name": "https://github.com/stealthcopter/CVE-2020-28243", + "url": "https://github.com/stealthcopter/CVE-2020-28243" + }, + { + "refsource": "MISC", + "name": "https://sec.stealthcopter.com/cve-2020-28243/", + "url": "https://sec.stealthcopter.com/cve-2020-28243/" } ] } diff --git a/2021/21xxx/CVE-2021-21515.json b/2021/21xxx/CVE-2021-21515.json index 399f54b13c2..aaff6face6d 100644 --- a/2021/21xxx/CVE-2021-21515.json +++ b/2021/21xxx/CVE-2021-21515.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-23", - "ID": "CVE-2021-21515", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-23", + "ID": "CVE-2021-21515", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "SourceOne", + "product_name": "SourceOne", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "7.2SP10-HF2" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell EMC SourceOne, versions 7.2SP10 and prior, contain a Stored Cross-Site Scripting vulnerability. A remote low privileged attacker may potentially exploit this vulnerability, to hijack user sessions or to trick a victim application user to unknowingly send arbitrary requests to the server." } ] - }, + }, "impact": { "cvss": { - "baseScore": 9.0, - "baseSeverity": "Critical", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000183430/dsa-2021-043-dell-emc-sourceone-java-script-xss-stored-vulnerability" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000183430/dsa-2021-043-dell-emc-sourceone-java-script-xss-stored-vulnerability", + "name": "https://www.dell.com/support/kbdoc/en-us/000183430/dsa-2021-043-dell-emc-sourceone-java-script-xss-stored-vulnerability" } ] } diff --git a/2021/21xxx/CVE-2021-21517.json b/2021/21xxx/CVE-2021-21517.json index fdf443243b8..3755383eb38 100644 --- a/2021/21xxx/CVE-2021-21517.json +++ b/2021/21xxx/CVE-2021-21517.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-25", - "ID": "CVE-2021-21517", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-25", + "ID": "CVE-2021-21517", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "SRS Policy Manager", + "product_name": "SRS Policy Manager", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "7.0" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "SRS Policy Manager 6.X is affected by an XML External Entity Injection (XXE) vulnerability due to a misconfigured XML parser that processes user-supplied DTD input without sufficient validation. A remote unauthenticated attacker can potentially exploit this vulnerability to read system files as a non-root user and may be able to temporarily disrupt the ESRS service." } ] - }, + }, "impact": { "cvss": { - "baseScore": 7.2, - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000183576/dsa-2021-045-dell-emc-srs-policy-manager-security-update-for-external-entity-injection-vulnerability" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000183576/dsa-2021-045-dell-emc-srs-policy-manager-security-update-for-external-entity-injection-vulnerability", + "name": "https://www.dell.com/support/kbdoc/en-us/000183576/dsa-2021-045-dell-emc-srs-policy-manager-security-update-for-external-entity-injection-vulnerability" } ] } diff --git a/2021/27xxx/CVE-2021-27317.json b/2021/27xxx/CVE-2021-27317.json index 3f69c51ae33..1e15a1ccc9d 100644 --- a/2021/27xxx/CVE-2021-27317.json +++ b/2021/27xxx/CVE-2021-27317.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27317", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27317", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in contactus.php in Doctor Appointment System 1.0 allows remote attackers to inject arbitrary web script or HTML via the comment parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html" } ] } diff --git a/2021/27xxx/CVE-2021-27318.json b/2021/27xxx/CVE-2021-27318.json index c99fe644f46..a4f70431475 100644 --- a/2021/27xxx/CVE-2021-27318.json +++ b/2021/27xxx/CVE-2021-27318.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27318", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27318", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in contactus.php in Doctor Appointment System 1.0 allows remote attackers to inject arbitrary web script or HTML via the lastname parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html" } ] } diff --git a/2021/3xxx/CVE-2021-3332.json b/2021/3xxx/CVE-2021-3332.json index c952ef481e0..950b1fe7b63 100644 --- a/2021/3xxx/CVE-2021-3332.json +++ b/2021/3xxx/CVE-2021-3332.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3332", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3332", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WPS Hide Login 1.6.1 allows remote attackers to bypass a protection mechanism via post_password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.sebastianschmitt.eu/security/wps-hide-login-1-6-1-protection-bypass-cve-2021-3332", + "url": "https://blog.sebastianschmitt.eu/security/wps-hide-login-1-6-1-protection-bypass-cve-2021-3332" } ] } From 082674f12e7dd73b89c8ff6aafd40aef4ba021d3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 22:00:43 +0000 Subject: [PATCH 022/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26475.json | 61 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26476.json | 61 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26702.json | 61 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26703.json | 66 ++++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26704.json | 66 ++++++++++++++++++++++++++--- 2021/27xxx/CVE-2021-27876.json | 76 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27877.json | 76 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27878.json | 76 ++++++++++++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3342.json | 66 ++++++++++++++++++++++++++--- 9 files changed, 573 insertions(+), 36 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27876.json create mode 100644 2021/27xxx/CVE-2021-27877.json create mode 100644 2021/27xxx/CVE-2021-27878.json diff --git a/2021/26xxx/CVE-2021-26475.json b/2021/26xxx/CVE-2021-26475.json index 5a5da331db9..ddf74779a16 100644 --- a/2021/26xxx/CVE-2021-26475.json +++ b/2021/26xxx/CVE-2021-26475.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26475", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26475", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EPrints 3.4.2 exposes a reflected XSS opportunity in the via a cgi/cal URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2548/", + "url": "https://files.eprints.org/2548/" + }, + { + "refsource": "MISC", + "name": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf", + "url": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf" } ] } diff --git a/2021/26xxx/CVE-2021-26476.json b/2021/26xxx/CVE-2021-26476.json index 85ef8df8d1b..4493fb2b7c0 100644 --- a/2021/26xxx/CVE-2021-26476.json +++ b/2021/26xxx/CVE-2021-26476.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26476", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26476", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EPrints 3.4.2 allows remote attackers to execute OS commands via crafted LaTeX input to a cgi/cal?year= URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2548/", + "url": "https://files.eprints.org/2548/" + }, + { + "refsource": "MISC", + "name": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf", + "url": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf" } ] } diff --git a/2021/26xxx/CVE-2021-26702.json b/2021/26xxx/CVE-2021-26702.json index 0b9df1f5e2e..f76a3f1f565 100644 --- a/2021/26xxx/CVE-2021-26702.json +++ b/2021/26xxx/CVE-2021-26702.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26702", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26702", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EPrints 3.4.2 exposes a reflected XSS opportunity in the dataset parameter to the cgi/dataset_dictionary URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2548/", + "url": "https://files.eprints.org/2548/" + }, + { + "refsource": "MISC", + "name": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf", + "url": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf" } ] } diff --git a/2021/26xxx/CVE-2021-26703.json b/2021/26xxx/CVE-2021-26703.json index 2897d290cdd..c96f3855edb 100644 --- a/2021/26xxx/CVE-2021-26703.json +++ b/2021/26xxx/CVE-2021-26703.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26703", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26703", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted JSON/XML input to a cgi/ajax/phrase URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2549/", + "url": "https://files.eprints.org/2549/" + }, + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2548/", + "url": "https://files.eprints.org/2548/" + }, + { + "refsource": "MISC", + "name": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf", + "url": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf" } ] } diff --git a/2021/26xxx/CVE-2021-26704.json b/2021/26xxx/CVE-2021-26704.json index 3ecfac089d8..814d0ed984d 100644 --- a/2021/26xxx/CVE-2021-26704.json +++ b/2021/26xxx/CVE-2021-26704.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26704", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26704", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EPrints 3.4.2 allows remote attackers to execute arbitrary commands via crafted input to the verb parameter in a cgi/toolbox/toolbox URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2549/", + "url": "https://files.eprints.org/2549/" + }, + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2548/", + "url": "https://files.eprints.org/2548/" + }, + { + "refsource": "MISC", + "name": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf", + "url": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf" } ] } diff --git a/2021/27xxx/CVE-2021-27876.json b/2021/27xxx/CVE-2021-27876.json new file mode 100644 index 00000000000..322d75500ea --- /dev/null +++ b/2021/27xxx/CVE-2021-27876.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27876", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS21-001#issue2", + "refsource": "MISC", + "name": "https://www.veritas.com/content/support/en_US/security/VTS21-001#issue2" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:H/I:H/PR:L/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27877.json b/2021/27xxx/CVE-2021-27877.json new file mode 100644 index 00000000000..dd278f9d302 --- /dev/null +++ b/2021/27xxx/CVE-2021-27877.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27877", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS21-001#issue1", + "refsource": "MISC", + "name": "https://www.veritas.com/content/support/en_US/security/VTS21-001#issue1" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:H/I:L/PR:N/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27878.json b/2021/27xxx/CVE-2021-27878.json new file mode 100644 index 00000000000..76e58893a94 --- /dev/null +++ b/2021/27xxx/CVE-2021-27878.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27878", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS21-001#issue3", + "refsource": "MISC", + "name": "https://www.veritas.com/content/support/en_US/security/VTS21-001#issue3" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3342.json b/2021/3xxx/CVE-2021-3342.json index 8f8e1c176aa..2602db829a9 100644 --- a/2021/3xxx/CVE-2021-3342.json +++ b/2021/3xxx/CVE-2021-3342.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3342", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3342", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted LaTeX input to a cgi/latex2png?latex= URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2549/", + "url": "https://files.eprints.org/2549/" + }, + { + "refsource": "CONFIRM", + "name": "https://files.eprints.org/2548/", + "url": "https://files.eprints.org/2548/" + }, + { + "refsource": "MISC", + "name": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf", + "url": "https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf" } ] } From a5ff33a0e111ce02ba3c1c745ae80fcb8f75bac5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 23:00:42 +0000 Subject: [PATCH 023/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27879.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27880.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27881.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27882.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27883.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27884.json | 18 ++++++++++++++++++ 6 files changed, 108 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27879.json create mode 100644 2021/27xxx/CVE-2021-27880.json create mode 100644 2021/27xxx/CVE-2021-27881.json create mode 100644 2021/27xxx/CVE-2021-27882.json create mode 100644 2021/27xxx/CVE-2021-27883.json create mode 100644 2021/27xxx/CVE-2021-27884.json diff --git a/2021/27xxx/CVE-2021-27879.json b/2021/27xxx/CVE-2021-27879.json new file mode 100644 index 00000000000..e8b7ecf5894 --- /dev/null +++ b/2021/27xxx/CVE-2021-27879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27880.json b/2021/27xxx/CVE-2021-27880.json new file mode 100644 index 00000000000..d62e06a6357 --- /dev/null +++ b/2021/27xxx/CVE-2021-27880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27881.json b/2021/27xxx/CVE-2021-27881.json new file mode 100644 index 00000000000..af1cc3e5300 --- /dev/null +++ b/2021/27xxx/CVE-2021-27881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27882.json b/2021/27xxx/CVE-2021-27882.json new file mode 100644 index 00000000000..3808ba0ae66 --- /dev/null +++ b/2021/27xxx/CVE-2021-27882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27883.json b/2021/27xxx/CVE-2021-27883.json new file mode 100644 index 00000000000..dee4f47b824 --- /dev/null +++ b/2021/27xxx/CVE-2021-27883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27884.json b/2021/27xxx/CVE-2021-27884.json new file mode 100644 index 00000000000..6b64931f46d --- /dev/null +++ b/2021/27xxx/CVE-2021-27884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d4854abdc4a3fff623857a1ffd739ef1f1dbbc8e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 1 Mar 2021 23:00:57 +0000 Subject: [PATCH 024/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27884.json | 61 ++++++++++++++++++++++++++++++---- 1 file changed, 55 insertions(+), 6 deletions(-) diff --git a/2021/27xxx/CVE-2021-27884.json b/2021/27xxx/CVE-2021-27884.json index 6b64931f46d..34f532fcfc6 100644 --- a/2021/27xxx/CVE-2021-27884.json +++ b/2021/27xxx/CVE-2021-27884.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27884", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27884", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi", + "refsource": "MISC", + "name": "https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi" + }, + { + "url": "https://github.com/YMFE/yapi/issues/2117", + "refsource": "MISC", + "name": "https://github.com/YMFE/yapi/issues/2117" } ] } From 1d2abd16e827f67194bbb02d22e0a93c282a400d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 00:00:41 +0000 Subject: [PATCH 025/845] "-Synchronized-Data." --- 2016/8xxx/CVE-2016-8001.json | 14 +++---- 2016/8xxx/CVE-2016-8003.json | 14 +++---- 2016/8xxx/CVE-2016-8004.json | 14 +++---- 2016/8xxx/CVE-2016-8013.json | 14 +++---- 2016/8xxx/CVE-2016-8014.json | 14 +++---- 2016/8xxx/CVE-2016-8015.json | 14 +++---- 2016/8xxx/CVE-2016-8028.json | 14 +++---- 2016/8xxx/CVE-2016-8040.json | 14 +++---- 2016/8xxx/CVE-2016-8041.json | 14 +++---- 2016/8xxx/CVE-2016-8042.json | 14 +++---- 2016/8xxx/CVE-2016-8043.json | 14 +++---- 2016/8xxx/CVE-2016-8044.json | 14 +++---- 2016/8xxx/CVE-2016-8045.json | 14 +++---- 2016/8xxx/CVE-2016-8046.json | 14 +++---- 2016/8xxx/CVE-2016-8047.json | 14 +++---- 2016/8xxx/CVE-2016-8048.json | 14 +++---- 2016/8xxx/CVE-2016-8049.json | 14 +++---- 2016/8xxx/CVE-2016-8107.json | 14 +++---- 2016/8xxx/CVE-2016-8108.json | 14 +++---- 2016/8xxx/CVE-2016-8109.json | 14 +++---- 2016/8xxx/CVE-2016-8110.json | 14 +++---- 2016/8xxx/CVE-2016-8111.json | 14 +++---- 2016/8xxx/CVE-2016-8112.json | 14 +++---- 2016/8xxx/CVE-2016-8113.json | 14 +++---- 2016/8xxx/CVE-2016-8114.json | 14 +++---- 2016/8xxx/CVE-2016-8115.json | 14 +++---- 2016/8xxx/CVE-2016-8116.json | 14 +++---- 2016/8xxx/CVE-2016-8117.json | 14 +++---- 2016/8xxx/CVE-2016-8118.json | 14 +++---- 2016/8xxx/CVE-2016-8119.json | 14 +++---- 2016/8xxx/CVE-2016-8120.json | 14 +++---- 2016/8xxx/CVE-2016-8121.json | 14 +++---- 2016/8xxx/CVE-2016-8122.json | 14 +++---- 2016/8xxx/CVE-2016-8123.json | 14 +++---- 2016/8xxx/CVE-2016-8124.json | 14 +++---- 2016/8xxx/CVE-2016-8125.json | 14 +++---- 2016/8xxx/CVE-2016-8126.json | 14 +++---- 2016/8xxx/CVE-2016-8127.json | 14 +++---- 2016/8xxx/CVE-2016-8128.json | 14 +++---- 2016/8xxx/CVE-2016-8129.json | 14 +++---- 2016/8xxx/CVE-2016-8130.json | 14 +++---- 2016/8xxx/CVE-2016-8131.json | 14 +++---- 2016/8xxx/CVE-2016-8132.json | 14 +++---- 2016/8xxx/CVE-2016-8133.json | 14 +++---- 2016/8xxx/CVE-2016-8134.json | 14 +++---- 2016/8xxx/CVE-2016-8135.json | 14 +++---- 2016/8xxx/CVE-2016-8136.json | 14 +++---- 2016/8xxx/CVE-2016-8137.json | 14 +++---- 2016/8xxx/CVE-2016-8138.json | 14 +++---- 2016/8xxx/CVE-2016-8139.json | 14 +++---- 2016/8xxx/CVE-2016-8140.json | 14 +++---- 2016/8xxx/CVE-2016-8141.json | 14 +++---- 2016/8xxx/CVE-2016-8142.json | 14 +++---- 2016/8xxx/CVE-2016-8143.json | 14 +++---- 2016/8xxx/CVE-2016-8144.json | 14 +++---- 2016/8xxx/CVE-2016-8145.json | 14 +++---- 2016/8xxx/CVE-2016-8146.json | 14 +++---- 2016/8xxx/CVE-2016-8147.json | 14 +++---- 2016/8xxx/CVE-2016-8148.json | 14 +++---- 2016/8xxx/CVE-2016-8149.json | 14 +++---- 2016/8xxx/CVE-2016-8150.json | 14 +++---- 2016/8xxx/CVE-2016-8151.json | 14 +++---- 2016/8xxx/CVE-2016-8152.json | 14 +++---- 2016/8xxx/CVE-2016-8153.json | 14 +++---- 2016/8xxx/CVE-2016-8154.json | 14 +++---- 2016/8xxx/CVE-2016-8155.json | 14 +++---- 2016/8xxx/CVE-2016-8156.json | 14 +++---- 2016/8xxx/CVE-2016-8157.json | 14 +++---- 2016/8xxx/CVE-2016-8158.json | 14 +++---- 2016/8xxx/CVE-2016-8159.json | 14 +++---- 2016/8xxx/CVE-2016-8160.json | 14 +++---- 2021/23xxx/CVE-2021-23968.json | 5 +++ 2021/23xxx/CVE-2021-23969.json | 5 +++ 2021/23xxx/CVE-2021-23973.json | 5 +++ 2021/23xxx/CVE-2021-23978.json | 5 +++ 2021/27xxx/CVE-2021-27885.json | 18 +++++++++ 2021/27xxx/CVE-2021-27886.json | 72 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27887.json | 18 +++++++++ 78 files changed, 625 insertions(+), 497 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27885.json create mode 100644 2021/27xxx/CVE-2021-27886.json create mode 100644 2021/27xxx/CVE-2021-27887.json diff --git a/2016/8xxx/CVE-2016-8001.json b/2016/8xxx/CVE-2016-8001.json index c5ec7c37b2e..691a9b99ffc 100644 --- a/2016/8xxx/CVE-2016-8001.json +++ b/2016/8xxx/CVE-2016-8001.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8001", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8001", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8003.json b/2016/8xxx/CVE-2016-8003.json index 88966777e63..2e2a47f8f0f 100644 --- a/2016/8xxx/CVE-2016-8003.json +++ b/2016/8xxx/CVE-2016-8003.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8003", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8003", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8004.json b/2016/8xxx/CVE-2016-8004.json index 4606fc39019..c5068412e12 100644 --- a/2016/8xxx/CVE-2016-8004.json +++ b/2016/8xxx/CVE-2016-8004.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8004", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8004", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8013.json b/2016/8xxx/CVE-2016-8013.json index e52bc70284d..32c68155581 100644 --- a/2016/8xxx/CVE-2016-8013.json +++ b/2016/8xxx/CVE-2016-8013.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8013", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8013", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8014.json b/2016/8xxx/CVE-2016-8014.json index 6c608c4fa64..f1c220f0991 100644 --- a/2016/8xxx/CVE-2016-8014.json +++ b/2016/8xxx/CVE-2016-8014.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8014", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8014", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8015.json b/2016/8xxx/CVE-2016-8015.json index 0b73faebf56..46337c5c137 100644 --- a/2016/8xxx/CVE-2016-8015.json +++ b/2016/8xxx/CVE-2016-8015.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8015", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8015", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8028.json b/2016/8xxx/CVE-2016-8028.json index ad5c8203fa8..baaa80a07b6 100644 --- a/2016/8xxx/CVE-2016-8028.json +++ b/2016/8xxx/CVE-2016-8028.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8028", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8028", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8040.json b/2016/8xxx/CVE-2016-8040.json index 7c91bb02f17..031f8d07d49 100644 --- a/2016/8xxx/CVE-2016-8040.json +++ b/2016/8xxx/CVE-2016-8040.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8040", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8040", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8041.json b/2016/8xxx/CVE-2016-8041.json index 761ee97ded7..af3ffeee236 100644 --- a/2016/8xxx/CVE-2016-8041.json +++ b/2016/8xxx/CVE-2016-8041.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8041", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8041", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8042.json b/2016/8xxx/CVE-2016-8042.json index aa04c1b15ec..47610ba49cf 100644 --- a/2016/8xxx/CVE-2016-8042.json +++ b/2016/8xxx/CVE-2016-8042.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8042", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8042", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8043.json b/2016/8xxx/CVE-2016-8043.json index 48fc7598d1d..8f754bf11b5 100644 --- a/2016/8xxx/CVE-2016-8043.json +++ b/2016/8xxx/CVE-2016-8043.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8043", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8043", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8044.json b/2016/8xxx/CVE-2016-8044.json index 7c9fe2aa9a5..88794ab5cf4 100644 --- a/2016/8xxx/CVE-2016-8044.json +++ b/2016/8xxx/CVE-2016-8044.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8044", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8044", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8045.json b/2016/8xxx/CVE-2016-8045.json index 8ff3d46bfaf..55b10560ec7 100644 --- a/2016/8xxx/CVE-2016-8045.json +++ b/2016/8xxx/CVE-2016-8045.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8045", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8045", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8046.json b/2016/8xxx/CVE-2016-8046.json index 724564a0f6a..e2204b03018 100644 --- a/2016/8xxx/CVE-2016-8046.json +++ b/2016/8xxx/CVE-2016-8046.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8046", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8046", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8047.json b/2016/8xxx/CVE-2016-8047.json index cfadbfebde7..0361c60cc45 100644 --- a/2016/8xxx/CVE-2016-8047.json +++ b/2016/8xxx/CVE-2016-8047.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8047", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8047", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8048.json b/2016/8xxx/CVE-2016-8048.json index 4b3c75139eb..d0d0aa6f34c 100644 --- a/2016/8xxx/CVE-2016-8048.json +++ b/2016/8xxx/CVE-2016-8048.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8048", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8048", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8049.json b/2016/8xxx/CVE-2016-8049.json index 4e24b1ff2fe..892e30a8f2a 100644 --- a/2016/8xxx/CVE-2016-8049.json +++ b/2016/8xxx/CVE-2016-8049.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8049", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8049", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8107.json b/2016/8xxx/CVE-2016-8107.json index 572a593b913..e2a0d2d79b1 100644 --- a/2016/8xxx/CVE-2016-8107.json +++ b/2016/8xxx/CVE-2016-8107.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8107", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8107", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8108.json b/2016/8xxx/CVE-2016-8108.json index a5224fbf49c..a4a648d4c65 100644 --- a/2016/8xxx/CVE-2016-8108.json +++ b/2016/8xxx/CVE-2016-8108.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8108", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8108", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8109.json b/2016/8xxx/CVE-2016-8109.json index 4f69e8b365f..a8341135742 100644 --- a/2016/8xxx/CVE-2016-8109.json +++ b/2016/8xxx/CVE-2016-8109.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8109", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8109", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8110.json b/2016/8xxx/CVE-2016-8110.json index db17288ab84..9c67fa56187 100644 --- a/2016/8xxx/CVE-2016-8110.json +++ b/2016/8xxx/CVE-2016-8110.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8110", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8110", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8111.json b/2016/8xxx/CVE-2016-8111.json index 7fc2d68a110..40adb0cb3f5 100644 --- a/2016/8xxx/CVE-2016-8111.json +++ b/2016/8xxx/CVE-2016-8111.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8111", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8111", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8112.json b/2016/8xxx/CVE-2016-8112.json index 1b3863ddfb2..17aabd2b1a2 100644 --- a/2016/8xxx/CVE-2016-8112.json +++ b/2016/8xxx/CVE-2016-8112.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8112", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8112", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8113.json b/2016/8xxx/CVE-2016-8113.json index 665bd12124a..032bc618904 100644 --- a/2016/8xxx/CVE-2016-8113.json +++ b/2016/8xxx/CVE-2016-8113.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8113", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8113", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8114.json b/2016/8xxx/CVE-2016-8114.json index 7f78fd911a2..115e9ff28c2 100644 --- a/2016/8xxx/CVE-2016-8114.json +++ b/2016/8xxx/CVE-2016-8114.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8114", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8114", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8115.json b/2016/8xxx/CVE-2016-8115.json index 1e4b258dcab..17cf7999760 100644 --- a/2016/8xxx/CVE-2016-8115.json +++ b/2016/8xxx/CVE-2016-8115.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8115", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8115", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8116.json b/2016/8xxx/CVE-2016-8116.json index 649954fd6eb..6efa4a45d8c 100644 --- a/2016/8xxx/CVE-2016-8116.json +++ b/2016/8xxx/CVE-2016-8116.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8116", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8116", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8117.json b/2016/8xxx/CVE-2016-8117.json index d9c5d23d0e8..c7d0a7b841d 100644 --- a/2016/8xxx/CVE-2016-8117.json +++ b/2016/8xxx/CVE-2016-8117.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8117", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8117", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8118.json b/2016/8xxx/CVE-2016-8118.json index b3c536de428..12ea8022871 100644 --- a/2016/8xxx/CVE-2016-8118.json +++ b/2016/8xxx/CVE-2016-8118.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8118", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8118", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8119.json b/2016/8xxx/CVE-2016-8119.json index d19a33d1067..00b64932813 100644 --- a/2016/8xxx/CVE-2016-8119.json +++ b/2016/8xxx/CVE-2016-8119.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8119", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8119", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8120.json b/2016/8xxx/CVE-2016-8120.json index 068df33517f..a2301c2d2cd 100644 --- a/2016/8xxx/CVE-2016-8120.json +++ b/2016/8xxx/CVE-2016-8120.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8120", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8120", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8121.json b/2016/8xxx/CVE-2016-8121.json index a5399cbf942..a1858d5d7f0 100644 --- a/2016/8xxx/CVE-2016-8121.json +++ b/2016/8xxx/CVE-2016-8121.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8121", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8121", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8122.json b/2016/8xxx/CVE-2016-8122.json index 1e8ac8b3912..1211b5603e5 100644 --- a/2016/8xxx/CVE-2016-8122.json +++ b/2016/8xxx/CVE-2016-8122.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8122", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8122", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8123.json b/2016/8xxx/CVE-2016-8123.json index bd8f59b8af9..21c22caddfc 100644 --- a/2016/8xxx/CVE-2016-8123.json +++ b/2016/8xxx/CVE-2016-8123.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8123", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8123", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8124.json b/2016/8xxx/CVE-2016-8124.json index 5a9500da0b6..b378f9f0b77 100644 --- a/2016/8xxx/CVE-2016-8124.json +++ b/2016/8xxx/CVE-2016-8124.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8124", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8124", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8125.json b/2016/8xxx/CVE-2016-8125.json index 7f634158411..eca07add4d5 100644 --- a/2016/8xxx/CVE-2016-8125.json +++ b/2016/8xxx/CVE-2016-8125.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8125", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8125", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8126.json b/2016/8xxx/CVE-2016-8126.json index a17226ddb85..d7522ea2879 100644 --- a/2016/8xxx/CVE-2016-8126.json +++ b/2016/8xxx/CVE-2016-8126.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8126", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8126", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8127.json b/2016/8xxx/CVE-2016-8127.json index a4adf356ca8..06fd172c00c 100644 --- a/2016/8xxx/CVE-2016-8127.json +++ b/2016/8xxx/CVE-2016-8127.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8127", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8127", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8128.json b/2016/8xxx/CVE-2016-8128.json index 57b56e5aa64..eafec1653d3 100644 --- a/2016/8xxx/CVE-2016-8128.json +++ b/2016/8xxx/CVE-2016-8128.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8128", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8128", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8129.json b/2016/8xxx/CVE-2016-8129.json index 20a38f8a2db..6fb186019ae 100644 --- a/2016/8xxx/CVE-2016-8129.json +++ b/2016/8xxx/CVE-2016-8129.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8129", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8129", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8130.json b/2016/8xxx/CVE-2016-8130.json index 4a59c64d199..33fabec0a87 100644 --- a/2016/8xxx/CVE-2016-8130.json +++ b/2016/8xxx/CVE-2016-8130.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8130", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8130", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8131.json b/2016/8xxx/CVE-2016-8131.json index 29a76660979..36f6272dc38 100644 --- a/2016/8xxx/CVE-2016-8131.json +++ b/2016/8xxx/CVE-2016-8131.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8131", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8131", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8132.json b/2016/8xxx/CVE-2016-8132.json index 68b20c7bdf0..3e76cc3708f 100644 --- a/2016/8xxx/CVE-2016-8132.json +++ b/2016/8xxx/CVE-2016-8132.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8132", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8132", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8133.json b/2016/8xxx/CVE-2016-8133.json index 9fb66ccc5b6..abecb16378c 100644 --- a/2016/8xxx/CVE-2016-8133.json +++ b/2016/8xxx/CVE-2016-8133.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8133", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8133", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8134.json b/2016/8xxx/CVE-2016-8134.json index 2b715b50dd3..7f696d7c50b 100644 --- a/2016/8xxx/CVE-2016-8134.json +++ b/2016/8xxx/CVE-2016-8134.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8134", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8134", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8135.json b/2016/8xxx/CVE-2016-8135.json index 23567be50a0..706608ca774 100644 --- a/2016/8xxx/CVE-2016-8135.json +++ b/2016/8xxx/CVE-2016-8135.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8135", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8135", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8136.json b/2016/8xxx/CVE-2016-8136.json index 72765333a9b..8d2ba2d72e0 100644 --- a/2016/8xxx/CVE-2016-8136.json +++ b/2016/8xxx/CVE-2016-8136.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8136", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8136", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8137.json b/2016/8xxx/CVE-2016-8137.json index 99d662b8949..97201ce5588 100644 --- a/2016/8xxx/CVE-2016-8137.json +++ b/2016/8xxx/CVE-2016-8137.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8137", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8137", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8138.json b/2016/8xxx/CVE-2016-8138.json index 63b3f84f644..474692b658c 100644 --- a/2016/8xxx/CVE-2016-8138.json +++ b/2016/8xxx/CVE-2016-8138.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8138", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8138", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8139.json b/2016/8xxx/CVE-2016-8139.json index df9be96a12d..8290222b031 100644 --- a/2016/8xxx/CVE-2016-8139.json +++ b/2016/8xxx/CVE-2016-8139.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8139", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8139", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8140.json b/2016/8xxx/CVE-2016-8140.json index a8af6b82e0b..e6a08ffe0a3 100644 --- a/2016/8xxx/CVE-2016-8140.json +++ b/2016/8xxx/CVE-2016-8140.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8140", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8140", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8141.json b/2016/8xxx/CVE-2016-8141.json index 67b73d8ab04..2efdbe8a092 100644 --- a/2016/8xxx/CVE-2016-8141.json +++ b/2016/8xxx/CVE-2016-8141.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8141", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8141", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8142.json b/2016/8xxx/CVE-2016-8142.json index adf9051db51..506027fc5c2 100644 --- a/2016/8xxx/CVE-2016-8142.json +++ b/2016/8xxx/CVE-2016-8142.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8142", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8142", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8143.json b/2016/8xxx/CVE-2016-8143.json index eb0aec746ac..bdd49537002 100644 --- a/2016/8xxx/CVE-2016-8143.json +++ b/2016/8xxx/CVE-2016-8143.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8143", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8143", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8144.json b/2016/8xxx/CVE-2016-8144.json index 383fb5b5377..b8eb69a1753 100644 --- a/2016/8xxx/CVE-2016-8144.json +++ b/2016/8xxx/CVE-2016-8144.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8144", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8144", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8145.json b/2016/8xxx/CVE-2016-8145.json index b191a4ca588..0673bd212d2 100644 --- a/2016/8xxx/CVE-2016-8145.json +++ b/2016/8xxx/CVE-2016-8145.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8145", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8145", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8146.json b/2016/8xxx/CVE-2016-8146.json index fac6d94508e..e36b34ede13 100644 --- a/2016/8xxx/CVE-2016-8146.json +++ b/2016/8xxx/CVE-2016-8146.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8146", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8146", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8147.json b/2016/8xxx/CVE-2016-8147.json index 5b223dc8bc3..59bc936636c 100644 --- a/2016/8xxx/CVE-2016-8147.json +++ b/2016/8xxx/CVE-2016-8147.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8147", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8147", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8148.json b/2016/8xxx/CVE-2016-8148.json index b9e735f7d2d..7350501beba 100644 --- a/2016/8xxx/CVE-2016-8148.json +++ b/2016/8xxx/CVE-2016-8148.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8148", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8148", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8149.json b/2016/8xxx/CVE-2016-8149.json index 76732da94ee..ba8accb2865 100644 --- a/2016/8xxx/CVE-2016-8149.json +++ b/2016/8xxx/CVE-2016-8149.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8149", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8149", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8150.json b/2016/8xxx/CVE-2016-8150.json index 26c957edb29..cd648410f2c 100644 --- a/2016/8xxx/CVE-2016-8150.json +++ b/2016/8xxx/CVE-2016-8150.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8150", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8150", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8151.json b/2016/8xxx/CVE-2016-8151.json index 4a601b03a6e..7f57cdebe57 100644 --- a/2016/8xxx/CVE-2016-8151.json +++ b/2016/8xxx/CVE-2016-8151.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8151", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8151", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8152.json b/2016/8xxx/CVE-2016-8152.json index b43ec5d0bb5..954dc882e3d 100644 --- a/2016/8xxx/CVE-2016-8152.json +++ b/2016/8xxx/CVE-2016-8152.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8152", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8152", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8153.json b/2016/8xxx/CVE-2016-8153.json index 1b3d888c364..98697250e1b 100644 --- a/2016/8xxx/CVE-2016-8153.json +++ b/2016/8xxx/CVE-2016-8153.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8153", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8153", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8154.json b/2016/8xxx/CVE-2016-8154.json index 633e6ab673c..18d1e30bcbe 100644 --- a/2016/8xxx/CVE-2016-8154.json +++ b/2016/8xxx/CVE-2016-8154.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8154", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8154", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8155.json b/2016/8xxx/CVE-2016-8155.json index 0004dad8039..821c4960757 100644 --- a/2016/8xxx/CVE-2016-8155.json +++ b/2016/8xxx/CVE-2016-8155.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8155", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8155", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8156.json b/2016/8xxx/CVE-2016-8156.json index 6e58ce578dc..a31e497078d 100644 --- a/2016/8xxx/CVE-2016-8156.json +++ b/2016/8xxx/CVE-2016-8156.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8156", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8156", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8157.json b/2016/8xxx/CVE-2016-8157.json index 6a4b87ea70c..ad75f401834 100644 --- a/2016/8xxx/CVE-2016-8157.json +++ b/2016/8xxx/CVE-2016-8157.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8157", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8157", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8158.json b/2016/8xxx/CVE-2016-8158.json index b26637e57c7..6349a2041f8 100644 --- a/2016/8xxx/CVE-2016-8158.json +++ b/2016/8xxx/CVE-2016-8158.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8158", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8158", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8159.json b/2016/8xxx/CVE-2016-8159.json index ce7c379c472..83c3067ac68 100644 --- a/2016/8xxx/CVE-2016-8159.json +++ b/2016/8xxx/CVE-2016-8159.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8159", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8159", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2016/8xxx/CVE-2016-8160.json b/2016/8xxx/CVE-2016-8160.json index 9b311996ccb..b3ee34263b6 100644 --- a/2016/8xxx/CVE-2016-8160.json +++ b/2016/8xxx/CVE-2016-8160.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2016-8160", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8160", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } diff --git a/2021/23xxx/CVE-2021-23968.json b/2021/23xxx/CVE-2021-23968.json index 3b5b8ed89e8..aa1fef10d2c 100644 --- a/2021/23xxx/CVE-2021-23968.json +++ b/2021/23xxx/CVE-2021-23968.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4866", + "url": "https://www.debian.org/security/2021/dsa-4866" } ] }, diff --git a/2021/23xxx/CVE-2021-23969.json b/2021/23xxx/CVE-2021-23969.json index 6a98bceec4b..7e9255b7615 100644 --- a/2021/23xxx/CVE-2021-23969.json +++ b/2021/23xxx/CVE-2021-23969.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4866", + "url": "https://www.debian.org/security/2021/dsa-4866" } ] }, diff --git a/2021/23xxx/CVE-2021-23973.json b/2021/23xxx/CVE-2021-23973.json index 25b492ac906..bf5243adb84 100644 --- a/2021/23xxx/CVE-2021-23973.json +++ b/2021/23xxx/CVE-2021-23973.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4866", + "url": "https://www.debian.org/security/2021/dsa-4866" } ] }, diff --git a/2021/23xxx/CVE-2021-23978.json b/2021/23xxx/CVE-2021-23978.json index a69120baa3a..ec46b151e6b 100644 --- a/2021/23xxx/CVE-2021-23978.json +++ b/2021/23xxx/CVE-2021-23978.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210301 [SECURITY] [DLA 2578-1] thunderbird security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4866", + "url": "https://www.debian.org/security/2021/dsa-4866" } ] }, diff --git a/2021/27xxx/CVE-2021-27885.json b/2021/27xxx/CVE-2021-27885.json new file mode 100644 index 00000000000..3d19af7af8a --- /dev/null +++ b/2021/27xxx/CVE-2021-27885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27886.json b/2021/27xxx/CVE-2021-27886.json new file mode 100644 index 00000000000..5f49a3538df --- /dev/null +++ b/2021/27xxx/CVE-2021-27886.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27886", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/rakibtg/docker-web-gui/issues/23", + "refsource": "MISC", + "name": "https://github.com/rakibtg/docker-web-gui/issues/23" + }, + { + "url": "https://github.com/rakibtg/docker-web-gui/commit/79cdc41809f2030fce21a1109898bd79e4190661", + "refsource": "MISC", + "name": "https://github.com/rakibtg/docker-web-gui/commit/79cdc41809f2030fce21a1109898bd79e4190661" + }, + { + "url": "https://www.docker.com/legal/trademark-guidelines", + "refsource": "MISC", + "name": "https://www.docker.com/legal/trademark-guidelines" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27887.json b/2021/27xxx/CVE-2021-27887.json new file mode 100644 index 00000000000..fac61e1343f --- /dev/null +++ b/2021/27xxx/CVE-2021-27887.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27887", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 5f873bf812897accad8e3aa2b12694e265d2df14 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 01:00:41 +0000 Subject: [PATCH 026/845] "-Synchronized-Data." --- 2021/25xxx/CVE-2021-25306.json | 56 ++++++++++++++++++++++++++---- 2021/25xxx/CVE-2021-25309.json | 56 ++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27804.json | 61 +++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27888.json | 62 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27889.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27890.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27891.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27892.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27893.json | 18 ++++++++++ 9 files changed, 307 insertions(+), 18 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27888.json create mode 100644 2021/27xxx/CVE-2021-27889.json create mode 100644 2021/27xxx/CVE-2021-27890.json create mode 100644 2021/27xxx/CVE-2021-27891.json create mode 100644 2021/27xxx/CVE-2021-27892.json create mode 100644 2021/27xxx/CVE-2021-27893.json diff --git a/2021/25xxx/CVE-2021-25306.json b/2021/25xxx/CVE-2021-25306.json index e8a52225cf4..1a8a0ca8fc3 100644 --- a/2021/25xxx/CVE-2021-25306.json +++ b/2021/25xxx/CVE-2021-25306.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25306", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25306", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in the AT command interface of Gigaset DX600A v41.00-175 devices allows remote attackers to force a device reboot by sending relatively long AT commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/", + "url": "https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/" } ] } diff --git a/2021/25xxx/CVE-2021-25309.json b/2021/25xxx/CVE-2021-25309.json index 7e15c7a525d..f73846504cf 100644 --- a/2021/25xxx/CVE-2021-25309.json +++ b/2021/25xxx/CVE-2021-25309.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-25309", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-25309", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The telnet administrator service running on port 650 on Gigaset DX600A v41.00-175 devices does not implement any lockout or throttling functionality. This situation (together with the weak password policy that forces a 4-digit password) allows remote attackers to easily obtain administrative access via brute-force attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/", + "url": "https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/" } ] } diff --git a/2021/27xxx/CVE-2021-27804.json b/2021/27xxx/CVE-2021-27804.json index 093ce712ca5..a80f76fcd97 100644 --- a/2021/27xxx/CVE-2021-27804.json +++ b/2021/27xxx/CVE-2021-27804.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27804", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27804", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/wg1/jpeg-xl/-/tags", + "refsource": "MISC", + "name": "https://gitlab.com/wg1/jpeg-xl/-/tags" + }, + { + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2021/03/01/3", + "url": "http://www.openwall.com/lists/oss-security/2021/03/01/3" } ] } diff --git a/2021/27xxx/CVE-2021-27888.json b/2021/27xxx/CVE-2021-27888.json new file mode 100644 index 00000000000..461d7eb1507 --- /dev/null +++ b/2021/27xxx/CVE-2021-27888.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27888", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zend.to/changelog.php", + "refsource": "MISC", + "name": "https://zend.to/changelog.php" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27889.json b/2021/27xxx/CVE-2021-27889.json new file mode 100644 index 00000000000..196bdcfd6b8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27890.json b/2021/27xxx/CVE-2021-27890.json new file mode 100644 index 00000000000..c2b8b0c3b22 --- /dev/null +++ b/2021/27xxx/CVE-2021-27890.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27890", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27891.json b/2021/27xxx/CVE-2021-27891.json new file mode 100644 index 00000000000..6492a44eabc --- /dev/null +++ b/2021/27xxx/CVE-2021-27891.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27891", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27892.json b/2021/27xxx/CVE-2021-27892.json new file mode 100644 index 00000000000..126f36251d1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27892.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27892", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27893.json b/2021/27xxx/CVE-2021-27893.json new file mode 100644 index 00000000000..c6d6701cc2c --- /dev/null +++ b/2021/27xxx/CVE-2021-27893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 6c8dab90f70c2555dd26df8d741ea626d59725d4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 01:00:56 +0000 Subject: [PATCH 027/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27731.json | 56 ++++++++++++++++++++++++++++++---- 1 file changed, 50 insertions(+), 6 deletions(-) diff --git a/2021/27xxx/CVE-2021-27731.json b/2021/27xxx/CVE-2021-27731.json index 88195d3d557..4ab84225cfc 100644 --- a/2021/27xxx/CVE-2021-27731.json +++ b/2021/27xxx/CVE-2021-27731.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27731", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27731", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Accellion FTA 9_12_432 and earlier is affected by stored XSS via a crafted POST request to a user endpoint. The fixed version is FTA_9_12_444 and later." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27731.txt", + "refsource": "MISC", + "name": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27731.txt" } ] } From 3bd76ecdae6a8fb3d958dda39387daeed0e85638 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 02:00:41 +0000 Subject: [PATCH 028/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27730.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27894.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27895.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27896.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27897.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27898.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27899.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27900.json | 18 +++++++++++ 8 files changed, 176 insertions(+), 6 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27894.json create mode 100644 2021/27xxx/CVE-2021-27895.json create mode 100644 2021/27xxx/CVE-2021-27896.json create mode 100644 2021/27xxx/CVE-2021-27897.json create mode 100644 2021/27xxx/CVE-2021-27898.json create mode 100644 2021/27xxx/CVE-2021-27899.json create mode 100644 2021/27xxx/CVE-2021-27900.json diff --git a/2021/27xxx/CVE-2021-27730.json b/2021/27xxx/CVE-2021-27730.json index 08c97e5248c..f5296a6a8aa 100644 --- a/2021/27xxx/CVE-2021-27730.json +++ b/2021/27xxx/CVE-2021-27730.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27730", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27730", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Accellion FTA 9_12_432 and earlier is affected by argument injection via a crafted POST request to an admin endpoint. The fixed version is FTA_9_12_444 and later." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27730.txt", + "refsource": "MISC", + "name": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27730.txt" } ] } diff --git a/2021/27xxx/CVE-2021-27894.json b/2021/27xxx/CVE-2021-27894.json new file mode 100644 index 00000000000..ba2f7e3bc4c --- /dev/null +++ b/2021/27xxx/CVE-2021-27894.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27894", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27895.json b/2021/27xxx/CVE-2021-27895.json new file mode 100644 index 00000000000..a97468b4b38 --- /dev/null +++ b/2021/27xxx/CVE-2021-27895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27896.json b/2021/27xxx/CVE-2021-27896.json new file mode 100644 index 00000000000..447cc30819e --- /dev/null +++ b/2021/27xxx/CVE-2021-27896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27897.json b/2021/27xxx/CVE-2021-27897.json new file mode 100644 index 00000000000..4f79974c837 --- /dev/null +++ b/2021/27xxx/CVE-2021-27897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27898.json b/2021/27xxx/CVE-2021-27898.json new file mode 100644 index 00000000000..915002ed022 --- /dev/null +++ b/2021/27xxx/CVE-2021-27898.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27898", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27899.json b/2021/27xxx/CVE-2021-27899.json new file mode 100644 index 00000000000..e143eb9e050 --- /dev/null +++ b/2021/27xxx/CVE-2021-27899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27900.json b/2021/27xxx/CVE-2021-27900.json new file mode 100644 index 00000000000..a5f353804b5 --- /dev/null +++ b/2021/27xxx/CVE-2021-27900.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27900", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 515d3a2979ffd85d2a26c16c824e906c362bb331 Mon Sep 17 00:00:00 2001 From: zero-24 Date: Tue, 2 Mar 2021 03:31:46 +0100 Subject: [PATCH 029/845] Joomla! 3.9.25 --- 2021/23xxx/CVE-2021-23126.json | 58 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23127.json | 58 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23128.json | 58 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23129.json | 58 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23130.json | 58 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23131.json | 58 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23132.json | 58 ++++++++++++++++++++++++++++++---- 2021/26xxx/CVE-2021-26027.json | 58 ++++++++++++++++++++++++++++++---- 2021/26xxx/CVE-2021-26028.json | 58 ++++++++++++++++++++++++++++++---- 2021/26xxx/CVE-2021-26029.json | 58 ++++++++++++++++++++++++++++++---- 10 files changed, 520 insertions(+), 60 deletions(-) diff --git a/2021/23xxx/CVE-2021-23126.json b/2021/23xxx/CVE-2021-23126.json index abfc9f6f683..863a397e6d8 100644 --- a/2021/23xxx/CVE-2021-23126.json +++ b/2021/23xxx/CVE-2021-23126.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23126", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210301] - Core - Insecure randomness within 2FA secret generation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.2.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of the insecure rand() function within the process of generating the 2FA secret." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Randomness" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html" } ] } diff --git a/2021/23xxx/CVE-2021-23127.json b/2021/23xxx/CVE-2021-23127.json index bc666fb9ac9..4bae47c0661 100644 --- a/2021/23xxx/CVE-2021-23127.json +++ b/2021/23xxx/CVE-2021-23127.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23127", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210301] - Core - Insecure randomness within 2FA secret generation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.2.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Randomness" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/841-20210301-core-insecure-randomness-within-2fa-secret-generation.html" } ] } diff --git a/2021/23xxx/CVE-2021-23128.json b/2021/23xxx/CVE-2021-23128.json index eb799c48923..dfa096fd89f 100644 --- a/2021/23xxx/CVE-2021-23128.json +++ b/2021/23xxx/CVE-2021-23128.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23128", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210302] - Core - Potential Insecure FOFEncryptRandval" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.2.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Randomness" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/842-20210302-core-potential-insecure-fofencryptrandval.html" } ] } diff --git a/2021/23xxx/CVE-2021-23129.json b/2021/23xxx/CVE-2021-23129.json index a5b28a7256d..23c79d0a621 100644 --- a/2021/23xxx/CVE-2021-23129.json +++ b/2021/23xxx/CVE-2021-23129.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23129", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210303] - Core - XSS within alert messages showed to users" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "2.5.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of messages showed to users that could lead to xss issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "XSS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/843-20210303-core-xss-within-alert-messages-showed-to-users.html" } ] } diff --git a/2021/23xxx/CVE-2021-23130.json b/2021/23xxx/CVE-2021-23130.json index fba3a693675..cb0d8163ea7 100644 --- a/2021/23xxx/CVE-2021-23130.json +++ b/2021/23xxx/CVE-2021-23130.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23130", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210304] - Core - XSS within the feed parser library" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "2.5.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of feed fields could lead to xss issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "XSS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html" } ] } diff --git a/2021/23xxx/CVE-2021-23131.json b/2021/23xxx/CVE-2021-23131.json index 2dd21287efb..c129e376186 100644 --- a/2021/23xxx/CVE-2021-23131.json +++ b/2021/23xxx/CVE-2021-23131.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23131", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210305] - Core - Input validation within the template manager" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.2.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.2.0 through 3.9.24. Missing input validation within the template manager." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/845-20210305-core-input-validation-within-the-template-manager.html" } ] } diff --git a/2021/23xxx/CVE-2021-23132.json b/2021/23xxx/CVE-2021-23132.json index 3943d904b17..94fbecf5927 100644 --- a/2021/23xxx/CVE-2021-23132.json +++ b/2021/23xxx/CVE-2021-23132.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-23132", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210306] - Core - com_media allowed paths that are not intended for image uploads" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.0.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.0.0 through 3.9.24. com_media allowed paths that are not intended for image uploads" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-intended-for-image-uploads.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-intended-for-image-uploads.html" } ] } diff --git a/2021/26xxx/CVE-2021-26027.json b/2021/26xxx/CVE-2021-26027.json index a8cf6ed2eee..7f712eea864 100644 --- a/2021/26xxx/CVE-2021-26027.json +++ b/2021/26xxx/CVE-2021-26027.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-26027", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210307] - Core - ACL violation within com_content frontend editing" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.0.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.0.0 through 3.9.24. Incorrect ACL checks could allow unauthorized change of the category for an article." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "ACL violation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/847-20210307-core-acl-violation-within-com-content-frontend-editing.html" } ] } diff --git a/2021/26xxx/CVE-2021-26028.json b/2021/26xxx/CVE-2021-26028.json index 93f50b99cc1..137dd99588e 100644 --- a/2021/26xxx/CVE-2021-26028.json +++ b/2021/26xxx/CVE-2021-26028.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-26028", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210308] - Core - Path Traversal within joomla/archive zip class" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "3.0.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html" } ] } diff --git a/2021/26xxx/CVE-2021-26029.json b/2021/26xxx/CVE-2021-26029.json index 8f28af716bf..2c035fc0ece 100644 --- a/2021/26xxx/CVE-2021-26029.json +++ b/2021/26xxx/CVE-2021-26029.json @@ -1,17 +1,63 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@joomla.org", "ID": "CVE-2021-26029", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "DATE_PUBLIC": "2021-03-02T16:00:00", + "STATE": "PUBLIC", + "TITLE": "[20210309] - Core - Inadequate filtering of form contents could allow to overwrite the author field" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Joomla! CMS", + "version": { + "version_data": [ + { + "version_value": "1.6.0-3.9.24" + } + ] + } + } + ] + }, + "vendor_name": "Joomla! Project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Joomla! 1.6.0 through 3.9.24. Inadequate filtering of form contents could allow to overwrite the author field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "ACL Violation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-form-contents-could-allow-to-overwrite-the-author-field.html", + "refsource": "MISC", + "name": "https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-form-contents-could-allow-to-overwrite-the-author-field.html" } ] } From 118637054fbf71a725bf0a5b730378cf00d05a5e Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 1 Mar 2021 19:41:10 -0700 Subject: [PATCH 030/845] Add CVE-2021-21320 for GHSA-52mq-6jcv-j79x --- 2021/21xxx/CVE-2021-21320.json | 92 +++++++++++++++++++++++++++++++--- 1 file changed, 86 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21320.json b/2021/21xxx/CVE-2021-21320.json index f4108f2e619..ee0c61155bd 100644 --- a/2021/21xxx/CVE-2021-21320.json +++ b/2021/21xxx/CVE-2021-21320.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21320", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "User content sandbox can be confused into opening arbitrary documents" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "matrix-react-sdk", + "version": { + "version_data": [ + { + "version_value": "< 3.15.0" + } + ] + } + } + ] + }, + "vendor_name": "matrix-org" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In matrix-react-sdk before version 3.15.0, the user content sandbox can be abused to trick users into opening unexpected documents. The content is opened with a `blob` origin that cannot access Matrix user data, so messages and secrets are not at risk. This has been fixed in version 3.15.0." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-345 Insufficient Verification of Data Authenticity" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-52mq-6jcv-j79x", + "refsource": "CONFIRM", + "url": "https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-52mq-6jcv-j79x" + }, + { + "name": "https://github.com/matrix-org/matrix-react-sdk/pull/5657", + "refsource": "MISC", + "url": "https://github.com/matrix-org/matrix-react-sdk/pull/5657" + }, + { + "name": "https://github.com/matrix-org/matrix-react-sdk/commit/b386f0c73b95ecbb6ea7f8f79c6ff5171a8dedd1", + "refsource": "MISC", + "url": "https://github.com/matrix-org/matrix-react-sdk/commit/b386f0c73b95ecbb6ea7f8f79c6ff5171a8dedd1" + }, + { + "name": "https://www.npmjs.com/package/matrix-react-sdk", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/matrix-react-sdk" + } + ] + }, + "source": { + "advisory": "GHSA-52mq-6jcv-j79x", + "discovery": "UNKNOWN" } } \ No newline at end of file From 8769af752dd26909c56fdf6a9c49253dfa49aa21 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 1 Mar 2021 20:29:38 -0700 Subject: [PATCH 031/845] Add CVE-2021-21321 for GHSA-qmw8-3v4g-gwj4 --- 2021/21xxx/CVE-2021-21321.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21321.json b/2021/21xxx/CVE-2021-21321.json index a5aa624add9..99e87603f78 100644 --- a/2021/21xxx/CVE-2021-21321.json +++ b/2021/21xxx/CVE-2021-21321.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21321", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Prefix escape" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "fastify-reply-from", + "version": { + "version_data": [ + { + "version_value": "< 4.0.2" + } + ] + } + } + ] + }, + "vendor_name": "fastify" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "fastify-reply-from is an npm package which is a fastify plugin to forward the current http request to another server. In fastify-reply-from before version 4.0.2, by crafting a specific URL, it is possible to escape the prefix of the proxied backend service.\nIf the base url of the proxied server is \"/pub/\", a user expect that accessing \"/priv\" on the target service would not be possible. In affected versions, it is possible. This is fixed in version 4.0.2." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 10, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4", + "refsource": "CONFIRM", + "url": "https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4" + }, + { + "name": "https://www.npmjs.com/package/fastify-reply-from", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/fastify-reply-from" + }, + { + "name": "https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889", + "refsource": "MISC", + "url": "https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889" + } + ] + }, + "source": { + "advisory": "GHSA-qmw8-3v4g-gwj4", + "discovery": "UNKNOWN" } } \ No newline at end of file From 6f86d962754584ae6c03d76dd225b5cccab4e0e5 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 1 Mar 2021 20:30:25 -0700 Subject: [PATCH 032/845] Add CVE-2021-21322 for GHSA-c4qr-gmr9-v23w --- 2021/21xxx/CVE-2021-21322.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21322.json b/2021/21xxx/CVE-2021-21322.json index 0c0d166d175..19d7f825ff0 100644 --- a/2021/21xxx/CVE-2021-21322.json +++ b/2021/21xxx/CVE-2021-21322.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21322", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Prefix escape" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "fastify-http-proxy", + "version": { + "version_data": [ + { + "version_value": "< 4.3.1" + } + ] + } + } + ] + }, + "vendor_name": "fastify" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "fastify-http-proxy is an npm package which is a fastify plugin for proxying your http requests to another server, with hooks. By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. In affected versions, it is possible. This is fixed in version 4.3.1." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 10, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/fastify/fastify-http-proxy/security/advisories/GHSA-c4qr-gmr9-v23w", + "refsource": "CONFIRM", + "url": "https://github.com/fastify/fastify-http-proxy/security/advisories/GHSA-c4qr-gmr9-v23w" + }, + { + "name": "https://www.npmjs.com/package/fastify-http-proxy", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/fastify-http-proxy" + }, + { + "name": "https://github.com/fastify/fastify-http-proxy/commit/02d9b43c770aa16bc44470edecfaeb7c17985016", + "refsource": "MISC", + "url": "https://github.com/fastify/fastify-http-proxy/commit/02d9b43c770aa16bc44470edecfaeb7c17985016" + } + ] + }, + "source": { + "advisory": "GHSA-c4qr-gmr9-v23w", + "discovery": "UNKNOWN" } } \ No newline at end of file From 8f597d1b6022b45c32dea53f6e75f79ea02a5767 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 04:00:44 +0000 Subject: [PATCH 033/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21321.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/21xxx/CVE-2021-21321.json b/2021/21xxx/CVE-2021-21321.json index 99e87603f78..611f6603a8d 100644 --- a/2021/21xxx/CVE-2021-21321.json +++ b/2021/21xxx/CVE-2021-21321.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "fastify-reply-from is an npm package which is a fastify plugin to forward the current http request to another server. In fastify-reply-from before version 4.0.2, by crafting a specific URL, it is possible to escape the prefix of the proxied backend service.\nIf the base url of the proxied server is \"/pub/\", a user expect that accessing \"/priv\" on the target service would not be possible. In affected versions, it is possible. This is fixed in version 4.0.2." + "value": "fastify-reply-from is an npm package which is a fastify plugin to forward the current http request to another server. In fastify-reply-from before version 4.0.2, by crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is \"/pub/\", a user expect that accessing \"/priv\" on the target service would not be possible. In affected versions, it is possible. This is fixed in version 4.0.2." } ] }, From c1dfc1a0be113754e6c8f2a7fddc81b3d9863e68 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 05:00:45 +0000 Subject: [PATCH 034/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13957.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/13xxx/CVE-2020-13957.json b/2020/13xxx/CVE-2020-13957.json index cbf811d1be1..7292bab809f 100644 --- a/2020/13xxx/CVE-2020-13957.json +++ b/2020/13xxx/CVE-2020-13957.json @@ -143,6 +143,11 @@ "refsource": "MLIST", "name": "[bigtop-commits] 20210301 [bigtop] branch master updated: BIGTOP-3507: CVE-2020-13957 mitigation backport (#743)", "url": "https://lists.apache.org/thread.html/rb2f1c7fd3d3ea719dfac4706a80e6affddecae8663dda04e1335347f@%3Ccommits.bigtop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bigtop-dev] 20210301 [GitHub] [bigtop] JunHe77 commented on pull request #743: BIGTOP-3507: CVE-2020-13957 mitigation backport", + "url": "https://lists.apache.org/thread.html/r622a043c2890327f8a4aea16b131e8a7137a282a004614369fceb224@%3Cdev.bigtop.apache.org%3E" } ] }, From 864b062b50ab36ff6b697054252f57c783a1bbf9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 06:00:43 +0000 Subject: [PATCH 035/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++ 2020/17xxx/CVE-2020-17518.json | 5 +++ 2020/17xxx/CVE-2020-17519.json | 5 +++ 2020/1xxx/CVE-2020-1960.json | 5 +++ 2021/27xxx/CVE-2021-27901.json | 62 ++++++++++++++++++++++++++++++++++ 5 files changed, 82 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27901.json diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 98321532da3..5d2d5e52286 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -103,6 +103,11 @@ "refsource": "MLIST", "name": "[thrift-user] 20210224 Re: [SECURITY] CVE-2020-13949 Announcement", "url": "https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210301 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/17xxx/CVE-2020-17518.json b/2020/17xxx/CVE-2020-17518.json index 5bb6639cf02..7a70b5bd9e9 100644 --- a/2020/17xxx/CVE-2020-17518.json +++ b/2020/17xxx/CVE-2020-17518.json @@ -183,6 +183,11 @@ "refsource": "MLIST", "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E" } ] }, diff --git a/2020/17xxx/CVE-2020-17519.json b/2020/17xxx/CVE-2020-17519.json index a1d25dda376..7faac5b73c5 100644 --- a/2020/17xxx/CVE-2020-17519.json +++ b/2020/17xxx/CVE-2020-17519.json @@ -144,6 +144,11 @@ "refsource": "MLIST", "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E" } ] }, diff --git a/2020/1xxx/CVE-2020-1960.json b/2020/1xxx/CVE-2020-1960.json index dee053b554a..f3310b30d4d 100644 --- a/2020/1xxx/CVE-2020-1960.json +++ b/2020/1xxx/CVE-2020-1960.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[flink-issues] 20210107 [GitHub] [flink-web] rmetzger commented on a change in pull request #408: Add security page for Flink", "url": "https://lists.apache.org/thread.html/r663cf0d5c386bba2f562d45ad484d786151a84f0b95e45e2b0fb8e50@%3Cissues.flink.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E" } ] }, diff --git a/2021/27xxx/CVE-2021-27901.json b/2021/27xxx/CVE-2021-27901.json new file mode 100644 index 00000000000..b1fd5159c6a --- /dev/null +++ b/2021/27xxx/CVE-2021-27901.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27901", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on LG mobile devices with Android OS 11 software. They mishandle fingerprint recognition because local high beam mode (LHBM) does not function properly during bright illumination. The LG ID is LVE-SMP-210001 (March 2021)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lgsecurity.lge.com/", + "refsource": "MISC", + "name": "https://lgsecurity.lge.com/" + } + ] + } +} \ No newline at end of file From 56057388c515ab0baa46a8092901fedaf4730789 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 07:00:41 +0000 Subject: [PATCH 036/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27902.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27903.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27904.json | 62 ++++++++++++++++++++++++++++++++++ 3 files changed, 98 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27902.json create mode 100644 2021/27xxx/CVE-2021-27903.json create mode 100644 2021/27xxx/CVE-2021-27904.json diff --git a/2021/27xxx/CVE-2021-27902.json b/2021/27xxx/CVE-2021-27902.json new file mode 100644 index 00000000000..997d3890f7c --- /dev/null +++ b/2021/27xxx/CVE-2021-27902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27903.json b/2021/27xxx/CVE-2021-27903.json new file mode 100644 index 00000000000..7d4615d386c --- /dev/null +++ b/2021/27xxx/CVE-2021-27903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27904.json b/2021/27xxx/CVE-2021-27904.json new file mode 100644 index 00000000000..0ff5c070de1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27904.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27904", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in app/Model/SharingGroupServer.php in MISP 2.4.139. In the implementation of Sharing Groups, the \"all org\" flag sometimes provided view access to unintended actors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/MISP/MISP/commit/ca13fee271ad126832c88896776f3050a6c06e64", + "refsource": "MISC", + "name": "https://github.com/MISP/MISP/commit/ca13fee271ad126832c88896776f3050a6c06e64" + } + ] + } +} \ No newline at end of file From 6a568911bde57b605a62d94c5e9d9c681feefc2d Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Tue, 2 Mar 2021 08:55:26 +0000 Subject: [PATCH 037/845] Add Ambari CVE-2020-1936 --- 2020/1xxx/CVE-2020-1936.json | 76 ++++++++++++++++++++++++++++++++---- 1 file changed, 69 insertions(+), 7 deletions(-) diff --git a/2020/1xxx/CVE-2020-1936.json b/2020/1xxx/CVE-2020-1936.json index 533b31717c2..cb2525a634e 100644 --- a/2020/1xxx/CVE-2020-1936.json +++ b/2020/1xxx/CVE-2020-1936.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-1936", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored XSS in Apache Ambari" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Ambari", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Apache Ambari", + "version_value": "2.7.4" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Apache Ambari would like to thank Krzysztof Przybylski from STM Solutions" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E" + } + ] + }, + "source": { + "defect": [ + "AMBARI-25329" + ], + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From fc4d97553f9a58085a99e73e601b7e8ed367b11d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 09:00:49 +0000 Subject: [PATCH 038/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27905.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27905.json diff --git a/2021/27xxx/CVE-2021-27905.json b/2021/27xxx/CVE-2021-27905.json new file mode 100644 index 00000000000..31d0c8d8022 --- /dev/null +++ b/2021/27xxx/CVE-2021-27905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From e0bf812039e906c4a32d65b2a03821fb3004197c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 10:00:41 +0000 Subject: [PATCH 039/845] "-Synchronized-Data." --- 2020/1xxx/CVE-2020-1936.json | 9 +++++---- 2020/27xxx/CVE-2020-27218.json | 5 +++++ 2020/27xxx/CVE-2020-27223.json | 20 ++++++++++++++++++++ 3 files changed, 30 insertions(+), 4 deletions(-) diff --git a/2020/1xxx/CVE-2020-1936.json b/2020/1xxx/CVE-2020-1936.json index cb2525a634e..84834285072 100644 --- a/2020/1xxx/CVE-2020-1936.json +++ b/2020/1xxx/CVE-2020-1936.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4." + "value": "A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4." } ] }, @@ -66,8 +66,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E", + "name": "https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E" } ] }, @@ -77,4 +78,4 @@ ], "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27218.json b/2020/27xxx/CVE-2020-27218.json index a183fd6b10e..d2427e64177 100644 --- a/2020/27xxx/CVE-2020-27218.json +++ b/2020/27xxx/CVE-2020-27218.json @@ -607,6 +607,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", "url": "https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 3dca7ac0cbe..6abed6e28aa 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -79,6 +79,26 @@ "refsource": "MLIST", "name": "[karaf-user] 20210301 Re: Jetty security defect", "url": "https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-dev] 20210302 [jira] [Created] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr opened a new pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [jira] [Created] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E" } ] } From ef1281a298feceff54c2d3602992437154abf3a1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 11:00:41 +0000 Subject: [PATCH 040/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 5d2d5e52286..cf454136b0e 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -108,6 +108,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210301 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210302 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E" } ] }, From 3091108091c8a1a3116ec5cb3603348ee6cb31f3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 12:00:42 +0000 Subject: [PATCH 041/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27906.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27906.json diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json new file mode 100644 index 00000000000..c1a652bbeb2 --- /dev/null +++ b/2021/27xxx/CVE-2021-27906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 98dc52763d132609df414e9c8a760b8b1d7473e1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 13:00:48 +0000 Subject: [PATCH 042/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++ 2020/1xxx/CVE-2020-1936.json | 5 +++ 2020/25xxx/CVE-2020-25902.json | 61 ++++++++++++++++++++++++++++++---- 2021/25xxx/CVE-2021-25829.json | 5 +++ 2021/25xxx/CVE-2021-25830.json | 5 +++ 2021/25xxx/CVE-2021-25831.json | 5 +++ 2021/25xxx/CVE-2021-25832.json | 5 +++ 2021/25xxx/CVE-2021-25833.json | 5 +++ 8 files changed, 90 insertions(+), 6 deletions(-) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index cf454136b0e..c9eb7789a9c 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -113,6 +113,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210302 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210302 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/1xxx/CVE-2020-1936.json b/2020/1xxx/CVE-2020-1936.json index 84834285072..d602c826ab5 100644 --- a/2020/1xxx/CVE-2020-1936.json +++ b/2020/1xxx/CVE-2020-1936.json @@ -69,6 +69,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E", "name": "https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210301 CVE-2020-1936: Stored XSS in Apache Ambari", + "url": "http://www.openwall.com/lists/oss-security/2021/03/02/1" } ] }, diff --git a/2020/25xxx/CVE-2020-25902.json b/2020/25xxx/CVE-2020-25902.json index 7725168960b..ac6d71dfa18 100644 --- a/2020/25xxx/CVE-2020-25902.json +++ b/2020/25xxx/CVE-2020-25902.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25902", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25902", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Blackboard Collaborate Ultra 20.02 is affected by a cross-site scripting (XSS) vulnerability. The XSS payload will execute on the class room, which leads to stealing cookies from users who join the class." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.blackboard.com/teaching-learning/collaboration-web-conferencing/blackboard-collaborate", + "refsource": "MISC", + "name": "https://www.blackboard.com/teaching-learning/collaboration-web-conferencing/blackboard-collaborate" + }, + { + "refsource": "MISC", + "name": "https://github.com/Lawyer-1/Turki/blob/main/CVE-2020-25902.md", + "url": "https://github.com/Lawyer-1/Turki/blob/main/CVE-2020-25902.md" } ] } diff --git a/2021/25xxx/CVE-2021-25829.json b/2021/25xxx/CVE-2021-25829.json index c66d980c18c..2c37f52275f 100644 --- a/2021/25xxx/CVE-2021-25829.json +++ b/2021/25xxx/CVE-2021-25829.json @@ -96,6 +96,11 @@ "url": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Theme.h#L277", "refsource": "MISC", "name": "https://github.com/ONLYOFFICE/core/blob/c1e4a2ce33bdcfab29d670f5fdb10fc63cf5fd6a/ASCOfficePPTXFile/PPTXFormat/Theme.h#L277" + }, + { + "refsource": "MISC", + "name": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25829", + "url": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25829" } ] } diff --git a/2021/25xxx/CVE-2021-25830.json b/2021/25xxx/CVE-2021-25830.json index 6b798f557af..d17fe57b9b8 100644 --- a/2021/25xxx/CVE-2021-25830.json +++ b/2021/25xxx/CVE-2021-25830.json @@ -76,6 +76,11 @@ "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918", "refsource": "MISC", "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918" + }, + { + "refsource": "MISC", + "name": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830", + "url": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830" } ] } diff --git a/2021/25xxx/CVE-2021-25831.json b/2021/25xxx/CVE-2021-25831.json index 1fa9697e9a3..1c014121419 100644 --- a/2021/25xxx/CVE-2021-25831.json +++ b/2021/25xxx/CVE-2021-25831.json @@ -76,6 +76,11 @@ "url": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/Fills/BlipFill.cpp#L328", "refsource": "MISC", "name": "https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/Fills/BlipFill.cpp#L328" + }, + { + "refsource": "MISC", + "name": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25831", + "url": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25831" } ] } diff --git a/2021/25xxx/CVE-2021-25832.json b/2021/25xxx/CVE-2021-25832.json index 7db572c9393..ff2c3d6a667 100644 --- a/2021/25xxx/CVE-2021-25832.json +++ b/2021/25xxx/CVE-2021-25832.json @@ -81,6 +81,11 @@ "url": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L428", "refsource": "MISC", "name": "https://github.com/ONLYOFFICE/core/blob/v6.0.1.15/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L428" + }, + { + "refsource": "MISC", + "name": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25832", + "url": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25832" } ] } diff --git a/2021/25xxx/CVE-2021-25833.json b/2021/25xxx/CVE-2021-25833.json index cbfa4b98cbb..a7da757b97d 100644 --- a/2021/25xxx/CVE-2021-25833.json +++ b/2021/25xxx/CVE-2021-25833.json @@ -76,6 +76,11 @@ "url": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L283", "refsource": "MISC", "name": "https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L283" + }, + { + "refsource": "MISC", + "name": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833", + "url": "https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833" } ] } From 5650c745ed14df2c8201750714cce1c58f8f1cde Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 14:00:40 +0000 Subject: [PATCH 043/845] "-Synchronized-Data." --- 2017/15xxx/CVE-2017-15288.json | 10 ++++++++++ 2021/3xxx/CVE-2021-3420.json | 18 ++++++++++++++++++ 2 files changed, 28 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3420.json diff --git a/2017/15xxx/CVE-2017-15288.json b/2017/15xxx/CVE-2017-15288.json index 5678aa71dc6..879c1ab3a3d 100644 --- a/2017/15xxx/CVE-2017-15288.json +++ b/2017/15xxx/CVE-2017-15288.json @@ -131,6 +131,16 @@ "refsource": "MLIST", "name": "[kafka-dev] 20210215 [jira] [Resolved] (KAFKA-12325) Is Kafka affected by Scala security vulnerability (CVE-2017-15288)?", "url": "https://lists.apache.org/thread.html/r5a1418a4f5101f5af3fc14bf358c54f2c7200e6a3701de2e2f581e1b@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210215 [jira] [Resolved] (KAFKA-12325) Is Kafka affected by Scala security vulnerability (CVE-2017-15288)?", + "url": "https://lists.apache.org/thread.html/rf57e4d7211b30e51803911304f3b7b54393f7a4bd60bb0784c31eec1@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210302 [GitHub] [druid] abhishekagarwal87 opened a new pull request #10933: Suppress CVE-2017-15288 and upgrade bcprov-ext-jdk15on", + "url": "https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E" } ] } diff --git a/2021/3xxx/CVE-2021-3420.json b/2021/3xxx/CVE-2021-3420.json new file mode 100644 index 00000000000..dec2015be06 --- /dev/null +++ b/2021/3xxx/CVE-2021-3420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d44ffdad16b121be3dd67f984620e00da79277a4 Mon Sep 17 00:00:00 2001 From: DellEMCProductSecurity Date: Tue, 2 Mar 2021 10:54:08 -0500 Subject: [PATCH 044/845] Added 2 CVEs --- 2021/21xxx/CVE-2021-21513.json | 71 +++++++++++++++++++++++++++++----- 2021/21xxx/CVE-2021-21514.json | 71 +++++++++++++++++++++++++++++----- 2 files changed, 124 insertions(+), 18 deletions(-) diff --git a/2021/21xxx/CVE-2021-21513.json b/2021/21xxx/CVE-2021-21513.json index 60163c645b2..4bc5b416d47 100644 --- a/2021/21xxx/CVE-2021-21513.json +++ b/2021/21xxx/CVE-2021-21513.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21513", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-01", + "ID": "CVE-2021-21513", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Dell Open Manage Server Administrator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "9.5" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. \r\n\r\nA remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 8.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2021/21xxx/CVE-2021-21514.json b/2021/21xxx/CVE-2021-21514.json index da23ac21dea..6d88fe20f54 100644 --- a/2021/21xxx/CVE-2021-21514.json +++ b/2021/21xxx/CVE-2021-21514.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21514", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-01", + "ID": "CVE-2021-21514", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Dell Open Manage Server Administrator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "9.5" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 4.9, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities" } ] } From c7d8899e6f988eaad49f09b511340530c7df6c5c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 16:00:45 +0000 Subject: [PATCH 045/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2021/27xxx/CVE-2021-27907.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27908.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27909.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27910.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27911.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27912.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27913.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27914.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27915.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27916.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27917.json | 18 ++++++++++++++++++ 12 files changed, 203 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27907.json create mode 100644 2021/27xxx/CVE-2021-27908.json create mode 100644 2021/27xxx/CVE-2021-27909.json create mode 100644 2021/27xxx/CVE-2021-27910.json create mode 100644 2021/27xxx/CVE-2021-27911.json create mode 100644 2021/27xxx/CVE-2021-27912.json create mode 100644 2021/27xxx/CVE-2021-27913.json create mode 100644 2021/27xxx/CVE-2021-27914.json create mode 100644 2021/27xxx/CVE-2021-27915.json create mode 100644 2021/27xxx/CVE-2021-27916.json create mode 100644 2021/27xxx/CVE-2021-27917.json diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index c9eb7789a9c..d711264f090 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -118,6 +118,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210302 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210302 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2021/27xxx/CVE-2021-27907.json b/2021/27xxx/CVE-2021-27907.json new file mode 100644 index 00000000000..557f30650bb --- /dev/null +++ b/2021/27xxx/CVE-2021-27907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27908.json b/2021/27xxx/CVE-2021-27908.json new file mode 100644 index 00000000000..2ff9175fdae --- /dev/null +++ b/2021/27xxx/CVE-2021-27908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27909.json b/2021/27xxx/CVE-2021-27909.json new file mode 100644 index 00000000000..ca356479359 --- /dev/null +++ b/2021/27xxx/CVE-2021-27909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27910.json b/2021/27xxx/CVE-2021-27910.json new file mode 100644 index 00000000000..5c3083db85a --- /dev/null +++ b/2021/27xxx/CVE-2021-27910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27911.json b/2021/27xxx/CVE-2021-27911.json new file mode 100644 index 00000000000..a563097a19e --- /dev/null +++ b/2021/27xxx/CVE-2021-27911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27912.json b/2021/27xxx/CVE-2021-27912.json new file mode 100644 index 00000000000..644b77c6cb8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27913.json b/2021/27xxx/CVE-2021-27913.json new file mode 100644 index 00000000000..f083d0fa417 --- /dev/null +++ b/2021/27xxx/CVE-2021-27913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27914.json b/2021/27xxx/CVE-2021-27914.json new file mode 100644 index 00000000000..ce02e31cb9a --- /dev/null +++ b/2021/27xxx/CVE-2021-27914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27915.json b/2021/27xxx/CVE-2021-27915.json new file mode 100644 index 00000000000..bf17d559457 --- /dev/null +++ b/2021/27xxx/CVE-2021-27915.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27915", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27916.json b/2021/27xxx/CVE-2021-27916.json new file mode 100644 index 00000000000..25ae85421d5 --- /dev/null +++ b/2021/27xxx/CVE-2021-27916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27917.json b/2021/27xxx/CVE-2021-27917.json new file mode 100644 index 00000000000..3fa27ce68d3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27917.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27917", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 51adcee4a4433a5c0d7d77d33f5ebcc738537037 Mon Sep 17 00:00:00 2001 From: Jochen Becker Date: Tue, 2 Mar 2021 17:07:42 +0100 Subject: [PATCH 046/845] added CVE-2020-12527 - CVE-2020-12530 --- 2020/12xxx/CVE-2020-12527.json | 106 +++++++++++++++++++++++++++++++-- 2020/12xxx/CVE-2020-12528.json | 106 +++++++++++++++++++++++++++++++-- 2020/12xxx/CVE-2020-12529.json | 106 +++++++++++++++++++++++++++++++-- 2020/12xxx/CVE-2020-12530.json | 106 +++++++++++++++++++++++++++++++-- 4 files changed, 400 insertions(+), 24 deletions(-) diff --git a/2020/12xxx/CVE-2020-12527.json b/2020/12xxx/CVE-2020-12527.json index 21c57a82233..134f58fef03 100644 --- a/2020/12xxx/CVE-2020-12527.json +++ b/2020/12xxx/CVE-2020-12527.json @@ -1,18 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "info@cert.vde.com", + "DATE_PUBLIC": "2021-02-15T13:50:00.000Z", "ID": "CVE-2020-12527", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "mymbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + }, + { + "product_name": "mbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + } + ] + }, + "vendor_name": "MB connect line" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "OTORIO reported the vulnerabilities to MB connect line. CERT@VDE coordinated." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to interact with devices in the account he should not have access to." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://cert.vde.com/de-de/advisories/vde-2021-003", + "refsource": "CONFIRM", + "url": "https://cert.vde.com/de-de/advisories/vde-2021-003" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to v2.7.1" + } + ], + "source": { + "advisory": "VDE-2021-003", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12528.json b/2020/12xxx/CVE-2020-12528.json index 07fc7b4674a..4f02a608743 100644 --- a/2020/12xxx/CVE-2020-12528.json +++ b/2020/12xxx/CVE-2020-12528.json @@ -1,18 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "info@cert.vde.com", + "DATE_PUBLIC": "2021-02-15T13:50:00.000Z", "ID": "CVE-2020-12528", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "mymbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + }, + { + "product_name": "mbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + } + ] + }, + "vendor_name": "MB connect line" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "OTORIO reported the vulnerabilities to MB connect line. CERT@VDE coordinated." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://cert.vde.com/de-de/advisories/vde-2021-003", + "refsource": "CONFIRM", + "url": "https://cert.vde.com/de-de/advisories/vde-2021-003" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to v2.7.1" + } + ], + "source": { + "advisory": "VDE-2021-003", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12529.json b/2020/12xxx/CVE-2020-12529.json index a47bc61ef5a..79bec704c9b 100644 --- a/2020/12xxx/CVE-2020-12529.json +++ b/2020/12xxx/CVE-2020-12529.json @@ -1,18 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "info@cert.vde.com", + "DATE_PUBLIC": "2021-02-15T13:50:00.000Z", "ID": "CVE-2020-12529", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "mymbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + }, + { + "product_name": "mbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + } + ] + }, + "vendor_name": "MB connect line" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "OTORIO reported the vulnerabilities to MB connect line. CERT@VDE coordinated." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery (SSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://cert.vde.com/de-de/advisories/vde-2021-003", + "refsource": "CONFIRM", + "url": "https://cert.vde.com/de-de/advisories/vde-2021-003" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to v2.7.1" + } + ], + "source": { + "advisory": "VDE-2021-003", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12530.json b/2020/12xxx/CVE-2020-12530.json index 7c1c7926ae4..1c5f6c67afc 100644 --- a/2020/12xxx/CVE-2020-12530.json +++ b/2020/12xxx/CVE-2020-12530.json @@ -1,18 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "info@cert.vde.com", + "DATE_PUBLIC": "2021-02-15T13:50:00.000Z", "ID": "CVE-2020-12530", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "mymbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + }, + { + "product_name": "mbCONNECT24", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.6.2", + "version_value": "2.6.2" + } + ] + } + } + ] + }, + "vendor_name": "MB connect line" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "OTORIO reported the vulnerabilities to MB connect line. CERT@VDE coordinated." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://cert.vde.com/de-de/advisories/vde-2021-003", + "refsource": "CONFIRM", + "url": "https://cert.vde.com/de-de/advisories/vde-2021-003" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to v2.7.1" + } + ], + "source": { + "advisory": "VDE-2021-003", + "discovery": "EXTERNAL" } } \ No newline at end of file From 3529d6da22f45d458a468532e1e6f56445c10bda Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Tue, 2 Mar 2021 11:51:25 -0500 Subject: [PATCH 047/845] IBM20210302-115125 Added CVE-2020-4725, CVE-2020-4726, CVE-2020-4719 --- 2020/4xxx/CVE-2020-4719.json | 102 +++++++++++++++++++++++++++++------ 2020/4xxx/CVE-2020-4725.json | 102 +++++++++++++++++++++++++++++------ 2020/4xxx/CVE-2020-4726.json | 102 +++++++++++++++++++++++++++++------ 3 files changed, 261 insertions(+), 45 deletions(-) diff --git a/2020/4xxx/CVE-2020-4719.json b/2020/4xxx/CVE-2020-4719.json index 35817e73623..6b146c42ac8 100644 --- a/2020/4xxx/CVE-2020-4719.json +++ b/2020/4xxx/CVE-2020-4719.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4719", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta" : { + "ID" : "CVE-2020-4719", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-02-26T00:00:00" + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Bypass Security" + } + ] + } + ] + }, + "data_type" : "CVE", + "description" : { + "description_data" : [ + { + "value" : "The IBM Cloud APM 8.1.4 server will issue a DNS request to resolve any hostname specified in the Cloud Event Management Webhook URL configuration definition. This could enable an authenticated user with admin authorization to create DNS query strings that are not hostnames. IBM X-Force ID: 187861.", + "lang" : "eng" + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "Cloud APM", + "version" : { + "version_data" : [ + { + "version_value" : "8.1.4" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.ibm.com/support/pages/node/6417137", + "title" : "IBM Security Bulletin 6417137 (Cloud APM)", + "refsource" : "CONFIRM", + "name" : "https://www.ibm.com/support/pages/node/6417137" + }, + { + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187861", + "name" : "ibm-monitoring-cve20204719-sec-bypass (187861)", + "title" : "X-Force Vulnerability Report", + "refsource" : "XF" + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "UI" : "N", + "SCORE" : "4.900", + "PR" : "H", + "I" : "H", + "AV" : "N", + "A" : "N", + "S" : "U", + "C" : "N", + "AC" : "L" + }, + "TM" : { + "RL" : "O", + "RC" : "C", + "E" : "U" + } + } + }, + "data_version" : "4.0", + "data_format" : "MITRE" +} diff --git a/2020/4xxx/CVE-2020-4725.json b/2020/4xxx/CVE-2020-4725.json index aacd5bbb924..e41f6d4aa0d 100644 --- a/2020/4xxx/CVE-2020-4725.json +++ b/2020/4xxx/CVE-2020-4725.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4725", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "Cloud APM", + "version" : { + "version_data" : [ + { + "version_value" : "8.1.4" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Monitoring (IBM Cloud APM 8.1.4 ) could allow an authenticated user to modify HTML content by sending a specially crafted HTTP request to the APM UI, which could mislead another user. IBM X-Force ID: 187974." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Data Manipulation", + "lang" : "eng" + } + ] + } + ] + }, + "CVE_data_meta" : { + "STATE" : "PUBLIC", + "ID" : "CVE-2020-4725", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-02-26T00:00:00" + }, + "data_type" : "CVE", + "data_version" : "4.0", + "data_format" : "MITRE", + "references" : { + "reference_data" : [ + { + "url" : "https://www.ibm.com/support/pages/node/6417137", + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6417137 (Cloud APM)", + "name" : "https://www.ibm.com/support/pages/node/6417137" + }, + { + "title" : "X-Force Vulnerability Report", + "name" : "ibm-monitoring-cve20204725-content-spoofing (187974)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187974" + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "UI" : "N", + "I" : "L", + "AV" : "N", + "PR" : "L", + "SCORE" : "4.300", + "S" : "U", + "A" : "N", + "AC" : "L", + "C" : "N" + }, + "TM" : { + "RL" : "O", + "E" : "U", + "RC" : "C" + } + } + } +} diff --git a/2020/4xxx/CVE-2020-4726.json b/2020/4xxx/CVE-2020-4726.json index 9e8efdc3f0c..d349afa4d3f 100644 --- a/2020/4xxx/CVE-2020-4726.json +++ b/2020/4xxx/CVE-2020-4726.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4726", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "Cloud APM", + "version" : { + "version_data" : [ + { + "version_value" : "8.1.4" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The IBM Application Performance Monitoring UI (IBM Cloud APM 8.1.4) allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 187975." + } + ] + }, + "data_type" : "CVE", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + }, + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-02-26T00:00:00", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2020-4726", + "STATE" : "PUBLIC" + }, + "data_format" : "MITRE", + "data_version" : "4.0", + "impact" : { + "cvssv3" : { + "TM" : { + "RL" : "O", + "E" : "U", + "RC" : "C" + }, + "BM" : { + "UI" : "N", + "AV" : "L", + "I" : "N", + "PR" : "N", + "SCORE" : "4.000", + "S" : "U", + "A" : "N", + "AC" : "L", + "C" : "L" + } + } + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.ibm.com/support/pages/node/6417137", + "refsource" : "CONFIRM", + "name" : "https://www.ibm.com/support/pages/node/6417137", + "title" : "IBM Security Bulletin 6417137 (Cloud APM)" + }, + { + "name" : "ibm-monitoring-cve20204726-info-disc (187975)", + "refsource" : "XF", + "title" : "X-Force Vulnerability Report", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187975" + } + ] + } +} From 2dd6d1fd77beae1d8e6689831064247c717046a3 Mon Sep 17 00:00:00 2001 From: Dave Dugal Date: Tue, 2 Mar 2021 11:51:58 -0500 Subject: [PATCH 048/845] CVE-2021-0215 also affects Juniper Networks MX Series platform. --- 2021/0xxx/CVE-2021-0215.json | 28 ++++++++++++++-------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/2021/0xxx/CVE-2021-0215.json b/2021/0xxx/CVE-2021-0215.json index ee5b94c9647..3e264b77841 100644 --- a/2021/0xxx/CVE-2021-0215.json +++ b/2021/0xxx/CVE-2021-0215.json @@ -4,7 +4,7 @@ "DATE_PUBLIC": "2021-01-13T17:00:00.000Z", "ID": "CVE-2021-0215", "STATE": "PUBLIC", - "TITLE": "Junos OS: EX Series, QFX Series, SRX Branch Series: Memory leak in packet forwarding engine due to 802.1X authenticator port interface flaps" + "TITLE": "Junos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwarding engine due to 802.1X authenticator port interface flaps" }, "affects": { "vendor": { @@ -45,73 +45,73 @@ "version_value": "15.1X53-D593" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "16.1", "version_value": "16.1R7-S8" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "17.2", "version_value": "17.2R3-S4" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "17.3", "version_value": "17.3R3-S8" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "17.4", "version_value": "17.4R2-S11, 17.4R3-S2" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "18.1", "version_value": "18.1R3-S10" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "18.2", "version_value": "18.2R2-S7, 18.2R3-S3" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "18.3", "version_value": "18.3R2-S4, 18.3R3-S2" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "18.4", "version_value": "18.4R1-S7, 18.4R2-S4, 18.4R3-S2" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "19.1", "version_value": "19.1R1-S5, 19.1R2-S2, 19.1R3" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "19.2", "version_value": "19.2R1-S5, 19.2R2" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "19.3", "version_value": "19.3R2-S3, 19.3R3" }, { - "platform": "SRX Branch Series, EX Series, QFX Series", + "platform": "SRX Branch Series, EX Series, QFX Series, MX Series", "version_affected": "<", "version_name": "19.4", "version_value": "19.4R1-S2, 19.4R2" @@ -139,7 +139,7 @@ "description_data": [ { "lang": "eng", - "value": "On Juniper Networks Junos EX series, QFX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart. An administrator can use the following CLI command to monitor the status of memory consumption: user@device> show task memory detail Please refer to https://kb.juniper.net/KB31522 for details. This issue affects Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D54; 15.1X49 versions prior to 15.1X49-D240 ; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10 ; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2. This issue does not affect Juniper Networks Junos OS 12.3, 15.1." + "value": "On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart.\n\nAn administrator can use the following CLI command to monitor the status of memory consumption:\n user@device> show task memory detail\nPlease refer to https://kb.juniper.net/KB31522 for details.\n\n\nThis issue affects Juniper Networks Junos OS:\n14.1X53 versions prior to 14.1X53-D54;\n15.1X49 versions prior to 15.1X49-D240 ;\n15.1X53 versions prior to 15.1X53-D593;\n16.1 versions prior to 16.1R7-S8;\n17.2 versions prior to 17.2R3-S4;\n17.3 versions prior to 17.3R3-S8;\n17.4 versions prior to 17.4R2-S11, 17.4R3-S2;\n18.1 versions prior to 18.1R3-S10 ;\n18.2 versions prior to 18.2R2-S7, 18.2R3-S3;\n18.3 versions prior to 18.3R2-S4, 18.3R3-S2;\n18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2;\n19.1 versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3;\n19.2 versions prior to 19.2R1-S5, 19.2R2;\n19.3 versions prior to 19.3R2-S3, 19.3R3;\n19.4 versions prior to 19.4R1-S2, 19.4R2.\n\nThis issue does not affect Juniper Networks Junos OS 12.3, 15.1." } ] }, From 9bc6bc20478c3a3ef497a90e76161b2abaab9b8a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 17:00:45 +0000 Subject: [PATCH 049/845] "-Synchronized-Data." --- 2020/23xxx/CVE-2020-23518.json | 56 +++++++++-- 2020/28xxx/CVE-2020-28243.json | 5 + 2020/28xxx/CVE-2020-28972.json | 5 + 2020/35xxx/CVE-2020-35662.json | 5 + 2020/4xxx/CVE-2020-4719.json | 174 ++++++++++++++++---------------- 2020/4xxx/CVE-2020-4725.json | 176 ++++++++++++++++----------------- 2020/4xxx/CVE-2020-4726.json | 176 ++++++++++++++++----------------- 2021/21xxx/CVE-2021-21513.json | 45 ++++----- 2021/21xxx/CVE-2021-21514.json | 45 ++++----- 2021/25xxx/CVE-2021-25281.json | 5 + 2021/25xxx/CVE-2021-25282.json | 5 + 2021/25xxx/CVE-2021-25283.json | 5 + 2021/25xxx/CVE-2021-25284.json | 5 + 2021/3xxx/CVE-2021-3144.json | 5 + 2021/3xxx/CVE-2021-3148.json | 5 + 2021/3xxx/CVE-2021-3197.json | 5 + 16 files changed, 409 insertions(+), 313 deletions(-) diff --git a/2020/23xxx/CVE-2020-23518.json b/2020/23xxx/CVE-2020-23518.json index 4aaf2e67792..7e4189ba8de 100644 --- a/2020/23xxx/CVE-2020-23518.json +++ b/2020/23xxx/CVE-2020-23518.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23518", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23518", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in UltimateKode Neo Billing - Accounting, Invoicing And CRM Software up to version 3.5 which allows remote attackers to inject arbitrary web script or HTML." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/47289", + "url": "https://www.exploit-db.com/exploits/47289" } ] } diff --git a/2020/28xxx/CVE-2020-28243.json b/2020/28xxx/CVE-2020-28243.json index d59653fb3a5..798f5a7f865 100644 --- a/2020/28xxx/CVE-2020-28243.json +++ b/2020/28xxx/CVE-2020-28243.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://sec.stealthcopter.com/cve-2020-28243/", "url": "https://sec.stealthcopter.com/cve-2020-28243/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2020/28xxx/CVE-2020-28972.json b/2020/28xxx/CVE-2020-28972.json index 0accdad5848..ce858b00111 100644 --- a/2020/28xxx/CVE-2020-28972.json +++ b/2020/28xxx/CVE-2020-28972.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2020/35xxx/CVE-2020-35662.json b/2020/35xxx/CVE-2020-35662.json index 2331aea00fd..51fd335c9c0 100644 --- a/2020/35xxx/CVE-2020-35662.json +++ b/2020/35xxx/CVE-2020-35662.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] }, diff --git a/2020/4xxx/CVE-2020-4719.json b/2020/4xxx/CVE-2020-4719.json index 6b146c42ac8..a2e585a1c12 100644 --- a/2020/4xxx/CVE-2020-4719.json +++ b/2020/4xxx/CVE-2020-4719.json @@ -1,90 +1,90 @@ { - "CVE_data_meta" : { - "ID" : "CVE-2020-4719", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-02-26T00:00:00" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Bypass Security" - } - ] - } - ] - }, - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "value" : "The IBM Cloud APM 8.1.4 server will issue a DNS request to resolve any hostname specified in the Cloud Event Management Webhook URL configuration definition. This could enable an authenticated user with admin authorization to create DNS query strings that are not hostnames. IBM X-Force ID: 187861.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "CVE_data_meta": { + "ID": "CVE-2020-4719", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-02-26T00:00:00" + }, + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Cloud APM", - "version" : { - "version_data" : [ - { - "version_value" : "8.1.4" - } - ] - } - } - ] - } + "description": [ + { + "lang": "eng", + "value": "Bypass Security" + } + ] } - ] - } - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6417137", - "title" : "IBM Security Bulletin 6417137 (Cloud APM)", - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6417137" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187861", - "name" : "ibm-monitoring-cve20204719-sec-bypass (187861)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "UI" : "N", - "SCORE" : "4.900", - "PR" : "H", - "I" : "H", - "AV" : "N", - "A" : "N", - "S" : "U", - "C" : "N", - "AC" : "L" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "data_version" : "4.0", - "data_format" : "MITRE" -} + ] + }, + "data_type": "CVE", + "description": { + "description_data": [ + { + "value": "The IBM Cloud APM 8.1.4 server will issue a DNS request to resolve any hostname specified in the Cloud Event Management Webhook URL configuration definition. This could enable an authenticated user with admin authorization to create DNS query strings that are not hostnames. IBM X-Force ID: 187861.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cloud APM", + "version": { + "version_data": [ + { + "version_value": "8.1.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6417137", + "title": "IBM Security Bulletin 6417137 (Cloud APM)", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6417137" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/187861", + "name": "ibm-monitoring-cve20204719-sec-bypass (187861)", + "title": "X-Force Vulnerability Report", + "refsource": "XF" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "UI": "N", + "SCORE": "4.900", + "PR": "H", + "I": "H", + "AV": "N", + "A": "N", + "S": "U", + "C": "N", + "AC": "L" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "data_version": "4.0", + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4725.json b/2020/4xxx/CVE-2020-4725.json index e41f6d4aa0d..6aa79015ee4 100644 --- a/2020/4xxx/CVE-2020-4725.json +++ b/2020/4xxx/CVE-2020-4725.json @@ -1,90 +1,90 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Cloud APM", - "version" : { - "version_data" : [ - { - "version_value" : "8.1.4" - } - ] - } - } - ] - } - } - ] - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Monitoring (IBM Cloud APM 8.1.4 ) could allow an authenticated user to modify HTML content by sending a specially crafted HTTP request to the APM UI, which could mislead another user. IBM X-Force ID: 187974." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Data Manipulation", - "lang" : "eng" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cloud APM", + "version": { + "version_data": [ + { + "version_value": "8.1.4" + } + ] + } + } + ] + } + } ] - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4725", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-02-26T00:00:00" - }, - "data_type" : "CVE", - "data_version" : "4.0", - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6417137", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6417137 (Cloud APM)", - "name" : "https://www.ibm.com/support/pages/node/6417137" - }, - { - "title" : "X-Force Vulnerability Report", - "name" : "ibm-monitoring-cve20204725-content-spoofing (187974)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187974" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "UI" : "N", - "I" : "L", - "AV" : "N", - "PR" : "L", - "SCORE" : "4.300", - "S" : "U", - "A" : "N", - "AC" : "L", - "C" : "N" - }, - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - } - } - } -} + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Monitoring (IBM Cloud APM 8.1.4 ) could allow an authenticated user to modify HTML content by sending a specially crafted HTTP request to the APM UI, which could mislead another user. IBM X-Force ID: 187974." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Data Manipulation", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2020-4725", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-02-26T00:00:00" + }, + "data_type": "CVE", + "data_version": "4.0", + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6417137", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6417137 (Cloud APM)", + "name": "https://www.ibm.com/support/pages/node/6417137" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-monitoring-cve20204725-content-spoofing (187974)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/187974" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "UI": "N", + "I": "L", + "AV": "N", + "PR": "L", + "SCORE": "4.300", + "S": "U", + "A": "N", + "AC": "L", + "C": "N" + }, + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + } + } + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4726.json b/2020/4xxx/CVE-2020-4726.json index d349afa4d3f..9dd262a8dd1 100644 --- a/2020/4xxx/CVE-2020-4726.json +++ b/2020/4xxx/CVE-2020-4726.json @@ -1,90 +1,90 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Cloud APM", - "version" : { - "version_data" : [ - { - "version_value" : "8.1.4" - } - ] - } - } - ] - } - } - ] - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The IBM Application Performance Monitoring UI (IBM Cloud APM 8.1.4) allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 187975." - } - ] - }, - "data_type" : "CVE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cloud APM", + "version": { + "version_data": [ + { + "version_value": "8.1.4" + } + ] + } + } + ] + } + } ] - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-02-26T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4726", - "STATE" : "PUBLIC" - }, - "data_format" : "MITRE", - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - }, - "BM" : { - "UI" : "N", - "AV" : "L", - "I" : "N", - "PR" : "N", - "SCORE" : "4.000", - "S" : "U", - "A" : "N", - "AC" : "L", - "C" : "L" - } - } - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6417137", - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6417137", - "title" : "IBM Security Bulletin 6417137 (Cloud APM)" - }, - { - "name" : "ibm-monitoring-cve20204726-info-disc (187975)", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187975" - } - ] - } -} + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The IBM Application Performance Monitoring UI (IBM Cloud APM 8.1.4) allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 187975." + } + ] + }, + "data_type": "CVE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-02-26T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4726", + "STATE": "PUBLIC" + }, + "data_format": "MITRE", + "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "UI": "N", + "AV": "L", + "I": "N", + "PR": "N", + "SCORE": "4.000", + "S": "U", + "A": "N", + "AC": "L", + "C": "L" + } + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6417137", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6417137", + "title": "IBM Security Bulletin 6417137 (Cloud APM)" + }, + { + "name": "ibm-monitoring-cve20204726-info-disc (187975)", + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/187975" + } + ] + } +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21513.json b/2021/21xxx/CVE-2021-21513.json index 4bc5b416d47..9c19228cfdd 100644 --- a/2021/21xxx/CVE-2021-21513.json +++ b/2021/21xxx/CVE-2021-21513.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-03-01", - "ID": "CVE-2021-21513", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-01", + "ID": "CVE-2021-21513", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Dell Open Manage Server Administrator", + "product_name": "Dell Open Manage Server Administrator", "version": { "version_data": [ { - "version_affected": "<=", + "version_affected": "<=", "version_value": "9.5" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. \r\n\r\nA remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system." + "lang": "eng", + "value": "Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system." } ] - }, + }, "impact": { "cvss": { - "baseScore": 8.6, - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities", + "name": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2021/21xxx/CVE-2021-21514.json b/2021/21xxx/CVE-2021-21514.json index 6d88fe20f54..1f7ecc6feb6 100644 --- a/2021/21xxx/CVE-2021-21514.json +++ b/2021/21xxx/CVE-2021-21514.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-03-01", - "ID": "CVE-2021-21514", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-01", + "ID": "CVE-2021-21514", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Dell Open Manage Server Administrator", + "product_name": "Dell Open Manage Server Administrator", "version": { "version_data": [ { - "version_affected": "<=", + "version_affected": "<=", "version_value": "9.5" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request." + "lang": "eng", + "value": "Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request." } ] - }, + }, "impact": { "cvss": { - "baseScore": 4.9, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities", + "name": "https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2021/25xxx/CVE-2021-25281.json b/2021/25xxx/CVE-2021-25281.json index eb92071476f..94dd729b78f 100644 --- a/2021/25xxx/CVE-2021-25281.json +++ b/2021/25xxx/CVE-2021-25281.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2021/25xxx/CVE-2021-25282.json b/2021/25xxx/CVE-2021-25282.json index 5342a712859..792888aa672 100644 --- a/2021/25xxx/CVE-2021-25282.json +++ b/2021/25xxx/CVE-2021-25282.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2021/25xxx/CVE-2021-25283.json b/2021/25xxx/CVE-2021-25283.json index a87e793e1c8..87bc31a81af 100644 --- a/2021/25xxx/CVE-2021-25283.json +++ b/2021/25xxx/CVE-2021-25283.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2021/25xxx/CVE-2021-25284.json b/2021/25xxx/CVE-2021-25284.json index eed735718af..8c4d4754d19 100644 --- a/2021/25xxx/CVE-2021-25284.json +++ b/2021/25xxx/CVE-2021-25284.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2021/3xxx/CVE-2021-3144.json b/2021/3xxx/CVE-2021-3144.json index 674a1e2419c..3c3444826a3 100644 --- a/2021/3xxx/CVE-2021-3144.json +++ b/2021/3xxx/CVE-2021-3144.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2021/3xxx/CVE-2021-3148.json b/2021/3xxx/CVE-2021-3148.json index 40900bedb40..2c60b7c6f3f 100644 --- a/2021/3xxx/CVE-2021-3148.json +++ b/2021/3xxx/CVE-2021-3148.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } diff --git a/2021/3xxx/CVE-2021-3197.json b/2021/3xxx/CVE-2021-3197.json index 5095bb00aef..46cdaf2eb9e 100644 --- a/2021/3xxx/CVE-2021-3197.json +++ b/2021/3xxx/CVE-2021-3197.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/", "url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-904a2dbc0c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" } ] } From 7fb6a6fd7388230b7d2266633b06b33a88217fdc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 18:00:44 +0000 Subject: [PATCH 050/845] "-Synchronized-Data." --- 2020/25xxx/CVE-2020-25787.json | 5 +++ 2020/27xxx/CVE-2020-27216.json | 10 ++++++ 2020/28xxx/CVE-2020-28243.json | 5 +++ 2020/28xxx/CVE-2020-28972.json | 5 +++ 2020/35xxx/CVE-2020-35662.json | 5 +++ 2021/25xxx/CVE-2021-25281.json | 5 +++ 2021/25xxx/CVE-2021-25282.json | 5 +++ 2021/25xxx/CVE-2021-25283.json | 5 +++ 2021/25xxx/CVE-2021-25284.json | 5 +++ 2021/25xxx/CVE-2021-25330.json | 50 ++++++++++++++++++++++++++++-- 2021/25xxx/CVE-2021-25758.json | 2 +- 2021/27xxx/CVE-2021-27803.json | 5 +++ 2021/3xxx/CVE-2021-3144.json | 5 +++ 2021/3xxx/CVE-2021-3148.json | 5 +++ 2021/3xxx/CVE-2021-3197.json | 5 +++ 2021/3xxx/CVE-2021-3291.json | 5 +++ 2021/3xxx/CVE-2021-3384.json | 56 ++++++++++++++++++++++++++++++---- 17 files changed, 173 insertions(+), 10 deletions(-) diff --git a/2020/25xxx/CVE-2020-25787.json b/2020/25xxx/CVE-2020-25787.json index 8f35380ffa2..40aebbb5bde 100644 --- a/2020/25xxx/CVE-2020-25787.json +++ b/2020/25xxx/CVE-2020-25787.json @@ -61,6 +61,11 @@ "url": "https://community.tt-rss.org/t/heads-up-several-vulnerabilities-fixed/3799", "refsource": "MISC", "name": "https://community.tt-rss.org/t/heads-up-several-vulnerabilities-fixed/3799" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161606/TinyTinyRSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161606/TinyTinyRSS-Remote-Code-Execution.html" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 2fe1e23f2ef..7948cb6e653 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -355,6 +355,16 @@ "refsource": "MLIST", "name": "[beam-issues] 20210223 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210302 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210302 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/28xxx/CVE-2020-28243.json b/2020/28xxx/CVE-2020-28243.json index 798f5a7f865..fbfa9195565 100644 --- a/2020/28xxx/CVE-2020-28243.json +++ b/2020/28xxx/CVE-2020-28243.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2020/28xxx/CVE-2020-28972.json b/2020/28xxx/CVE-2020-28972.json index ce858b00111..38321041188 100644 --- a/2020/28xxx/CVE-2020-28972.json +++ b/2020/28xxx/CVE-2020-28972.json @@ -61,6 +61,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2020/35xxx/CVE-2020-35662.json b/2020/35xxx/CVE-2020-35662.json index 51fd335c9c0..0bf6944280b 100644 --- a/2020/35xxx/CVE-2020-35662.json +++ b/2020/35xxx/CVE-2020-35662.json @@ -61,6 +61,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] }, diff --git a/2021/25xxx/CVE-2021-25281.json b/2021/25xxx/CVE-2021-25281.json index 94dd729b78f..2bddf8ee10b 100644 --- a/2021/25xxx/CVE-2021-25281.json +++ b/2021/25xxx/CVE-2021-25281.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/25xxx/CVE-2021-25282.json b/2021/25xxx/CVE-2021-25282.json index 792888aa672..410aca23bbe 100644 --- a/2021/25xxx/CVE-2021-25282.json +++ b/2021/25xxx/CVE-2021-25282.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/25xxx/CVE-2021-25283.json b/2021/25xxx/CVE-2021-25283.json index 87bc31a81af..895ed10535a 100644 --- a/2021/25xxx/CVE-2021-25283.json +++ b/2021/25xxx/CVE-2021-25283.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/25xxx/CVE-2021-25284.json b/2021/25xxx/CVE-2021-25284.json index 8c4d4754d19..f22e14df102 100644 --- a/2021/25xxx/CVE-2021-25284.json +++ b/2021/25xxx/CVE-2021-25284.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/25xxx/CVE-2021-25330.json b/2021/25xxx/CVE-2021-25330.json index f78770c796d..d77164406e6 100644 --- a/2021/25xxx/CVE-2021-25330.json +++ b/2021/25xxx/CVE-2021-25330.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-25330", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "mobile.security@samsung.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_value": "Selected Q(10.0) prior to SMR Feb-2021 Release 1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Control of Generation of Code ('Code Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Calling of non-existent provider in MobileWips application prior to SMR Feb-2021 Release 1 allows unauthorized actions including denial of service attack by hijacking the provider." } ] } diff --git a/2021/25xxx/CVE-2021-25758.json b/2021/25xxx/CVE-2021-25758.json index 93016f75bba..1bb26de6483 100644 --- a/2021/25xxx/CVE-2021-25758.json +++ b/2021/25xxx/CVE-2021-25758.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to code execution." + "value": "In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution." } ] }, diff --git a/2021/27xxx/CVE-2021-27803.json b/2021/27xxx/CVE-2021-27803.json index e48f7c4003a..ad05141c36d 100644 --- a/2021/27xxx/CVE-2021-27803.json +++ b/2021/27xxx/CVE-2021-27803.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210227 Re: wpa_supplicant P2P provision discovery processing vulnerability", "url": "http://www.openwall.com/lists/oss-security/2021/02/27/1" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-3430f96019", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/" } ] } diff --git a/2021/3xxx/CVE-2021-3144.json b/2021/3xxx/CVE-2021-3144.json index 3c3444826a3..df2f7750d83 100644 --- a/2021/3xxx/CVE-2021-3144.json +++ b/2021/3xxx/CVE-2021-3144.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/3xxx/CVE-2021-3148.json b/2021/3xxx/CVE-2021-3148.json index 2c60b7c6f3f..1eb576b7ad1 100644 --- a/2021/3xxx/CVE-2021-3148.json +++ b/2021/3xxx/CVE-2021-3148.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/3xxx/CVE-2021-3197.json b/2021/3xxx/CVE-2021-3197.json index 46cdaf2eb9e..bc15ade03cb 100644 --- a/2021/3xxx/CVE-2021-3197.json +++ b/2021/3xxx/CVE-2021-3197.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-904a2dbc0c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5756fbf8a6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/" } ] } diff --git a/2021/3xxx/CVE-2021-3291.json b/2021/3xxx/CVE-2021-3291.json index 815e6befcf0..a8ddf503105 100644 --- a/2021/3xxx/CVE-2021-3291.json +++ b/2021/3xxx/CVE-2021-3291.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/MucahitSaratar/zencart_auth_rce_poc", "url": "https://github.com/MucahitSaratar/zencart_auth_rce_poc" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html" } ] } diff --git a/2021/3xxx/CVE-2021-3384.json b/2021/3xxx/CVE-2021-3384.json index c134aa681d6..8ef4dc2eae7 100644 --- a/2021/3xxx/CVE-2021-3384.json +++ b/2021/3xxx/CVE-2021-3384.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3384", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3384", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in Stormshield Network Security could allow an attacker to trigger a protection related to ARP/NDP tables management, which would temporarily prevent the system to contact new hosts via IPv4 or IPv6. This affects versions 2.0.0 to 2.7.7, 2.8.0 to 2.16.0, 3.0.0 to 3.7.16, 3.8.0 to 3.11.4, and 4.0.0 to 4.1.5. Fixed in versions 2.7.8, 3.7.17, 3.11.5, and 4.2.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://advisories.stormshield.eu/2020-049/", + "url": "https://advisories.stormshield.eu/2020-049/" } ] } From 50e9677357bae14ecc5ca0c65b9504a265feed1a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 19:00:41 +0000 Subject: [PATCH 051/845] "-Synchronized-Data." --- 2020/28xxx/CVE-2020-28657.json | 56 +++++++++++++++++++++--- 2021/22xxx/CVE-2021-22187.json | 79 ++++++++++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22294.json | 50 +++++++++++++++++++-- 2021/22xxx/CVE-2021-22296.json | 50 +++++++++++++++++++-- 2021/27xxx/CVE-2021-27804.json | 5 +++ 2021/27xxx/CVE-2021-27885.json | 61 +++++++++++++++++++++++--- 6 files changed, 279 insertions(+), 22 deletions(-) diff --git a/2020/28xxx/CVE-2020-28657.json b/2020/28xxx/CVE-2020-28657.json index f6b41c60d68..a33d7dcf689 100644 --- a/2020/28xxx/CVE-2020-28657.json +++ b/2020/28xxx/CVE-2020-28657.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28657", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28657", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In bPanel 2.0, the administrative ajax endpoints (aka ajax/aj_*.php) are accessible without authentication and allow SQL injections, which could lead to platform compromise." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-28657", + "url": "https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-28657" } ] } diff --git a/2021/22xxx/CVE-2021-22187.json b/2021/22xxx/CVE-2021-22187.json index cf0fc9900fb..f960623cde1 100644 --- a/2021/22xxx/CVE-2021-22187.json +++ b/2021/22xxx/CVE-2021-22187.json @@ -4,15 +4,86 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22187", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": "<=X.Y" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/300452", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/300452", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22187.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22187.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 12.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22294.json b/2021/22xxx/CVE-2021-22294.json index beeabe3b912..91bb2916911 100644 --- a/2021/22xxx/CVE-2021-22294.json +++ b/2021/22xxx/CVE-2021-22294.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22294", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_value": "HarmonyOS 2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authentication Bypass by Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", + "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources." } ] } diff --git a/2021/22xxx/CVE-2021-22296.json b/2021/22xxx/CVE-2021-22296.json index 4e82a6134ea..97d71b89cbe 100644 --- a/2021/22xxx/CVE-2021-22296.json +++ b/2021/22xxx/CVE-2021-22296.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22296", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_value": "HarmonyOS 2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Attempt to Access Child of a Non-structure Pointer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", + "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A component of the HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." } ] } diff --git a/2021/27xxx/CVE-2021-27804.json b/2021/27xxx/CVE-2021-27804.json index a80f76fcd97..de1fe305978 100644 --- a/2021/27xxx/CVE-2021-27804.json +++ b/2021/27xxx/CVE-2021-27804.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2021/03/01/3", "url": "http://www.openwall.com/lists/oss-security/2021/03/01/3" + }, + { + "refsource": "FULLDISC", + "name": "20210302 Multiple Vulnerabilities in jpeg-xl (CVE-2021-27804)", + "url": "http://seclists.org/fulldisclosure/2021/Mar/2" } ] } diff --git a/2021/27xxx/CVE-2021-27885.json b/2021/27xxx/CVE-2021-27885.json index 3d19af7af8a..d1b3a47c50f 100644 --- a/2021/27xxx/CVE-2021-27885.json +++ b/2021/27xxx/CVE-2021-27885.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27885", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27885", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "usersettings.php in e107 through 2.3.0 lacks a certain e_TOKEN protection mechanism." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/e107inc/e107/releases", + "refsource": "MISC", + "name": "https://github.com/e107inc/e107/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/e107inc/e107/commit/d9efdb9b5f424b4996c276e754a380a5e251f472", + "url": "https://github.com/e107inc/e107/commit/d9efdb9b5f424b4996c276e754a380a5e251f472" } ] } From b6387b6ffbdf1882455e9524b4b27c1b6f52f6c7 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 2 Mar 2021 12:39:05 -0700 Subject: [PATCH 052/845] Add CVE-2021-21255 for GHSA-v3m5-r3mx-ff9j --- 2021/21xxx/CVE-2021-21255.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21255.json b/2021/21xxx/CVE-2021-21255.json index 9df1979fed1..a1ed5ec80a3 100644 --- a/2021/21xxx/CVE-2021-21255.json +++ b/2021/21xxx/CVE-2021-21255.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21255", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "entities switch IDOR" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "= 9.5.3" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI version 9.5.3, it was possible to switch entities with IDOR from a logged in user. This is fixed in version 9.5.4." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j" + }, + { + "name": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" + } + ] + }, + "source": { + "advisory": "GHSA-v3m5-r3mx-ff9j", + "discovery": "UNKNOWN" } } \ No newline at end of file From 1011e9ab1fe1feb5bfab7a80ee1baed641a00682 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 2 Mar 2021 12:40:40 -0700 Subject: [PATCH 053/845] Add CVE-2021-21258 for GHSA-j4xj-4qmc-mmmx --- 2021/21xxx/CVE-2021-21258.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21258.json b/2021/21xxx/CVE-2021-21258.json index 9fd3368de42..03aba590a02 100644 --- a/2021/21xxx/CVE-2021-21258.json +++ b/2021/21xxx/CVE-2021-21258.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21258", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "XSS injection in ajax/kanban" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": ">= 9.5.0, < 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI from version 9.5.0 and before version 9.5.4, there is a cross-site scripting injection vulnerability when using ajax/kanban.php. This is fixed in version 9.5.4." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx" + }, + { + "name": "https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15" + } + ] + }, + "source": { + "advisory": "GHSA-j4xj-4qmc-mmmx", + "discovery": "UNKNOWN" } } \ No newline at end of file From a28875feb7d543cf8f595b833df93dbf90d6fe1f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 21:00:43 +0000 Subject: [PATCH 054/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 6abed6e28aa..aef0c1fa815 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -99,6 +99,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210302 [jira] [Created] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210302 [GitHub] [druid] a2l007 opened a new pull request #10937: Upgrade jetty to latest version", + "url": "https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E" } ] } From bbdd3b89c8c6318c69f48b71621d4284aa1206b1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Mar 2021 22:00:44 +0000 Subject: [PATCH 055/845] "-Synchronized-Data." --- 2020/15xxx/CVE-2020-15705.json | 5 +++++ 2021/0xxx/CVE-2021-0215.json | 2 +- 2021/21xxx/CVE-2021-21311.json | 5 +++++ 2021/23xxx/CVE-2021-23840.json | 5 +++++ 2021/23xxx/CVE-2021-23841.json | 5 +++++ 5 files changed, 21 insertions(+), 1 deletion(-) diff --git a/2020/15xxx/CVE-2020-15705.json b/2020/15xxx/CVE-2020-15705.json index 494d3e2cd24..3f7dff66f8a 100644 --- a/2020/15xxx/CVE-2020-15705.json +++ b/2020/15xxx/CVE-2020-15705.json @@ -170,6 +170,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1282", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210302 Multiple GRUB2 vulnerabilities", + "url": "http://www.openwall.com/lists/oss-security/2021/03/02/3" } ] }, diff --git a/2021/0xxx/CVE-2021-0215.json b/2021/0xxx/CVE-2021-0215.json index 3e264b77841..4474c80e9d1 100644 --- a/2021/0xxx/CVE-2021-0215.json +++ b/2021/0xxx/CVE-2021-0215.json @@ -139,7 +139,7 @@ "description_data": [ { "lang": "eng", - "value": "On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart.\n\nAn administrator can use the following CLI command to monitor the status of memory consumption:\n user@device> show task memory detail\nPlease refer to https://kb.juniper.net/KB31522 for details.\n\n\nThis issue affects Juniper Networks Junos OS:\n14.1X53 versions prior to 14.1X53-D54;\n15.1X49 versions prior to 15.1X49-D240 ;\n15.1X53 versions prior to 15.1X53-D593;\n16.1 versions prior to 16.1R7-S8;\n17.2 versions prior to 17.2R3-S4;\n17.3 versions prior to 17.3R3-S8;\n17.4 versions prior to 17.4R2-S11, 17.4R3-S2;\n18.1 versions prior to 18.1R3-S10 ;\n18.2 versions prior to 18.2R2-S7, 18.2R3-S3;\n18.3 versions prior to 18.3R2-S4, 18.3R3-S2;\n18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2;\n19.1 versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3;\n19.2 versions prior to 19.2R1-S5, 19.2R2;\n19.3 versions prior to 19.3R2-S3, 19.3R3;\n19.4 versions prior to 19.4R1-S2, 19.4R2.\n\nThis issue does not affect Juniper Networks Junos OS 12.3, 15.1." + "value": "On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart. An administrator can use the following CLI command to monitor the status of memory consumption: user@device> show task memory detail Please refer to https://kb.juniper.net/KB31522 for details. This issue affects Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D54; 15.1X49 versions prior to 15.1X49-D240 ; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10 ; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2. This issue does not affect Juniper Networks Junos OS 12.3, 15.1." } ] }, diff --git a/2021/21xxx/CVE-2021-21311.json b/2021/21xxx/CVE-2021-21311.json index 7cdd4eaf92e..114684c8ae1 100644 --- a/2021/21xxx/CVE-2021-21311.json +++ b/2021/21xxx/CVE-2021-21311.json @@ -88,6 +88,11 @@ "name": "https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351", "refsource": "MISC", "url": "https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210302 [SECURITY] [DLA 2580-1] adminer security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23840.json b/2021/23xxx/CVE-2021-23840.json index 913005865fa..ec5432b0a38 100644 --- a/2021/23xxx/CVE-2021-23840.json +++ b/2021/23xxx/CVE-2021-23840.json @@ -94,6 +94,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-03", + "url": "https://www.tenable.com/security/tns-2021-03" } ] } diff --git a/2021/23xxx/CVE-2021-23841.json b/2021/23xxx/CVE-2021-23841.json index 19be2c06627..f825046ad84 100644 --- a/2021/23xxx/CVE-2021-23841.json +++ b/2021/23xxx/CVE-2021-23841.json @@ -94,6 +94,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-03", + "url": "https://www.tenable.com/security/tns-2021-03" } ] } From 9b455912d46ca078a644dfaa45b58b9315437f46 Mon Sep 17 00:00:00 2001 From: jpattrendmicro Date: Tue, 2 Mar 2021 15:35:49 -0800 Subject: [PATCH 056/845] Resubmitting Trend Micro 03022021 With corrected characters --- 2021/25xxx/CVE-2021-25252.json | 76 ++++++++++++++++++++++++++-------- 1 file changed, 59 insertions(+), 17 deletions(-) diff --git a/2021/25xxx/CVE-2021-25252.json b/2021/25xxx/CVE-2021-25252.json index 8be85103bbd..9b9c19be32e 100644 --- a/2021/25xxx/CVE-2021-25252.json +++ b/2021/25xxx/CVE-2021-25252.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25252", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta" : { + "ASSIGNER" : "security@trendmicro.com", + "ID" : "CVE-2021-25252", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Trend Micro Virus Scan API (VSAPI) Engine\r\n", + "version" : { + "version_data" : [ + { + "version_value" : "12.0" + } + ] + } + } + ] + }, + "vendor_name" : "Trend Micro" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Memory Exhaustion" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://success.trendmicro.com/solution/000285675" + } + ] + } +} From 153e72879f96a83bdeda1ed1c440e1ff768e6457 Mon Sep 17 00:00:00 2001 From: MSRC Date: Tue, 2 Mar 2021 15:51:14 -0800 Subject: [PATCH 057/845] March 2021 Out Of Band --- 2021/26xxx/CVE-2021-26412.json | 114 +++++++++++++++++++++++++----- 2021/26xxx/CVE-2021-26854.json | 114 +++++++++++++++++++++++++----- 2021/26xxx/CVE-2021-26855.json | 114 +++++++++++++++++++++++++----- 2021/26xxx/CVE-2021-26857.json | 124 ++++++++++++++++++++++++++++----- 2021/26xxx/CVE-2021-26858.json | 114 +++++++++++++++++++++++++----- 2021/27xxx/CVE-2021-27065.json | 114 +++++++++++++++++++++++++----- 2021/27xxx/CVE-2021-27078.json | 114 +++++++++++++++++++++++++----- 7 files changed, 696 insertions(+), 112 deletions(-) diff --git a/2021/26xxx/CVE-2021-26412.json b/2021/26xxx/CVE-2021-26412.json index e6ef8c8fb7d..4f95353c453 100644 --- a/2021/26xxx/CVE-2021-26412.json +++ b/2021/26xxx/CVE-2021-26412.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26412", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26412", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26854.json b/2021/26xxx/CVE-2021-26854.json index 07fe67dc645..801847427b6 100644 --- a/2021/26xxx/CVE-2021-26854.json +++ b/2021/26xxx/CVE-2021-26854.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26854", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26854", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26855.json b/2021/26xxx/CVE-2021-26855.json index 1ee0e40eea6..6bb72b1ae5b 100644 --- a/2021/26xxx/CVE-2021-26855.json +++ b/2021/26xxx/CVE-2021-26855.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26855", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26855", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26857.json b/2021/26xxx/CVE-2021-26857.json index 3b2c96c332f..bb6e0d854ea 100644 --- a/2021/26xxx/CVE-2021-26857.json +++ b/2021/26xxx/CVE-2021-26857.json @@ -1,18 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26857", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26857", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server", + "version": { + "version_data": [ + { + "version_value": "2010 Service Pack 3" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26858.json b/2021/26xxx/CVE-2021-26858.json index c86dd90eed1..d06aa7b439e 100644 --- a/2021/26xxx/CVE-2021-26858.json +++ b/2021/26xxx/CVE-2021-26858.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26858", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26858", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27065.json b/2021/27xxx/CVE-2021-27065.json index 3e692cf77fd..cf0afd5fb1a 100644 --- a/2021/27xxx/CVE-2021-27065.json +++ b/2021/27xxx/CVE-2021-27065.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27065", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27065", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27078.json b/2021/27xxx/CVE-2021-27078.json index c6aaa350b48..d20a2f9c2d1 100644 --- a/2021/27xxx/CVE-2021-27078.json +++ b/2021/27xxx/CVE-2021-27078.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27078", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27078", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" + } + ] + } +} From a0f0e917cc85d965e3289e751bb06202c50dab78 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 00:00:45 +0000 Subject: [PATCH 058/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 5 + 2021/26xxx/CVE-2021-26412.json | 192 ++++++++++++++--------------- 2021/26xxx/CVE-2021-26854.json | 192 ++++++++++++++--------------- 2021/26xxx/CVE-2021-26855.json | 192 ++++++++++++++--------------- 2021/26xxx/CVE-2021-26857.json | 212 +++++++++++++++++---------------- 2021/26xxx/CVE-2021-26858.json | 192 ++++++++++++++--------------- 2021/27xxx/CVE-2021-27065.json | 192 ++++++++++++++--------------- 2021/27xxx/CVE-2021-27078.json | 192 ++++++++++++++--------------- 2021/27xxx/CVE-2021-27803.json | 5 + 9 files changed, 699 insertions(+), 675 deletions(-) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index aef0c1fa815..62262632688 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -104,6 +104,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20210302 [GitHub] [druid] a2l007 opened a new pull request #10937: Upgrade jetty to latest version", "url": "https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] ableegoldman commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E" } ] } diff --git a/2021/26xxx/CVE-2021-26412.json b/2021/26xxx/CVE-2021-26412.json index 4f95353c453..cac5e81202e 100644 --- a/2021/26xxx/CVE-2021-26412.json +++ b/2021/26xxx/CVE-2021-26412.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26412", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26412", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26854.json b/2021/26xxx/CVE-2021-26854.json index 801847427b6..4abaa3b27cf 100644 --- a/2021/26xxx/CVE-2021-26854.json +++ b/2021/26xxx/CVE-2021-26854.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26854", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26854", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26855.json b/2021/26xxx/CVE-2021-26855.json index 6bb72b1ae5b..e48881925d7 100644 --- a/2021/26xxx/CVE-2021-26855.json +++ b/2021/26xxx/CVE-2021-26855.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26855", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26855", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26857.json b/2021/26xxx/CVE-2021-26857.json index bb6e0d854ea..948b7dfaaf1 100644 --- a/2021/26xxx/CVE-2021-26857.json +++ b/2021/26xxx/CVE-2021-26857.json @@ -1,110 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26857", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26857", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server", + "version": { + "version_data": [ + { + "version_value": "2010 Service Pack 3" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server", - "version": { - "version_data": [ - { - "version_value": "2010 Service Pack 3" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26858.json b/2021/26xxx/CVE-2021-26858.json index d06aa7b439e..185fdbf8d3d 100644 --- a/2021/26xxx/CVE-2021-26858.json +++ b/2021/26xxx/CVE-2021-26858.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26858", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26858", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27065.json b/2021/27xxx/CVE-2021-27065.json index cf0afd5fb1a..86b8770111d 100644 --- a/2021/27xxx/CVE-2021-27065.json +++ b/2021/27xxx/CVE-2021-27065.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27065", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27065", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27078.json b/2021/27xxx/CVE-2021-27078.json index d20a2f9c2d1..0ef388118d5 100644 --- a/2021/27xxx/CVE-2021-27078.json +++ b/2021/27xxx/CVE-2021-27078.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27078", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27078", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27803.json b/2021/27xxx/CVE-2021-27803.json index ad05141c36d..82c6e921253 100644 --- a/2021/27xxx/CVE-2021-27803.json +++ b/2021/27xxx/CVE-2021-27803.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-3430f96019", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210302 [SECURITY] [DLA 2581-1] wpa security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00003.html" } ] } From 0a6e0469f8e1eea3c817638a1befddea6234593e Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 2 Mar 2021 17:18:04 -0700 Subject: [PATCH 059/845] Add CVE-2021-21352 for GHSA-43c9-rx4h-4gqq --- 2021/21xxx/CVE-2021-21352.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21352.json b/2021/21xxx/CVE-2021-21352.json index b3174c751f2..81509bebe19 100644 --- a/2021/21xxx/CVE-2021-21352.json +++ b/2021/21xxx/CVE-2021-21352.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21352", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Predictable tokens used for password resets" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "timetracker", + "version": { + "version_data": [ + { + "version_value": "< 1.19.24.5415" + } + ] + } + } + ] + }, + "vendor_name": "anuko" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing)." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-330: Use of Insufficiently Random Values" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/anuko/timetracker/security/advisories/GHSA-43c9-rx4h-4gqq", + "refsource": "CONFIRM", + "url": "https://github.com/anuko/timetracker/security/advisories/GHSA-43c9-rx4h-4gqq" + }, + { + "name": "https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5", + "refsource": "MISC", + "url": "https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5" + }, + { + "name": "https://www.anuko.com/time-tracker/index.htm", + "refsource": "MISC", + "url": "https://www.anuko.com/time-tracker/index.htm" + } + ] + }, + "source": { + "advisory": "GHSA-43c9-rx4h-4gqq", + "discovery": "UNKNOWN" } } \ No newline at end of file From 2a7480f33815ba721de959a615d341ad5a647b45 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 01:00:48 +0000 Subject: [PATCH 060/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21352.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/2021/21xxx/CVE-2021-21352.json b/2021/21xxx/CVE-2021-21352.json index 81509bebe19..a5b0c6de407 100644 --- a/2021/21xxx/CVE-2021-21352.json +++ b/2021/21xxx/CVE-2021-21352.json @@ -69,6 +69,11 @@ }, "references": { "reference_data": [ + { + "name": "https://www.anuko.com/time-tracker/index.htm", + "refsource": "MISC", + "url": "https://www.anuko.com/time-tracker/index.htm" + }, { "name": "https://github.com/anuko/timetracker/security/advisories/GHSA-43c9-rx4h-4gqq", "refsource": "CONFIRM", @@ -78,11 +83,6 @@ "name": "https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5", "refsource": "MISC", "url": "https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5" - }, - { - "name": "https://www.anuko.com/time-tracker/index.htm", - "refsource": "MISC", - "url": "https://www.anuko.com/time-tracker/index.htm" } ] }, From 56bd293f4b73d12c13e474fa6a103926933e62d4 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 2 Mar 2021 18:46:08 -0700 Subject: [PATCH 061/845] Add CVE-2021-21353 for GHSA-p493-635q-r6gr --- 2021/21xxx/CVE-2021-21353.json | 107 +++++++++++++++++++++++++++++++-- 1 file changed, 101 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21353.json b/2021/21xxx/CVE-2021-21353.json index fe488986c0d..6db0e25688a 100644 --- a/2021/21xxx/CVE-2021-21353.json +++ b/2021/21xxx/CVE-2021-21353.json @@ -1,18 +1,113 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21353", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Remote code execution in pug" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "pug", + "version": { + "version_data": [ + { + "version_value": "< 3.0.1" + } + ] + } + } + ] + }, + "vendor_name": "pugjs" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr", + "refsource": "CONFIRM", + "url": "https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr" + }, + { + "name": "https://github.com/pugjs/pug/issues/3312", + "refsource": "MISC", + "url": "https://github.com/pugjs/pug/issues/3312" + }, + { + "name": "https://github.com/pugjs/pug/pull/3314", + "refsource": "MISC", + "url": "https://github.com/pugjs/pug/pull/3314" + }, + { + "name": "https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0", + "refsource": "MISC", + "url": "https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0" + }, + { + "name": "https://github.com/pugjs/pug/releases/tag/pug%403.0.1", + "refsource": "MISC", + "url": "https://github.com/pugjs/pug/releases/tag/pug%403.0.1" + }, + { + "name": "https://www.npmjs.com/package/pug", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/pug" + }, + { + "name": "https://www.npmjs.com/package/pug-code-gen", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/pug-code-gen" + } + ] + }, + "source": { + "advisory": "GHSA-p493-635q-r6gr", + "discovery": "UNKNOWN" } } \ No newline at end of file From 6c415956e9b70571c2201d79a78ef6b6fe15d29f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 02:00:44 +0000 Subject: [PATCH 062/845] "-Synchronized-Data." --- 2017/15xxx/CVE-2017-15288.json | 5 +++++ 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2020/13xxx/CVE-2020-13956.json | 5 +++++ 2021/21xxx/CVE-2021-21353.json | 2 +- 4 files changed, 16 insertions(+), 1 deletion(-) diff --git a/2017/15xxx/CVE-2017-15288.json b/2017/15xxx/CVE-2017-15288.json index 879c1ab3a3d..d25d1d6d320 100644 --- a/2017/15xxx/CVE-2017-15288.json +++ b/2017/15xxx/CVE-2017-15288.json @@ -141,6 +141,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20210302 [GitHub] [druid] abhishekagarwal87 opened a new pull request #10933: Suppress CVE-2017-15288 and upgrade bcprov-ext-jdk15on", "url": "https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210302 [GitHub] [druid] maytasm merged pull request #10933: Suppress CVE-2017-15288 and upgrade bcprov-ext-jdk15on", + "url": "https://lists.apache.org/thread.html/r1d51eae81ceb7bfd1780936a48b460ab31d53ff2ed526a88a7f60fe4@%3Ccommits.druid.apache.org%3E" } ] } diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index d711264f090..bf5f198cffc 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -123,6 +123,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210302 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210302 [GitHub] [hbase] Apache9 commented on a change in pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 77c6c5e12ac..05d3a0398e0 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -113,6 +113,11 @@ "refsource": "MLIST", "name": "[hive-issues] 20210301 [jira] [Work logged] (HIVE-24837) Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", "url": "https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-gitbox] 20210302 [GitHub] [hive] hsnusonic closed pull request #2032: HIVE-24837 Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21353.json b/2021/21xxx/CVE-2021-21353.json index 6db0e25688a..e21347ceefc 100644 --- a/2021/21xxx/CVE-2021-21353.json +++ b/2021/21xxx/CVE-2021-21353.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade." + "value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade." } ] }, From 29ee8556f589a21e3089a56b1e325eaa901ed132 Mon Sep 17 00:00:00 2001 From: Brent Johnson Date: Tue, 2 Mar 2021 19:09:23 -0800 Subject: [PATCH 063/845] Add CVEs for GHES releases 03-02-2021 --- 2020/10xxx/CVE-2020-10519.json | 103 +++++++++++++++++++++++++----- 2021/22xxx/CVE-2021-22861.json | 112 ++++++++++++++++++++++++++++----- 2021/22xxx/CVE-2021-22862.json | 85 ++++++++++++++++++++----- 2021/22xxx/CVE-2021-22863.json | 112 ++++++++++++++++++++++++++++----- 4 files changed, 352 insertions(+), 60 deletions(-) diff --git a/2020/10xxx/CVE-2020-10519.json b/2020/10xxx/CVE-2020-10519.json index d1a72ddf789..239b7a95761 100644 --- a/2020/10xxx/CVE-2020-10519.json +++ b/2020/10xxx/CVE-2020-10519.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-10519", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2020-10519", + "STATE": "PUBLIC", + "TITLE": "Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.20", + "version_value": "2.20.24" + }, + { + "version_affected": "<", + "version_name": "2.21", + "version_value": "2.21.15" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.7" + } + ] + } + } + ] + }, + "vendor_name": "GitHub" + } + ] } + }, + "credit": [ + { + "lang": "eng", + "value": "yvvdwf" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection - Generic" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22861.json b/2021/22xxx/CVE-2021-22861.json index efc8409ae94..717485650e4 100644 --- a/2021/22xxx/CVE-2021-22861.json +++ b/2021/22xxx/CVE-2021-22861.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-22861", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22861", + "STATE": "PUBLIC", + "TITLE": "Improper access control in GitHub Enterprise Server leading to unauthorized write access to forkable repositories" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.20", + "version_value": "2.20.24" + }, + { + "version_affected": "<", + "version_name": "2.21", + "version_value": "2.21.15" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.7" + }, + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.1" + } + ] + } + } + ] + }, + "vendor_name": "GitHub" + } + ] } + }, + "credit": [ + { + "lang": "eng", + "value": "Teddy Katz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted repository, a setting that is disabled by default for organization owned private repositories. Branch protections such as required pull request reviews or status checks would prevent unauthorized commits from being merged without further review or validation. This vulnerability affected all versions of GitHub Enterprise Server since 2.4.21 and was fixed in versions 2.20.24, 2.21.15, 2.22.7 and 3.0.1. This vulnerability was reported via the GitHub Bug Bounty program." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285 Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22862.json b/2021/22xxx/CVE-2021-22862.json index bbf0318a3dc..9afb0382796 100644 --- a/2021/22xxx/CVE-2021-22862.json +++ b/2021/22xxx/CVE-2021-22862.json @@ -1,18 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-22862", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22862", + "STATE": "PUBLIC", + "TITLE": "Improper access control in GitHub Enterprise Server leading to the disclosure of Actions secrets to forks" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.1" + } + ] + } + } + ] + }, + "vendor_name": "GitHub" + } + ] } + }, + "credit": [ + { + "lang": "eng", + "value": "Teddy Katz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of a pull request to be updated to point to an arbitrary SHA or another pull request outside of the fork repository. By establishing this incorrect reference in a PR, the restrictions that limit the Actions secrets sent a workflow from forks could be bypassed. This vulnerability affected GitHub Enterprise Server version 3.0.0, 3.0.0.rc2, and 3.0.0.rc1. This vulnerability was reported via the GitHub Bug Bounty program." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22863.json b/2021/22xxx/CVE-2021-22863.json index a1af7e8360d..ba3d06687c4 100644 --- a/2021/22xxx/CVE-2021-22863.json +++ b/2021/22xxx/CVE-2021-22863.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-22863", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22863", + "STATE": "PUBLIC", + "TITLE": "Improper access control in GitHub Enterprise Server leading to unauthorized changes to maintainer permissions on pull requests" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.20", + "version_value": "2.20.24" + }, + { + "version_affected": "<", + "version_name": "2.21", + "version_value": "2.21.15" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.7" + }, + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.1" + } + ] + } + } + ] + }, + "vendor_name": "GitHub" + } + ] } + }, + "credit": [ + { + "lang": "eng", + "value": "Teddy Katz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would be able to gain access to head branches of pull requests opened on repositories of which they are a maintainer. Forking is disabled by default for organization owned private repositories and would prevent this vulnerability. Additionally, branch protections such as required pull request reviews or status checks would prevent unauthorized commits from being merged without further review or validation. This vulnerability affected all versions of GitHub Enterprise Server since 2.12.22 and was fixed in versions 2.20.24, 2.21.15, 2.22.7 and 3.0.1. This vulnerability was reported via the GitHub Bug Bounty program." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285 Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file From 6a03844ecba01588b9e1b36ac0941c4a7d2dc1cd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 04:00:46 +0000 Subject: [PATCH 064/845] "-Synchronized-Data." --- 2020/10xxx/CVE-2020-10519.json | 169 ++++++++++++++--------------- 2020/14xxx/CVE-2020-14871.json | 5 + 2021/22xxx/CVE-2021-22861.json | 188 +++++++++++++++++---------------- 2021/22xxx/CVE-2021-22862.json | 133 +++++++++++------------ 2021/22xxx/CVE-2021-22863.json | 188 +++++++++++++++++---------------- 5 files changed, 350 insertions(+), 333 deletions(-) diff --git a/2020/10xxx/CVE-2020-10519.json b/2020/10xxx/CVE-2020-10519.json index 239b7a95761..7e7d37af8e7 100644 --- a/2020/10xxx/CVE-2020-10519.json +++ b/2020/10xxx/CVE-2020-10519.json @@ -1,91 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-cna@github.com", - "ID": "CVE-2020-10519", - "STATE": "PUBLIC", - "TITLE": "Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "GitHub Enterprise Server", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "2.20", - "version_value": "2.20.24" + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2020-10519", + "STATE": "PUBLIC", + "TITLE": "Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.20", + "version_value": "2.20.24" + }, + { + "version_affected": "<", + "version_name": "2.21", + "version_value": "2.21.15" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.7" + } + ] + } + } + ] }, - { - "version_affected": "<", - "version_name": "2.21", - "version_value": "2.21.15" - }, - { - "version_affected": "<", - "version_name": "2.22", - "version_value": "2.22.7" - } - ] + "vendor_name": "GitHub" } - } ] - }, - "vendor_name": "GitHub" } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "yvvdwf" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { + }, + "credit": [ + { "lang": "eng", - "value": "CWE-77: Command Injection - Generic" - } + "value": "yvvdwf" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" - } - ] - }, - "source": { - "discovery": "EXTERNAL" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection - Generic" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24", + "name": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15", + "name": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7", + "name": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14871.json b/2020/14xxx/CVE-2020-14871.json index c3421d969ec..83d36a27d28 100644 --- a/2020/14xxx/CVE-2020-14871.json +++ b/2020/14xxx/CVE-2020-14871.json @@ -83,6 +83,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html", "url": "http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210302 Announce: OpenSSH 8.5 released", + "url": "http://www.openwall.com/lists/oss-security/2021/03/03/1" } ] } diff --git a/2021/22xxx/CVE-2021-22861.json b/2021/22xxx/CVE-2021-22861.json index 717485650e4..e9c11c00210 100644 --- a/2021/22xxx/CVE-2021-22861.json +++ b/2021/22xxx/CVE-2021-22861.json @@ -1,100 +1,104 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-cna@github.com", - "ID": "CVE-2021-22861", - "STATE": "PUBLIC", - "TITLE": "Improper access control in GitHub Enterprise Server leading to unauthorized write access to forkable repositories" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "GitHub Enterprise Server", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "2.20", - "version_value": "2.20.24" + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22861", + "STATE": "PUBLIC", + "TITLE": "Improper access control in GitHub Enterprise Server leading to unauthorized write access to forkable repositories" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.20", + "version_value": "2.20.24" + }, + { + "version_affected": "<", + "version_name": "2.21", + "version_value": "2.21.15" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.7" + }, + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.1" + } + ] + } + } + ] }, - { - "version_affected": "<", - "version_name": "2.21", - "version_value": "2.21.15" - }, - { - "version_affected": "<", - "version_name": "2.22", - "version_value": "2.22.7" - }, - { - "version_affected": "<", - "version_name": "3.0", - "version_value": "3.0.1" - } - ] + "vendor_name": "GitHub" } - } ] - }, - "vendor_name": "GitHub" } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Teddy Katz" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted repository, a setting that is disabled by default for organization owned private repositories. Branch protections such as required pull request reviews or status checks would prevent unauthorized commits from being merged without further review or validation. This vulnerability affected all versions of GitHub Enterprise Server since 2.4.21 and was fixed in versions 2.20.24, 2.21.15, 2.22.7 and 3.0.1. This vulnerability was reported via the GitHub Bug Bounty program." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { + }, + "credit": [ + { "lang": "eng", - "value": "CWE-285 Improper Authorization" - } + "value": "Teddy Katz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted repository, a setting that is disabled by default for organization owned private repositories. Branch protections such as required pull request reviews or status checks would prevent unauthorized commits from being merged without further review or validation. This vulnerability affected all versions of GitHub Enterprise Server since 2.4.21 and was fixed in versions 2.20.24, 2.21.15, 2.22.7 and 3.0.1. This vulnerability was reported via the GitHub Bug Bounty program." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" - } - ] - }, - "source": { - "discovery": "EXTERNAL" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285 Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24", + "name": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15", + "name": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7", + "name": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1", + "name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22862.json b/2021/22xxx/CVE-2021-22862.json index 9afb0382796..c283dfaed09 100644 --- a/2021/22xxx/CVE-2021-22862.json +++ b/2021/22xxx/CVE-2021-22862.json @@ -1,73 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-cna@github.com", - "ID": "CVE-2021-22862", - "STATE": "PUBLIC", - "TITLE": "Improper access control in GitHub Enterprise Server leading to the disclosure of Actions secrets to forks" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "GitHub Enterprise Server", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "3.0", - "version_value": "3.0.1" - } - ] + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22862", + "STATE": "PUBLIC", + "TITLE": "Improper access control in GitHub Enterprise Server leading to the disclosure of Actions secrets to forks" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.1" + } + ] + } + } + ] + }, + "vendor_name": "GitHub" } - } ] - }, - "vendor_name": "GitHub" } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Teddy Katz" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of a pull request to be updated to point to an arbitrary SHA or another pull request outside of the fork repository. By establishing this incorrect reference in a PR, the restrictions that limit the Actions secrets sent a workflow from forks could be bypassed. This vulnerability affected GitHub Enterprise Server version 3.0.0, 3.0.0.rc2, and 3.0.0.rc1. This vulnerability was reported via the GitHub Bug Bounty program." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { + }, + "credit": [ + { "lang": "eng", - "value": "CWE-285: Improper Authorization" - } + "value": "Teddy Katz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of a pull request to be updated to point to an arbitrary SHA or another pull request outside of the fork repository. By establishing this incorrect reference in a PR, the restrictions that limit the Actions secrets sent a workflow from forks could be bypassed. This vulnerability affected GitHub Enterprise Server version 3.0.0, 3.0.0.rc2, and 3.0.0.rc1. This vulnerability was reported via the GitHub Bug Bounty program." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" - } - ] - }, - "source": { - "discovery": "EXTERNAL" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1", + "name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22863.json b/2021/22xxx/CVE-2021-22863.json index ba3d06687c4..00d71562fd7 100644 --- a/2021/22xxx/CVE-2021-22863.json +++ b/2021/22xxx/CVE-2021-22863.json @@ -1,100 +1,104 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-cna@github.com", - "ID": "CVE-2021-22863", - "STATE": "PUBLIC", - "TITLE": "Improper access control in GitHub Enterprise Server leading to unauthorized changes to maintainer permissions on pull requests" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "GitHub Enterprise Server", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "2.20", - "version_value": "2.20.24" + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22863", + "STATE": "PUBLIC", + "TITLE": "Improper access control in GitHub Enterprise Server leading to unauthorized changes to maintainer permissions on pull requests" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.20", + "version_value": "2.20.24" + }, + { + "version_affected": "<", + "version_name": "2.21", + "version_value": "2.21.15" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.7" + }, + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.1" + } + ] + } + } + ] }, - { - "version_affected": "<", - "version_name": "2.21", - "version_value": "2.21.15" - }, - { - "version_affected": "<", - "version_name": "2.22", - "version_value": "2.22.7" - }, - { - "version_affected": "<", - "version_name": "3.0", - "version_value": "3.0.1" - } - ] + "vendor_name": "GitHub" } - } ] - }, - "vendor_name": "GitHub" } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Teddy Katz" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would be able to gain access to head branches of pull requests opened on repositories of which they are a maintainer. Forking is disabled by default for organization owned private repositories and would prevent this vulnerability. Additionally, branch protections such as required pull request reviews or status checks would prevent unauthorized commits from being merged without further review or validation. This vulnerability affected all versions of GitHub Enterprise Server since 2.12.22 and was fixed in versions 2.20.24, 2.21.15, 2.22.7 and 3.0.1. This vulnerability was reported via the GitHub Bug Bounty program." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { + }, + "credit": [ + { "lang": "eng", - "value": "CWE-285 Improper Authorization" - } + "value": "Teddy Katz" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would be able to gain access to head branches of pull requests opened on repositories of which they are a maintainer. Forking is disabled by default for organization owned private repositories and would prevent this vulnerability. Additionally, branch protections such as required pull request reviews or status checks would prevent unauthorized commits from being merged without further review or validation. This vulnerability affected all versions of GitHub Enterprise Server since 2.12.22 and was fixed in versions 2.20.24, 2.21.15, 2.22.7 and 3.0.1. This vulnerability was reported via the GitHub Bug Bounty program." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" - } - ] - }, - "source": { - "discovery": "EXTERNAL" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285 Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24", + "name": "https://docs.github.com/en/enterprise-server@2.20/admin/release-notes#2.20.24" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15", + "name": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.15" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7", + "name": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.7" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1", + "name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file From f6a6e5a615034551635c57ae37484955f5cc116f Mon Sep 17 00:00:00 2001 From: Bill Situ Date: Tue, 2 Mar 2021 21:46:41 -0800 Subject: [PATCH 065/845] Bill Situ On branch cna/Oracle/CVE-2021-2138 Changes to be committed: modified: 2021/2xxx/CVE-2021-2138.json --- 2021/2xxx/CVE-2021-2138.json | 57 ++++++++++++++++++++++++++++++++++-- 1 file changed, 54 insertions(+), 3 deletions(-) diff --git a/2021/2xxx/CVE-2021-2138.json b/2021/2xxx/CVE-2021-2138.json index b7331e4855d..32a4e5bcbe2 100644 --- a/2021/2xxx/CVE-2021-2138.json +++ b/2021/2xxx/CVE-2021-2138.json @@ -3,15 +3,66 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2021-2138", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Oracle Cloud Infrastructure Data Science Notebook Sessions", + "version": { + "version_data": [ + { + "version_value": "*" + } + ] + } + } + ] + }, + "vendor_name": "Oracle Corporation" + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the Oracle Cloud Infrastructure Data Science Notebook Sessions. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Cloud Infrastructure Data Science Notebook Sessions executes to compromise Oracle Cloud Infrastructure Data Science Notebook Sessions. Successful attacks of this vulnerability can resultin unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data. All affected customers were notified of CVE-2021-2138 by Oracle. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)" + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.6", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Cloud Infrastructure Data Science Notebook Sessions executes to compromise Oracle Cloud Infrastructure Data Science Notebook Sessions. Successful attacks of this vulnerability can resultin unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data. All affected customers were notified of CVE-2021-2138 by Oracle." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.oracle.com", + "name": "https://support.oracle.com", + "refsource": "MISC" } ] } From beae537bce1e8d012234fb32b3fd869636739234 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 06:00:45 +0000 Subject: [PATCH 066/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2021/21xxx/CVE-2021-21290.json | 30 ++++++++++++++++++++++++++++++ 2 files changed, 35 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index bf5f198cffc..86e7ec13661 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -128,6 +128,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210302 [GitHub] [hbase] Apache9 commented on a change in pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210302 [GitHub] [hbase] pankaj72981 commented on a change in pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 8198c2682a1..adcc65cc857 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -116,6 +116,36 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", "url": "https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-dev] 20210302 [jira] [Resolved] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [jira] [Resolved] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] omkreddy closed pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-commits] 20210302 [kafka] branch 2.6 updated: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214@%3Ccommits.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-commits] 20210302 [kafka] branch 2.7 updated: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f@%3Ccommits.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", + "url": "https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E" } ] }, From afaeeb42f56764e4d1ef8a5c46355392a3fb79cc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 07:00:41 +0000 Subject: [PATCH 067/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 62262632688..13bfe18e751 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -109,6 +109,36 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210302 [GitHub] [kafka] ableegoldman commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", "url": "https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-dev] 20210302 [jira] [Resolved] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [jira] [Resolved] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-commits] 20210302 [kafka] branch 2.7 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-commits] 20210302 [kafka] branch 2.8 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-jira] 20210302 [GitHub] [kafka] omkreddy closed pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[kafka-commits] 20210302 [kafka] branch 2.6 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E" } ] } From 2d0ca5bee803b6d1954c506c135552fa7c80733d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 08:00:51 +0000 Subject: [PATCH 068/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2020/36xxx/CVE-2020-36079.json | 12 +++++++++++- 2 files changed, 16 insertions(+), 1 deletion(-) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 86e7ec13661..672f5df8726 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -133,6 +133,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210302 [GitHub] [hbase] pankaj72981 commented on a change in pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210303 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/36xxx/CVE-2020-36079.json b/2020/36xxx/CVE-2020-36079.json index 2f0d4834684..8b8059aa7b7 100644 --- a/2020/36xxx/CVE-2020-36079.json +++ b/2020/36xxx/CVE-2020-36079.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory." + "value": "** DISPUTED ** Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory. NOTE: the vendor disputes this because exploitation can only be performed by an admin who has \"lots of other possibilities to harm a site.\"" } ] }, @@ -56,6 +56,16 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html", "url": "http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html" + }, + { + "refsource": "MISC", + "name": "https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/", + "url": "https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/" + }, + { + "refsource": "MISC", + "name": "https://github.com/zenphoto/zenphoto/issues/1292", + "url": "https://github.com/zenphoto/zenphoto/issues/1292" } ] } From 78e5b8e8fb0b97b9ed89d06eb1d93fe0faebc149 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 09:00:43 +0000 Subject: [PATCH 069/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 15 ++++++++ 2021/27xxx/CVE-2021-27918.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27919.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27920.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27921.json | 62 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27922.json | 62 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27923.json | 62 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27924.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27925.json | 18 ++++++++++ 9 files changed, 291 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27918.json create mode 100644 2021/27xxx/CVE-2021-27919.json create mode 100644 2021/27xxx/CVE-2021-27920.json create mode 100644 2021/27xxx/CVE-2021-27921.json create mode 100644 2021/27xxx/CVE-2021-27922.json create mode 100644 2021/27xxx/CVE-2021-27923.json create mode 100644 2021/27xxx/CVE-2021-27924.json create mode 100644 2021/27xxx/CVE-2021-27925.json diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 7948cb6e653..cec7aba85de 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -365,6 +365,21 @@ "refsource": "MLIST", "name": "[beam-issues] 20210302 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[iotdb-notifications] 20210303 [jira] [Created] (IOTDB-1181) Upgrade jetty jar to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[iotdb-reviews] 20210303 [GitHub] [iotdb] wangchao316 opened a new pull request #2768: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[iotdb-reviews] 20210303 [GitHub] [iotdb] wangchao316 commented on pull request #2768: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E" } ] } diff --git a/2021/27xxx/CVE-2021-27918.json b/2021/27xxx/CVE-2021-27918.json new file mode 100644 index 00000000000..26c3cc3c816 --- /dev/null +++ b/2021/27xxx/CVE-2021-27918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27919.json b/2021/27xxx/CVE-2021-27919.json new file mode 100644 index 00000000000..20b0c8015e5 --- /dev/null +++ b/2021/27xxx/CVE-2021-27919.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27919", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27920.json b/2021/27xxx/CVE-2021-27920.json new file mode 100644 index 00000000000..b8298c8340a --- /dev/null +++ b/2021/27xxx/CVE-2021-27920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27921.json b/2021/27xxx/CVE-2021-27921.json new file mode 100644 index 00000000000..af9346f3e9f --- /dev/null +++ b/2021/27xxx/CVE-2021-27921.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27921", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html", + "refsource": "MISC", + "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27922.json b/2021/27xxx/CVE-2021-27922.json new file mode 100644 index 00000000000..a39d1913306 --- /dev/null +++ b/2021/27xxx/CVE-2021-27922.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27922", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html", + "refsource": "MISC", + "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27923.json b/2021/27xxx/CVE-2021-27923.json new file mode 100644 index 00000000000..c7d47362767 --- /dev/null +++ b/2021/27xxx/CVE-2021-27923.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27923", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html", + "refsource": "MISC", + "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27924.json b/2021/27xxx/CVE-2021-27924.json new file mode 100644 index 00000000000..be048e6fb35 --- /dev/null +++ b/2021/27xxx/CVE-2021-27924.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27924", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27925.json b/2021/27xxx/CVE-2021-27925.json new file mode 100644 index 00000000000..3aebb99d926 --- /dev/null +++ b/2021/27xxx/CVE-2021-27925.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27925", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d15845a7c0b6f582ddf80c987b790cbfd366e6d9 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Wed, 3 Mar 2021 10:06:00 +0100 Subject: [PATCH 070/845] Commit CVE-2020-15937 --- 2020/15xxx/CVE-2020-15937.json | 66 ++++++++++++++++++++++++++++++++-- 1 file changed, 63 insertions(+), 3 deletions(-) diff --git a/2020/15xxx/CVE-2020-15937.json b/2020/15xxx/CVE-2020-15937.json index c638537f667..5023d47a736 100644 --- a/2020/15xxx/CVE-2020-15937.json +++ b/2020/15xxx/CVE-2020-15937.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15937", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiOS", + "version": { + "version_data": [ + { + "version_value": "FortiOS 6.4.1, 6.2.5" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 4.6, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "None", + "scope": "Changed", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-068", + "url": "https://fortiguard.com/advisory/FG-IR-20-068" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of input vulnerability in FortiGate version 6.2.x below 6.2.5 and 6.4.x below 6.4.1 may allow a remote attacker to perform a stored cross site scripting attack (XSS) via the IPS and WAF logs dashboard." } ] } From 28ea8a100d728f169eb78b5038190ea1831172ff Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Wed, 3 Mar 2021 10:39:10 +0100 Subject: [PATCH 071/845] Commit CVE-2020-15938 --- 2020/15xxx/CVE-2020-15938.json | 66 ++++++++++++++++++++++++++++++++-- 1 file changed, 63 insertions(+), 3 deletions(-) diff --git a/2020/15xxx/CVE-2020-15938.json b/2020/15xxx/CVE-2020-15938.json index 7e2b0296edd..9d25ac401f5 100644 --- a/2020/15xxx/CVE-2020-15938.json +++ b/2020/15xxx/CVE-2020-15938.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15938", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiOS", + "version": { + "version_data": [ + { + "version_value": "FortiOS 6.4.2, 6.2.5" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "High", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 3.8, + "baseSeverity": "Low", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "None", + "scope": "Changed", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Operational Risk, Traffic Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-172", + "url": "https://fortiguard.com/advisory/FG-IR-20-172" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When traffic other than HTTP/S (eg: SSH traffic, etc...) traverses the FortiGate in version below 6.2.5 and below 6.4.2 on port 80/443, it is not redirected to the transparent proxy policy for processing, as it doesn't have a valid HTTP header." } ] } From 2a106cdafce9a54db23876e8e0e154b1073094f2 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Wed, 3 Mar 2021 10:47:03 +0100 Subject: [PATCH 072/845] Commit CVE-2021-22128 --- 2021/22xxx/CVE-2021-22128.json | 66 ++++++++++++++++++++++++++++++++-- 1 file changed, 63 insertions(+), 3 deletions(-) diff --git a/2021/22xxx/CVE-2021-22128.json b/2021/22xxx/CVE-2021-22128.json index 6b3cf90e217..2617550c70e 100644 --- a/2021/22xxx/CVE-2021-22128.json +++ b/2021/22xxx/CVE-2021-22128.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22128", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiProxy", + "version": { + "version_data": [ + { + "version_value": "FortiProxy 2.0.0, 1.2.9 and below" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "High", + "baseScore": 6.9, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-235", + "url": "https://fortiguard.com/advisory/FG-IR-20-235" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper access control vulnerability in FortiProxy SSL VPN portal 2.0.0, 1.2.9 and below versions may allow an authenticated, remote attacker to access internal service such as the ZebOS Shell on the FortiProxy appliance through the Quick Connection functionality." } ] } From 38620334fddc46612cffc3bbdc8f74a253243bae Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Wed, 3 Mar 2021 11:52:52 +0200 Subject: [PATCH 073/845] Adds CVE-2021-23347 --- 2021/23xxx/CVE-2021-23347.json | 88 ++++++++++++++++++++++++++++++++-- 1 file changed, 84 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23347.json b/2021/23xxx/CVE-2021-23347.json index 936f51cd1a8..c5f0f7b61ad 100644 --- a/2021/23xxx/CVE-2021-23347.json +++ b/2021/23xxx/CVE-2021-23347.json @@ -3,16 +3,96 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-03T09:52:51.235817Z", "ID": "CVE-2021-23347", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cross-site Scripting (XSS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "github.com/argoproj/argo-cd/cmd", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.7.13" + }, + { + "version_affected": ">=", + "version_value": "1.8.0" + }, + { + "version_affected": "<", + "version_value": "1.8.6" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDCMD-1078291" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/argoproj/argo-cd/pull/5563" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "jannfis" + } + ] } \ No newline at end of file From 3dc3e1be0669da44f3a45105fd286ed29bc6921f Mon Sep 17 00:00:00 2001 From: Johannes Segitz Date: Wed, 3 Mar 2021 10:53:58 +0100 Subject: [PATCH 074/845] data for CVE-2021-25315 --- 2021/25xxx/CVE-2021-25315.json | 105 +++++++++++++++++++++++++++++++-- 1 file changed, 99 insertions(+), 6 deletions(-) diff --git a/2021/25xxx/CVE-2021-25315.json b/2021/25xxx/CVE-2021-25315.json index 46d337f740b..22bd90a60d7 100644 --- a/2021/25xxx/CVE-2021-25315.json +++ b/2021/25xxx/CVE-2021-25315.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@suse.de", + "DATE_PUBLIC": "2021-03-01T00:00:00.000Z", "ID": "CVE-2021-25315", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "salt-api unauthenticated remote code execution" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SUSE Linux Enterprise Server 15 SP 3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "salt", + "version_value": "3002.2-3" + } + ] + } + } + ] + }, + "vendor_name": "SUSE" + }, + { + "product": { + "product_data": [ + { + "product_name": "Tumbleweed", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "salt", + "version_value": "3002.2-2.1" + } + ] + } + } + ] + }, + "vendor_name": "openSUSE" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials.\nThis issue affects:\nSUSE SUSE Linux Enterprise Server 15 SP 3\nsalt versions prior to 3002.2-3.\nopenSUSE Tumbleweed\nsalt version 3002.2-2.1 and prior versions." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-303: Incorrect Implementation of Authentication Algorithm" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1182382", + "refsource": "CONFIRM", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182382" + } + ] + }, + "source": { + "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1182382", + "defect": [ + "1182382" + ], + "discovery": "INTERNAL" } } \ No newline at end of file From a7940bca15f1bc0863a7393121988f47f2ed17e8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 10:00:44 +0000 Subject: [PATCH 075/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 5 +++++ 2021/21xxx/CVE-2021-21290.json | 5 +++++ 2021/25xxx/CVE-2021-25315.json | 4 ++-- 2021/27xxx/CVE-2021-27926.json | 18 ++++++++++++++++++ 4 files changed, 30 insertions(+), 2 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27926.json diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 13bfe18e751..78a3c53893e 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -139,6 +139,11 @@ "refsource": "MLIST", "name": "[kafka-commits] 20210302 [kafka] branch 2.6 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", "url": "https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E" } ] } diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index adcc65cc857..bd03e862e2f 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -146,6 +146,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", "url": "https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E" } ] }, diff --git a/2021/25xxx/CVE-2021-25315.json b/2021/25xxx/CVE-2021-25315.json index 22bd90a60d7..107e3777ede 100644 --- a/2021/25xxx/CVE-2021-25315.json +++ b/2021/25xxx/CVE-2021-25315.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-03-01T00:00:00.000Z", "ID": "CVE-2021-25315", "STATE": "PUBLIC", @@ -57,7 +57,7 @@ "description_data": [ { "lang": "eng", - "value": "A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials.\nThis issue affects:\nSUSE SUSE Linux Enterprise Server 15 SP 3\nsalt versions prior to 3002.2-3.\nopenSUSE Tumbleweed\nsalt version 3002.2-2.1 and prior versions." + "value": "A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions." } ] }, diff --git a/2021/27xxx/CVE-2021-27926.json b/2021/27xxx/CVE-2021-27926.json new file mode 100644 index 00000000000..feb0c9b4b0a --- /dev/null +++ b/2021/27xxx/CVE-2021-27926.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27926", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 5877c4a13a0525ce5198cfce381b42413c65b073 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 11:00:41 +0000 Subject: [PATCH 076/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23347.json | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/2021/23xxx/CVE-2021-23347.json b/2021/23xxx/CVE-2021-23347.json index c5f0f7b61ad..346f5ec0240 100644 --- a/2021/23xxx/CVE-2021-23347.json +++ b/2021/23xxx/CVE-2021-23347.json @@ -56,12 +56,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDCMD-1078291" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDCMD-1078291", + "name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDCMD-1078291" }, { - "refsource": "CONFIRM", - "url": "https://github.com/argoproj/argo-cd/pull/5563" + "refsource": "MISC", + "url": "https://github.com/argoproj/argo-cd/pull/5563", + "name": "https://github.com/argoproj/argo-cd/pull/5563" } ] }, @@ -69,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user.\n" + "value": "The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user." } ] }, From 24e73eeff7f0271b4fa08969aaeea05358726efb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 12:00:40 +0000 Subject: [PATCH 077/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 78a3c53893e..bddb83de006 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -144,6 +144,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E", "url": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E" } ] } From 6e0be46da69be38f78e8a27eeabf138f85207972 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 16:00:44 +0000 Subject: [PATCH 078/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35296.json | 66 ++++++++++++++++-- 2021/21xxx/CVE-2021-21476.json | 2 +- 2021/25xxx/CVE-2021-25252.json | 120 +++++++++++++++++---------------- 2021/26xxx/CVE-2021-26813.json | 56 +++++++++++++-- 2021/27xxx/CVE-2021-27215.json | 66 ++++++++++++++++-- 2021/3xxx/CVE-2021-3419.json | 4 +- 6 files changed, 234 insertions(+), 80 deletions(-) diff --git a/2020/35xxx/CVE-2020-35296.json b/2020/35xxx/CVE-2020-35296.json index 7ede4de8d37..429b7a55073 100644 --- a/2020/35xxx/CVE-2020-35296.json +++ b/2020/35xxx/CVE-2020-35296.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35296", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35296", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ThinkAdmin v6 has default administrator credentials, which allows attackers to gain unrestricted administratior dashboard access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zoujingli/ThinkAdmin", + "refsource": "MISC", + "name": "https://github.com/zoujingli/ThinkAdmin" + }, + { + "refsource": "MISC", + "name": "https://github.com/Shrimant12/CVE-References/blob/main/CVE-2020-35296.md", + "url": "https://github.com/Shrimant12/CVE-References/blob/main/CVE-2020-35296.md" + }, + { + "refsource": "MISC", + "name": "https://smshrimant.com/admin-panel-access-using-default-credentials/", + "url": "https://smshrimant.com/admin-panel-access-using-default-credentials/" } ] } diff --git a/2021/21xxx/CVE-2021-21476.json b/2021/21xxx/CVE-2021-21476.json index 610c227d7c7..94f5eea331b 100644 --- a/2021/21xxx/CVE-2021-21476.json +++ b/2021/21xxx/CVE-2021-21476.json @@ -63,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "SAP UI5, versions - 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1, allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." + "value": "SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." } ] }, diff --git a/2021/25xxx/CVE-2021-25252.json b/2021/25xxx/CVE-2021-25252.json index 9b9c19be32e..e979763f9d9 100644 --- a/2021/25xxx/CVE-2021-25252.json +++ b/2021/25xxx/CVE-2021-25252.json @@ -1,60 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@trendmicro.com", - "ID" : "CVE-2021-25252", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Trend Micro Virus Scan API (VSAPI) Engine\r\n", - "version" : { - "version_data" : [ - { - "version_value" : "12.0" - } - ] - } - } - ] - }, - "vendor_name" : "Trend Micro" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Memory Exhaustion" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://success.trendmicro.com/solution/000285675" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "security@trendmicro.com", + "ID": "CVE-2021-25252", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Trend Micro Virus Scan API (VSAPI) Engine\r\n", + "version": { + "version_data": [ + { + "version_value": "12.0" + } + ] + } + } + ] + }, + "vendor_name": "Trend Micro" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory Exhaustion" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://success.trendmicro.com/solution/000285675", + "refsource": "MISC", + "name": "https://success.trendmicro.com/solution/000285675" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26813.json b/2021/26xxx/CVE-2021-26813.json index 36b9f02a553..09b5fcebcce 100644 --- a/2021/26xxx/CVE-2021-26813.json +++ b/2021/26xxx/CVE-2021-26813.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26813", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/trentm/python-markdown2/pull/387", + "refsource": "MISC", + "name": "https://github.com/trentm/python-markdown2/pull/387" } ] } diff --git a/2021/27xxx/CVE-2021-27215.json b/2021/27xxx/CVE-2021-27215.json index 83ed86ed7e5..656703e3884 100644 --- a/2021/27xxx/CVE-2021-27215.json +++ b/2021/27xxx/CVE-2021-27215.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27215", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27215", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in genua genugate before 9.0 Z p19, 9.1.x through 9.6.x before 9.6 p7, and 10.x before 10.1 p4. The Web Interfaces (Admin, Userweb, Sidechannel) can use different methods to perform the authentication of a user. A specific authentication method during login does not check the provided data (when a certain manipulation occurs) and returns OK for any authentication request. This allows an attacker to login to the admin panel as a user of his choice, e.g., the root user (with highest privileges) or even a non-existing user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.genua.de/en/it-security-solutions/high-resistance-firewall-genugate", + "refsource": "MISC", + "name": "https://www.genua.de/en/it-security-solutions/high-resistance-firewall-genugate" + }, + { + "refsource": "MISC", + "name": "https://kunde.genua.de/en/overview/genugate.html", + "url": "https://kunde.genua.de/en/overview/genugate.html" + }, + { + "refsource": "MISC", + "name": "https://sec-consult.com/vulnerability-lab/advisory/authentication-bypass-genua-genugate/", + "url": "https://sec-consult.com/vulnerability-lab/advisory/authentication-bypass-genua-genugate/" } ] } diff --git a/2021/3xxx/CVE-2021-3419.json b/2021/3xxx/CVE-2021-3419.json index d1250f7984d..7bd133f8556 100644 --- a/2021/3xxx/CVE-2021-3419.json +++ b/2021/3xxx/CVE-2021-3419.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-3419", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none." } ] } From e9e8c00e67c6f176e07fd77852fb8d7354cd027b Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Wed, 3 Mar 2021 11:55:59 -0500 Subject: [PATCH 079/845] IBM20210303-115559 Added CVE-2021-20442, CVE-2021-20441 --- 2021/20xxx/CVE-2021-20441.json | 102 ++++++++++++++++++++++++++++----- 2021/20xxx/CVE-2021-20442.json | 102 ++++++++++++++++++++++++++++----- 2 files changed, 174 insertions(+), 30 deletions(-) diff --git a/2021/20xxx/CVE-2021-20441.json b/2021/20xxx/CVE-2021-20441.json index a4dcd1205da..68688a1abe5 100644 --- a/2021/20xxx/CVE-2021-20441.json +++ b/2021/20xxx/CVE-2021-20441.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20441", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "references" : { + "reference_data" : [ + { + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6421023", + "name" : "https://www.ibm.com/support/pages/node/6421023", + "title" : "IBM Security Bulletin 6421023 (Security Verify Bridge)" + }, + { + "name" : "ibm-svb-cve202120441-info-disc (196617)", + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196617" + } + ] + }, + "data_type" : "CVE", + "description" : { + "description_data" : [ + { + "value" : "IBM Security Verify Bridge uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196617.", + "lang" : "eng" + } + ] + }, + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "ID" : "CVE-2021-20441", + "DATE_PUBLIC" : "2021-03-02T00:00:00" + }, + "data_format" : "MITRE", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + }, + "data_version" : "4.0", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "" + } + ] + }, + "product_name" : "Security Verify Bridge" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RC" : "C", + "E" : "U", + "RL" : "O" + }, + "BM" : { + "I" : "N", + "SCORE" : "5.900", + "UI" : "N", + "AC" : "H", + "C" : "H", + "PR" : "N", + "AV" : "N", + "S" : "U", + "A" : "N" + } + } + } +} diff --git a/2021/20xxx/CVE-2021-20442.json b/2021/20xxx/CVE-2021-20442.json index dd7f43eceba..532e377448c 100644 --- a/2021/20xxx/CVE-2021-20442.json +++ b/2021/20xxx/CVE-2021-20442.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20442", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "description" : { + "description_data" : [ + { + "value" : "IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618.", + "lang" : "eng" + } + ] + }, + "data_type" : "CVE", + "references" : { + "reference_data" : [ + { + "url" : "https://www.ibm.com/support/pages/node/6421025", + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6421025 (Security Verify Bridge)", + "name" : "https://www.ibm.com/support/pages/node/6421025" + }, + { + "name" : "ibm-svb-cve202120442-info-disc (196618)", + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196618" + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "AV" : "N", + "A" : "N", + "S" : "U", + "I" : "N", + "UI" : "N", + "AC" : "H", + "SCORE" : "5.900", + "PR" : "N", + "C" : "H" + }, + "TM" : { + "RL" : "O", + "RC" : "C", + "E" : "U" + } + } + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "" + } + ] + }, + "product_name" : "Security Verify Bridge" + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + }, + "data_format" : "MITRE", + "CVE_data_meta" : { + "STATE" : "PUBLIC", + "DATE_PUBLIC" : "2021-03-02T00:00:00", + "ID" : "CVE-2021-20442", + "ASSIGNER" : "psirt@us.ibm.com" + } +} From fb02779d725abe942d3c75f9c024e4aefecc5756 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 17:00:44 +0000 Subject: [PATCH 080/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13554.json | 50 ++++++++++++++++++++++++-- 2020/14xxx/CVE-2020-14372.json | 55 ++++++++++++++++++++++++++-- 2020/25xxx/CVE-2020-25632.json | 50 ++++++++++++++++++++++++-- 2020/25xxx/CVE-2020-25647.json | 50 ++++++++++++++++++++++++-- 2020/27xxx/CVE-2020-27749.json | 50 ++++++++++++++++++++++++-- 2020/27xxx/CVE-2020-27779.json | 50 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20076.json | 50 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20225.json | 50 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20233.json | 50 ++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21979.json | 50 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22638.json | 50 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22662.json | 50 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22666.json | 50 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22670.json | 50 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22683.json | 50 ++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27927.json | 65 ++++++++++++++++++++++++++++++++++ 16 files changed, 775 insertions(+), 45 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27927.json diff --git a/2020/13xxx/CVE-2020-13554.json b/2020/13xxx/CVE-2020-13554.json index 7795dd62481..e4cae4ff9af 100644 --- a/2020/13xxx/CVE-2020-13554.json +++ b/2020/13xxx/CVE-2020-13554.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-13554", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Advantech", + "version": { + "version_data": [ + { + "version_value": "Advantech WebAccess/SCADA 9.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "incorrect default permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege." } ] } diff --git a/2020/14xxx/CVE-2020-14372.json b/2020/14xxx/CVE-2020-14372.json index 3669d45d75f..5a752829981 100644 --- a/2020/14xxx/CVE-2020-14372.json +++ b/2020/14xxx/CVE-2020-14372.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14372", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-184" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1873150", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873150" + }, + { + "refsource": "MISC", + "name": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-003", + "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-003" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability." } ] } diff --git a/2020/25xxx/CVE-2020-25632.json b/2020/25xxx/CVE-2020-25632.json index 5945b588f6d..db40d967784 100644 --- a/2020/25xxx/CVE-2020-25632.json +++ b/2020/25xxx/CVE-2020-25632.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25632", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879577", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879577" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2020/25xxx/CVE-2020-25647.json b/2020/25xxx/CVE-2020-25647.json index 7c20d0bb4af..1ba57fc83de 100644 --- a/2020/25xxx/CVE-2020-25647.json +++ b/2020/25xxx/CVE-2020-25647.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25647", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1886936", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886936" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2020/27xxx/CVE-2020-27749.json b/2020/27xxx/CVE-2020-27749.json index dae74406712..e1af0995408 100644 --- a/2020/27xxx/CVE-2020-27749.json +++ b/2020/27xxx/CVE-2020-27749.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27749", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1899966", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899966" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2020/27xxx/CVE-2020-27779.json b/2020/27xxx/CVE-2020-27779.json index fd148f7c9ca..4dffd7defc8 100644 --- a/2020/27xxx/CVE-2020-27779.json +++ b/2020/27xxx/CVE-2020-27779.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27779", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1900698", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900698" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20076.json b/2021/20xxx/CVE-2021-20076.json index 9a34ae49991..5b9ae2d6d9e 100644 --- a/2021/20xxx/CVE-2021-20076.json +++ b/2021/20xxx/CVE-2021-20076.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20076", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnreport@tenable.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Tenable.sc", + "version": { + "version_data": [ + { + "version_value": "5.13.0 through 5.17.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/tns-2021-03", + "url": "https://www.tenable.com/security/tns-2021-03" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenable.sc and Tenable.sc Core versions 5.13.0 through 5.17.0 were found to contain a vulnerability that could allow an authenticated, unprivileged user to perform Remote Code Execution (RCE) on the Tenable.sc server via Hypertext Preprocessor unserialization." } ] } diff --git a/2021/20xxx/CVE-2021-20225.json b/2021/20xxx/CVE-2021-20225.json index 39d37c36da2..b44a0c8951d 100644 --- a/2021/20xxx/CVE-2021-20225.json +++ b/2021/20xxx/CVE-2021-20225.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20225", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1924696", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924696" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20233.json b/2021/20xxx/CVE-2021-20233.json index 9c683dfe58b..175484670e1 100644 --- a/2021/20xxx/CVE-2021-20233.json +++ b/2021/20xxx/CVE-2021-20233.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20233", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "grub 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1926263", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926263" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2021/21xxx/CVE-2021-21979.json b/2021/21xxx/CVE-2021-21979.json index 1402f5b8a5f..cfe0ca4226c 100644 --- a/2021/21xxx/CVE-2021-21979.json +++ b/2021/21xxx/CVE-2021-21979.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21979", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@vmware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Bitnami Containers", + "version": { + "version_data": [ + { + "version_value": "All Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "APP_KEY fixed in the container image" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/bitnami/bitnami-docker-laravel/issues/139", + "url": "https://github.com/bitnami/bitnami-docker-laravel/issues/139" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Bitnami Containers, all Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8, the file /tmp/app/.env is generated at the time that the docker image bitnami/laravel was built, and the value of APP_KEY is fixed under certain conditions. This value is crucial for the security of the application and must be randomly generated per Laravel installation. If your application's encryption key is in the hands of a malicious party, that party could craft cookie values using the encryption key and exploit vulnerabilities inherent to PHP object serialization / unserialization, such as calling arbitrary class methods within your application." } ] } diff --git a/2021/22xxx/CVE-2021-22638.json b/2021/22xxx/CVE-2021-22638.json index e68f19c572f..c47adc376a3 100644 --- a/2021/22xxx/CVE-2021-22638.json +++ b/2021/22xxx/CVE-2021-22638.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22638", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Fatek FvDesigner", + "version": { + "version_data": [ + { + "version_value": "Version 1.5.76 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "OUT-OF-BOUNDS READ CWE-125" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds read while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution." } ] } diff --git a/2021/22xxx/CVE-2021-22662.json b/2021/22xxx/CVE-2021-22662.json index e50057538d5..fea79d7de78 100644 --- a/2021/22xxx/CVE-2021-22662.json +++ b/2021/22xxx/CVE-2021-22662.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22662", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Fatek FvDesigner", + "version": { + "version_data": [ + { + "version_value": "Version 1.5.76 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "USE AFTER FREE CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use after free issue has been identified in Fatek FvDesigner Version 1.5.76 and prior in the way the application processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution." } ] } diff --git a/2021/22xxx/CVE-2021-22666.json b/2021/22xxx/CVE-2021-22666.json index 97207cf42c3..17f6767f9ed 100644 --- a/2021/22xxx/CVE-2021-22666.json +++ b/2021/22xxx/CVE-2021-22666.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22666", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Fatek FvDesigner", + "version": { + "version_data": [ + { + "version_value": "Version 1.5.76 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "STACK-BASED BUFFER OVERFLOW CWE-121" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fatek FvDesigner Version 1.5.76 and prior is vulnerable to a stack-based buffer overflow while project files are being processed, allowing an attacker to craft a special project file that may permit arbitrary code execution." } ] } diff --git a/2021/22xxx/CVE-2021-22670.json b/2021/22xxx/CVE-2021-22670.json index 8a8fa72fa91..0d91dec5de5 100644 --- a/2021/22xxx/CVE-2021-22670.json +++ b/2021/22xxx/CVE-2021-22670.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22670", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Fatek FvDesigner", + "version": { + "version_data": [ + { + "version_value": "Version 1.5.76 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "ACCESS OF UNINITIALIZED POINTER CWE-824" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An uninitialized pointer may be exploited in Fatek FvDesigner Version 1.5.76 and prior while the application is processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution." } ] } diff --git a/2021/22xxx/CVE-2021-22683.json b/2021/22xxx/CVE-2021-22683.json index 900bc0035ac..6638df06a94 100644 --- a/2021/22xxx/CVE-2021-22683.json +++ b/2021/22xxx/CVE-2021-22683.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22683", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Fatek FvDesigner", + "version": { + "version_data": [ + { + "version_value": "Version 1.5.76 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "OUT-OF-BOUNDS WRITE CWE-787" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds write while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution." } ] } diff --git a/2021/27xxx/CVE-2021-27927.json b/2021/27xxx/CVE-2021-27927.json new file mode 100644 index 00000000000..cee03d6669d --- /dev/null +++ b/2021/27xxx/CVE-2021-27927.json @@ -0,0 +1,65 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27927", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Zabbix before 4.0.28rc1, 5.x before 5.0.8rc1, 5.1.x and 5.2.x before 5.2.4rc1, and 5.3.x and 5.4.x before 5.4.0alpha1, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.zabbix.com/browse/ZBX-18942", + "refsource": "MISC", + "name": "https://support.zabbix.com/browse/ZBX-18942" + } + ] + }, + "source": { + "discovery": "INTERNAL" + } +} \ No newline at end of file From 6b393c21644c7436d46315123db87b105108ed23 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 18:00:41 +0000 Subject: [PATCH 081/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13160.json | 5 + 2020/13xxx/CVE-2020-13558.json | 50 +++++++++- 2020/28xxx/CVE-2020-28591.json | 50 +++++++++- 2020/28xxx/CVE-2020-28597.json | 50 +++++++++- 2020/29xxx/CVE-2020-29047.json | 61 ++++++++++-- 2020/8xxx/CVE-2020-8296.json | 65 +++++++++++- 2021/20xxx/CVE-2021-20441.json | 174 ++++++++++++++++----------------- 2021/20xxx/CVE-2021-20442.json | 172 ++++++++++++++++---------------- 2021/21xxx/CVE-2021-21978.json | 50 +++++++++- 2021/22xxx/CVE-2021-22182.json | 87 ++++++++++++++++- 2021/22xxx/CVE-2021-22188.json | 90 ++++++++++++++++- 2021/22xxx/CVE-2021-22681.json | 71 +++++++++++++- 2021/22xxx/CVE-2021-22877.json | 65 +++++++++++- 2021/22xxx/CVE-2021-22878.json | 60 +++++++++++- 2021/22xxx/CVE-2021-22883.json | 55 ++++++++++- 2021/22xxx/CVE-2021-22884.json | 60 +++++++++++- 2021/27xxx/CVE-2021-27804.json | 5 + 17 files changed, 953 insertions(+), 217 deletions(-) diff --git a/2020/13xxx/CVE-2020-13160.json b/2020/13xxx/CVE-2020-13160.json index bc8826f9c8a..ab9375a3458 100644 --- a/2020/13xxx/CVE-2020-13160.json +++ b/2020/13xxx/CVE-2020-13160.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html", "url": "http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html" } ] } diff --git a/2020/13xxx/CVE-2020-13558.json b/2020/13xxx/CVE-2020-13558.json index 00ba671b8ea..d3c65702a0b 100644 --- a/2020/13xxx/CVE-2020-13558.json +++ b/2020/13xxx/CVE-2020-13558.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-13558", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Webkit", + "version": { + "version_data": [ + { + "version_value": "Webkit WebKitGTK 2.30.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free." } ] } diff --git a/2020/28xxx/CVE-2020-28591.json b/2020/28xxx/CVE-2020-28591.json index 17308a50f1c..69925d96b8c 100644 --- a/2020/28xxx/CVE-2020-28591.json +++ b/2020/28xxx/CVE-2020-28591.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28591", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Slic3r", + "version": { + "version_data": [ + { + "version_value": "Slic3r libslic3r 1.3.0 , Slic3r libslic3r Master Commit 92abbc42" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "out of bounds read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read vulnerability exists in the AMF File AMFParserContext::endElement() functionality of Slic3r libslic3r 1.3.0 and Master Commit 92abbc42. A specially crafted AMF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability." } ] } diff --git a/2020/28xxx/CVE-2020-28597.json b/2020/28xxx/CVE-2020-28597.json index dbcc4726162..d46616a30ec 100644 --- a/2020/28xxx/CVE-2020-28597.json +++ b/2020/28xxx/CVE-2020-28597.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28597", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Epignosis", + "version": { + "version_data": [ + { + "version_value": "Epignosis eFront LMS 5.2.17, Epignosis eFront LMS 5.2.21" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "predictable seed" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A predictable seed vulnerability exists in the password reset functionality of Epignosis EfrontPro 5.2.21. By predicting the seed it is possible to generate the correct password reset 1-time token. An attacker can visit the password reset supplying the password reset token to reset the password of an account of their choice." } ] } diff --git a/2020/29xxx/CVE-2020-29047.json b/2020/29xxx/CVE-2020-29047.json index e302a857bb8..731b1d13e8d 100644 --- a/2020/29xxx/CVE-2020-29047.json +++ b/2020/29xxx/CVE-2020-29047.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29047", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29047", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The wp-hotel-booking plugin through 1.10.2 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the thimpress_hotel_booking_1 cookie in load in includes/class-wphb-sessions.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-hotel-booking/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-hotel-booking/#developers" + }, + { + "refsource": "MISC", + "name": "https://appcheck-ng.com/cve-2020-29047/", + "url": "https://appcheck-ng.com/cve-2020-29047/" } ] } diff --git a/2020/8xxx/CVE-2020-8296.json b/2020/8xxx/CVE-2020-8296.json index 1dbdd6c9488..b241492630a 100644 --- a/2020/8xxx/CVE-2020-8296.json +++ b/2020/8xxx/CVE-2020-8296.json @@ -4,14 +4,73 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8296", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Nextcloud Server", + "version": { + "version_data": [ + { + "version_value": "Fixed in 20.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Storing Passwords in a Recoverable Format (CWE-257)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/867164", + "url": "https://hackerone.com/reports/867164" + }, + { + "refsource": "MISC", + "name": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-006", + "url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-006" + }, + { + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/pull/21037", + "url": "https://github.com/nextcloud/server/pull/21037" + }, + { + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/issues/17439", + "url": "https://github.com/nextcloud/server/issues/17439" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured." } ] } diff --git a/2021/20xxx/CVE-2021-20441.json b/2021/20xxx/CVE-2021-20441.json index 68688a1abe5..d82d0c3b105 100644 --- a/2021/20xxx/CVE-2021-20441.json +++ b/2021/20xxx/CVE-2021-20441.json @@ -1,90 +1,90 @@ { - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6421023", - "name" : "https://www.ibm.com/support/pages/node/6421023", - "title" : "IBM Security Bulletin 6421023 (Security Verify Bridge)" - }, - { - "name" : "ibm-svb-cve202120441-info-disc (196617)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196617" - } - ] - }, - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "value" : "IBM Security Verify Bridge uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196617.", - "lang" : "eng" - } - ] - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2021-20441", - "DATE_PUBLIC" : "2021-03-02T00:00:00" - }, - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "" - } - ] - }, - "product_name" : "Security Verify Bridge" - } - ] - }, - "vendor_name" : "IBM" + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6421023", + "name": "https://www.ibm.com/support/pages/node/6421023", + "title": "IBM Security Bulletin 6421023 (Security Verify Bridge)" + }, + { + "name": "ibm-svb-cve202120441-info-disc (196617)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196617" } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "I" : "N", - "SCORE" : "5.900", - "UI" : "N", - "AC" : "H", - "C" : "H", - "PR" : "N", - "AV" : "N", - "S" : "U", - "A" : "N" - } - } - } -} + ] + }, + "data_type": "CVE", + "description": { + "description_data": [ + { + "value": "IBM Security Verify Bridge uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196617.", + "lang": "eng" + } + ] + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2021-20441", + "DATE_PUBLIC": "2021-03-02T00:00:00" + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "" + } + ] + }, + "product_name": "Security Verify Bridge" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "I": "N", + "SCORE": "5.900", + "UI": "N", + "AC": "H", + "C": "H", + "PR": "N", + "AV": "N", + "S": "U", + "A": "N" + } + } + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20442.json b/2021/20xxx/CVE-2021-20442.json index 532e377448c..50dcb616c0d 100644 --- a/2021/20xxx/CVE-2021-20442.json +++ b/2021/20xxx/CVE-2021-20442.json @@ -1,90 +1,90 @@ { - "description" : { - "description_data" : [ - { - "value" : "IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618.", - "lang" : "eng" - } - ] - }, - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6421025", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6421025 (Security Verify Bridge)", - "name" : "https://www.ibm.com/support/pages/node/6421025" - }, - { - "name" : "ibm-svb-cve202120442-info-disc (196618)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196618" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "AV" : "N", - "A" : "N", - "S" : "U", - "I" : "N", - "UI" : "N", - "AC" : "H", - "SCORE" : "5.900", - "PR" : "N", - "C" : "H" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "description": { + "description_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "" - } - ] - }, - "product_name" : "Security Verify Bridge" - } - ] - } + "value": "IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618.", + "lang": "eng" } - ] - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + ] + }, + "data_type": "CVE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6421025", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6421025 (Security Verify Bridge)", + "name": "https://www.ibm.com/support/pages/node/6421025" + }, + { + "name": "ibm-svb-cve202120442-info-disc (196618)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196618" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "A": "N", + "S": "U", + "I": "N", + "UI": "N", + "AC": "H", + "SCORE": "5.900", + "PR": "N", + "C": "H" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "" + } + ] + }, + "product_name": "Security Verify Bridge" + } + ] + } + } ] - } - ] - }, - "data_format" : "MITRE", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2021-03-02T00:00:00", - "ID" : "CVE-2021-20442", - "ASSIGNER" : "psirt@us.ibm.com" - } -} + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_format": "MITRE", + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-03-02T00:00:00", + "ID": "CVE-2021-20442", + "ASSIGNER": "psirt@us.ibm.com" + } +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21978.json b/2021/21xxx/CVE-2021-21978.json index 5b369e74e38..e8a29e71673 100644 --- a/2021/21xxx/CVE-2021-21978.json +++ b/2021/21xxx/CVE-2021-21978.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21978", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@vmware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "VMware View Planner", + "version": { + "version_data": [ + { + "version_value": "VMware View Planner 4.x prior to 4.6 Security Patch 1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote code execution vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.vmware.com/security/advisories/VMSA-2021-0003.html", + "url": "https://www.vmware.com/security/advisories/VMSA-2021-0003.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container." } ] } diff --git a/2021/22xxx/CVE-2021-22182.json b/2021/22xxx/CVE-2021-22182.json index 423583e8ddd..fe07ea9fca9 100644 --- a/2021/22xxx/CVE-2021-22182.json +++ b/2021/22xxx/CVE-2021-22182.json @@ -4,15 +4,94 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22182", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.8, <13.8.2" + }, + { + "version_value": ">=13.7, <13.7.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/280779", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/280779", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1030189", + "url": "https://hackerone.com/reports/1030189", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22182.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22182.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab affecting all versions starting with 13.7. GitLab was vulnerable to a stored XSS in merge request." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 3.5, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [ashish_r_padelkar](https://hackerone.com/ashish_r_padelkar) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22188.json b/2021/22xxx/CVE-2021-22188.json index 879c2bc4f08..c57624939ca 100644 --- a/2021/22xxx/CVE-2021-22188.json +++ b/2021/22xxx/CVE-2021-22188.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22188", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.8, <13.8.4" + }, + { + "version_value": ">=13.7, <13.7.7" + }, + { + "version_value": ">=13.0, <13.6.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/227040", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/227040", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/916340", + "url": "https://hackerone.com/reports/916340", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22188.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22188.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab affecting all versions starting with 13.0. Confidential issue titles in Gitlab were readable by an unauthorised user via branch logs." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks aemirercin for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22681.json b/2021/22xxx/CVE-2021-22681.json index 73f60f778b5..d7b0cb6989d 100644 --- a/2021/22xxx/CVE-2021-22681.json +++ b/2021/22xxx/CVE-2021-22681.json @@ -4,14 +4,79 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22681", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Rockwell Automation Studio 5000 Logix Designer, RSLogix 5000, Logix Controllers", + "version": { + "version_data": [ + { + "version_value": "RSLogix 5000 Versions 16 through 20" + }, + { + "version_value": "Studio 5000 Logix Designer: Versions 21 and later" + }, + { + "version_value": "CompactLogix 1768, 1769, 5370, 5380, 5480" + }, + { + "version_value": "ControlLogix 5550, 5560, 5570, 5580" + }, + { + "version_value": "DriveLogix 5560, 5730, 1794-L34" + }, + { + "version_value": "Compact GuardLogix 5370, 5380" + }, + { + "version_value": "GuardLogix 5570, 5580" + }, + { + "version_value": "SoftLogix 5800" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficiently Protected Credentials CWE-522" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800." } ] } diff --git a/2021/22xxx/CVE-2021-22877.json b/2021/22xxx/CVE-2021-22877.json index 235538994a7..139bb01d39a 100644 --- a/2021/22xxx/CVE-2021-22877.json +++ b/2021/22xxx/CVE-2021-22877.json @@ -4,14 +4,73 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22877", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Nextcloud Server", + "version": { + "version_data": [ + { + "version_value": "Fixed in 20.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control - Generic (CWE-284)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1061591", + "url": "https://hackerone.com/reports/1061591" + }, + { + "refsource": "MISC", + "name": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-004", + "url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-004" + }, + { + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/issues/24600", + "url": "https://github.com/nextcloud/server/issues/24600" + }, + { + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/pull/25224", + "url": "https://github.com/nextcloud/server/pull/25224" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet." } ] } diff --git a/2021/22xxx/CVE-2021-22878.json b/2021/22xxx/CVE-2021-22878.json index c278d5032c4..c6be9d6488d 100644 --- a/2021/22xxx/CVE-2021-22878.json +++ b/2021/22xxx/CVE-2021-22878.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22878", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Nextcloud Server", + "version": { + "version_data": [ + { + "version_value": "Fixed in 20.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (XSS) - Reflected (CWE-79)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/896522", + "url": "https://hackerone.com/reports/896522" + }, + { + "refsource": "MISC", + "name": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-005", + "url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-005" + }, + { + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/pull/25234", + "url": "https://github.com/nextcloud/server/pull/25234" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`." } ] } diff --git a/2021/22xxx/CVE-2021-22883.json b/2021/22xxx/CVE-2021-22883.json index 5f3950f7997..2cf8e4ebc5c 100644 --- a/2021/22xxx/CVE-2021-22883.json +++ b/2021/22xxx/CVE-2021-22883.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22883", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "https://github.com/nodejs/node", + "version": { + "version_data": [ + { + "version_value": "Fixed in 10.24.0, 12.21.0, 14.16.0, 15.10.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (CWE-400)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/", + "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" + }, + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1043360", + "url": "https://hackerone.com/reports/1043360" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory." } ] } diff --git a/2021/22xxx/CVE-2021-22884.json b/2021/22xxx/CVE-2021-22884.json index 2db40f303d7..cc788ae965e 100644 --- a/2021/22xxx/CVE-2021-22884.json +++ b/2021/22xxx/CVE-2021-22884.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22884", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "https://github.com/nodejs/node", + "version": { + "version_data": [ + { + "version_value": "Fixed in 10.24.0, 12.21.0, 14.16.0, 15.10.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reliance on Reverse DNS Resolution for a Security-Critical Action (CWE-350)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/1069487", + "url": "https://hackerone.com/reports/1069487" + }, + { + "refsource": "MISC", + "name": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/", + "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" + }, + { + "refsource": "MISC", + "name": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160", + "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160." } ] } diff --git a/2021/27xxx/CVE-2021-27804.json b/2021/27xxx/CVE-2021-27804.json index de1fe305978..4e815d941f8 100644 --- a/2021/27xxx/CVE-2021-27804.json +++ b/2021/27xxx/CVE-2021-27804.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20210302 Multiple Vulnerabilities in jpeg-xl (CVE-2021-27804)", "url": "http://seclists.org/fulldisclosure/2021/Mar/2" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html", + "url": "http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html" } ] } From 084f8094e6df9d81c97f0d415615df156805573e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 19:00:39 +0000 Subject: [PATCH 082/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27839.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27928.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27929.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27930.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27931.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27932.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27933.json | 18 ++++++++++ 7 files changed, 163 insertions(+), 6 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27928.json create mode 100644 2021/27xxx/CVE-2021-27929.json create mode 100644 2021/27xxx/CVE-2021-27930.json create mode 100644 2021/27xxx/CVE-2021-27931.json create mode 100644 2021/27xxx/CVE-2021-27932.json create mode 100644 2021/27xxx/CVE-2021-27933.json diff --git a/2021/27xxx/CVE-2021-27839.json b/2021/27xxx/CVE-2021-27839.json index 462cd53ddc9..a2b823e85cd 100644 --- a/2021/27xxx/CVE-2021-27839.json +++ b/2021/27xxx/CVE-2021-27839.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27839", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27839", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CSV injection vulnerability found in Online Invoicing System (OIS) 4.3 and below can be exploited by users to perform malicious actions such as redirecting admins to unknown or harmful websites, or disclosing other clients' details that the user did not have access to." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bigprof-software/online-invoicing-system/releases/tag/4.4", + "refsource": "MISC", + "name": "https://github.com/bigprof-software/online-invoicing-system/releases/tag/4.4" + }, + { + "url": "https://www.jinsonvarghese.com/csv-injection-in-online-invoicing-system/", + "refsource": "MISC", + "name": "https://www.jinsonvarghese.com/csv-injection-in-online-invoicing-system/" } ] } diff --git a/2021/27xxx/CVE-2021-27928.json b/2021/27xxx/CVE-2021-27928.json new file mode 100644 index 00000000000..d44bedd7d63 --- /dev/null +++ b/2021/27xxx/CVE-2021-27928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27929.json b/2021/27xxx/CVE-2021-27929.json new file mode 100644 index 00000000000..5be4e2eef5f --- /dev/null +++ b/2021/27xxx/CVE-2021-27929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27930.json b/2021/27xxx/CVE-2021-27930.json new file mode 100644 index 00000000000..05d4e87069d --- /dev/null +++ b/2021/27xxx/CVE-2021-27930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27931.json b/2021/27xxx/CVE-2021-27931.json new file mode 100644 index 00000000000..f0796d51fbc --- /dev/null +++ b/2021/27xxx/CVE-2021-27931.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27931", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27932.json b/2021/27xxx/CVE-2021-27932.json new file mode 100644 index 00000000000..94ef4fb5f01 --- /dev/null +++ b/2021/27xxx/CVE-2021-27932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27933.json b/2021/27xxx/CVE-2021-27933.json new file mode 100644 index 00000000000..9ca9778ff5d --- /dev/null +++ b/2021/27xxx/CVE-2021-27933.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27933", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 27ac19511bb0c765cac69cd426c0e802c7822f3f Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 3 Mar 2021 12:20:14 -0700 Subject: [PATCH 083/845] Add CVE-2021-21312 for GHSA-c7f6-3mr7-3rq2 --- 2021/21xxx/CVE-2021-21312.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21312.json b/2021/21xxx/CVE-2021-21312.json index d3c090af060..eacffcc0528 100644 --- a/2021/21xxx/CVE-2021-21312.json +++ b/2021/21xxx/CVE-2021-21312.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21312", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored XSS on documents" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/document.form.php endpoint), indeed one of the form field: \"Web Link\" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: \" accesskey=\"x\" onclick=\"alert(1)\" x=\", the content will be saved within the database without any control. \n\nAnd then once you return to the summary documents page, by clicking on the \"Web Link\" of the newly created file it will create a new empty tab, but on the initial tab the pop-up \"1\" will appear." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-c7f6-3mr7-3rq2", + "discovery": "UNKNOWN" } } \ No newline at end of file From 46400e81bc9edf0c6a1789d00bd348eb01f5b511 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 3 Mar 2021 12:23:21 -0700 Subject: [PATCH 084/845] Add CVE-2021-21313 for GHSA-h4hj-mrpg-xfgx --- 2021/21xxx/CVE-2021-21313.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21313.json b/2021/21xxx/CVE-2021-21313.json index 247e1f6037a..fc2ebe52d1f 100644 --- a/2021/21xxx/CVE-2021-21313.json +++ b/2021/21xxx/CVE-2021-21313.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21313", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "XSS on tabs" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not properly sanitized. Here are two payloads (due to two different exploitations depending on which parameter you act) to exploit the vulnerability:/ajax/common.tabs.php?_target=javascript:alert(document.cookie)&_itemtype=DisplayPreference&_glpi_tab=DisplayPreference$2&id=258&displaytype=Ticket (Payload triggered if you click on the button). /ajax/common.tabs.php?_target=/front/ticket.form.php&_itemtype=Ticket&_glpi_tab=Ticket$1&id=(){};(function%20(){alert(document.cookie);})();function%20a&#." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-h4hj-mrpg-xfgx", + "discovery": "UNKNOWN" } } \ No newline at end of file From 4ec5ca5bb14a85320a775d34d3e3323d609e6f42 Mon Sep 17 00:00:00 2001 From: Wayne Beaton Date: Wed, 3 Mar 2021 14:24:10 -0500 Subject: [PATCH 085/845] Update CVE-2020-27224 Contributed by @JLLeitschuh Signed-off-by: Wayne Beaton --- 2020/27xxx/CVE-2020-27224.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27224.json b/2020/27xxx/CVE-2020-27224.json index 9696deb6b18..1532db9ce66 100644 --- a/2020/27xxx/CVE-2020-27224.json +++ b/2020/27xxx/CVE-2020-27224.json @@ -58,6 +58,11 @@ "name": "https://github.com/eclipse-theia/theia/issues/7954", "refsource": "CONFIRM", "url": "https://github.com/eclipse-theia/theia/issues/7954" + }, + { + "name": "https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/", + "refsource": "CONFIRM", + "url": "https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/" } ] } From e2fba74aefff93059a4745bbb6d6c94f3fd1450e Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 3 Mar 2021 12:29:06 -0700 Subject: [PATCH 086/845] Add CVE-2021-21314 for GHSA-2w7j-xgj7-3xgg --- 2021/21xxx/CVE-2021-21314.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21314.json b/2021/21xxx/CVE-2021-21314.json index b13a76a6d95..8cca7dcfe62 100644 --- a/2021/21xxx/CVE-2021-21314.json +++ b/2021/21xxx/CVE-2021-21314.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21314", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "XSS injection on ticket update" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-2w7j-xgj7-3xgg", + "discovery": "UNKNOWN" } } \ No newline at end of file From 739a9fb9af9c0ca586eac8792edf2fac84852574 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 20:00:45 +0000 Subject: [PATCH 087/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++ 2021/21xxx/CVE-2021-21312.json | 12 +++---- 2021/21xxx/CVE-2021-21314.json | 10 +++--- 2021/27xxx/CVE-2021-27931.json | 56 ++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27934.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27935.json | 62 ++++++++++++++++++++++++++++++++++ 6 files changed, 146 insertions(+), 17 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27934.json create mode 100644 2021/27xxx/CVE-2021-27935.json diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index cec7aba85de..29fd9ce51f0 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -380,6 +380,11 @@ "refsource": "MLIST", "name": "[iotdb-reviews] 20210303 [GitHub] [iotdb] wangchao316 commented on pull request #2768: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210303 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/21xxx/CVE-2021-21312.json b/2021/21xxx/CVE-2021-21312.json index eacffcc0528..2dceaf61604 100644 --- a/2021/21xxx/CVE-2021-21312.json +++ b/2021/21xxx/CVE-2021-21312.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/document.form.php endpoint), indeed one of the form field: \"Web Link\" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: \" accesskey=\"x\" onclick=\"alert(1)\" x=\", the content will be saved within the database without any control. \n\nAnd then once you return to the summary documents page, by clicking on the \"Web Link\" of the newly created file it will create a new empty tab, but on the initial tab the pop-up \"1\" will appear." + "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/document.form.php endpoint), indeed one of the form field: \"Web Link\" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: \" accesskey=\"x\" onclick=\"alert(1)\" x=\", the content will be saved within the database without any control. And then once you return to the summary documents page, by clicking on the \"Web Link\" of the newly created file it will create a new empty tab, but on the initial tab the pop-up \"1\" will appear." } ] }, @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2" - }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2" } ] }, diff --git a/2021/21xxx/CVE-2021-21314.json b/2021/21xxx/CVE-2021-21314.json index 8cca7dcfe62..94bab174186 100644 --- a/2021/21xxx/CVE-2021-21314.json +++ b/2021/21xxx/CVE-2021-21314.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg" - }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg" } ] }, diff --git a/2021/27xxx/CVE-2021-27931.json b/2021/27xxx/CVE-2021-27931.json index f0796d51fbc..aa43a9fa2af 100644 --- a/2021/27xxx/CVE-2021-27931.json +++ b/2021/27xxx/CVE-2021-27931.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27931", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27931", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LumisXP (aka Lumis Experience Platform) before 10.0.0 allows unauthenticated blind XXE via an API request to PageControllerXml.jsp. One can send a request crafted with an XXE payload and achieve outcomes such as reading local server files or denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sl4cky/LumisXP-XXE---POC/blob/main/poc.txt", + "refsource": "MISC", + "name": "https://github.com/sl4cky/LumisXP-XXE---POC/blob/main/poc.txt" } ] } diff --git a/2021/27xxx/CVE-2021-27934.json b/2021/27xxx/CVE-2021-27934.json new file mode 100644 index 00000000000..330d91a592f --- /dev/null +++ b/2021/27xxx/CVE-2021-27934.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27934", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27935.json b/2021/27xxx/CVE-2021-27935.json new file mode 100644 index 00000000000..f1fbf363fc7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27935.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27935", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/AdguardTeam/AdGuardHome/issues/2470", + "refsource": "MISC", + "name": "https://github.com/AdguardTeam/AdGuardHome/issues/2470" + } + ] + } +} \ No newline at end of file From 5dd5411bacf16ea59585c19a6a57389a6bf893c2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 21:00:39 +0000 Subject: [PATCH 088/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3421.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3421.json diff --git a/2021/3xxx/CVE-2021-3421.json b/2021/3xxx/CVE-2021-3421.json new file mode 100644 index 00000000000..5c88d5a18b5 --- /dev/null +++ b/2021/3xxx/CVE-2021-3421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 86916c8d138998ff33a41c26c64b4a31c9c589fa Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 22:00:38 +0000 Subject: [PATCH 089/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 10 +++++ 2020/27xxx/CVE-2020-27223.json | 5 +++ 2021/27xxx/CVE-2021-27936.json | 18 +++++++++ 2021/27xxx/CVE-2021-27937.json | 18 +++++++++ 2021/27xxx/CVE-2021-27938.json | 18 +++++++++ 2021/27xxx/CVE-2021-27939.json | 18 +++++++++ 2021/27xxx/CVE-2021-27940.json | 67 ++++++++++++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3422.json | 18 +++++++++ 8 files changed, 172 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27936.json create mode 100644 2021/27xxx/CVE-2021-27937.json create mode 100644 2021/27xxx/CVE-2021-27938.json create mode 100644 2021/27xxx/CVE-2021-27939.json create mode 100644 2021/27xxx/CVE-2021-27940.json create mode 100644 2021/3xxx/CVE-2021-3422.json diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 29fd9ce51f0..db114b21723 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -385,6 +385,16 @@ "refsource": "MLIST", "name": "[beam-issues] 20210303 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210303 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210303 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index bddb83de006..44554cd1512 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -149,6 +149,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E", "url": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[activemq-gitbox] 20210303 [GitHub] [activemq] ehossack-aws opened a new pull request #616: Upgrade to Jetty 9.4.38.v20210224", + "url": "https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E" } ] } diff --git a/2021/27xxx/CVE-2021-27936.json b/2021/27xxx/CVE-2021-27936.json new file mode 100644 index 00000000000..9c1819d7710 --- /dev/null +++ b/2021/27xxx/CVE-2021-27936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27937.json b/2021/27xxx/CVE-2021-27937.json new file mode 100644 index 00000000000..4553833509f --- /dev/null +++ b/2021/27xxx/CVE-2021-27937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27938.json b/2021/27xxx/CVE-2021-27938.json new file mode 100644 index 00000000000..5c149abddbd --- /dev/null +++ b/2021/27xxx/CVE-2021-27938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27939.json b/2021/27xxx/CVE-2021-27939.json new file mode 100644 index 00000000000..92300bc555d --- /dev/null +++ b/2021/27xxx/CVE-2021-27939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27940.json b/2021/27xxx/CVE-2021-27940.json new file mode 100644 index 00000000000..9a9cb7dcf93 --- /dev/null +++ b/2021/27xxx/CVE-2021-27940.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27940", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openark/orchestrator/pull/1313", + "refsource": "MISC", + "name": "https://github.com/openark/orchestrator/pull/1313" + }, + { + "url": "https://github.com/openark/orchestrator/releases/tag/v3.2.4", + "refsource": "MISC", + "name": "https://github.com/openark/orchestrator/releases/tag/v3.2.4" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3422.json b/2021/3xxx/CVE-2021-3422.json new file mode 100644 index 00000000000..a64717bd0d5 --- /dev/null +++ b/2021/3xxx/CVE-2021-3422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 1c4016cc55c41c171bbe443639d6a3de15a1ba85 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 3 Mar 2021 15:56:14 -0700 Subject: [PATCH 090/845] Add CVE-2021-21331 for GHSA-2cxf-6567-7pp6 --- 2021/21xxx/CVE-2021-21331.json | 90 +++++++++++++++++++++++++++++++--- 1 file changed, 84 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21331.json b/2021/21xxx/CVE-2021-21331.json index ceb07f03b62..8bac4492e22 100644 --- a/2021/21xxx/CVE-2021-21331.json +++ b/2021/21xxx/CVE-2021-21331.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21331", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "DataDog API Client contains a Local Information Disclosure Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "datadog-api-client-java", + "version": { + "version_data": [ + { + "version_value": "< 1.0.0-beta.9" + } + ] + } + } + ] + }, + "vendor_name": "DataDog" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This issue has been patched in version 1.0.0-beta.9. \n\nAs a workaround one may specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-378: Creation of Temporary File With Insecure Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6", + "refsource": "CONFIRM", + "url": "https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6" + }, + { + "name": "https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9", + "refsource": "CONFIRM", + "url": "https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9" + } + ] + }, + "source": { + "advisory": "GHSA-2cxf-6567-7pp6", + "discovery": "UNKNOWN" } } \ No newline at end of file From 79cd7f0d8797c02949f1ac0156afd068703cb6e6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Mar 2021 23:00:43 +0000 Subject: [PATCH 091/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27941.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27941.json diff --git a/2021/27xxx/CVE-2021-27941.json b/2021/27xxx/CVE-2021-27941.json new file mode 100644 index 00000000000..2da5c25c661 --- /dev/null +++ b/2021/27xxx/CVE-2021-27941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 27c4961afa72602c182116b3d995953c4a29d7d4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 00:00:40 +0000 Subject: [PATCH 092/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21331.json | 2 +- 2021/27xxx/CVE-2021-27942.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27943.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27944.json | 18 ++++++++++++++++++ 4 files changed, 55 insertions(+), 1 deletion(-) create mode 100644 2021/27xxx/CVE-2021-27942.json create mode 100644 2021/27xxx/CVE-2021-27943.json create mode 100644 2021/27xxx/CVE-2021-27944.json diff --git a/2021/21xxx/CVE-2021-21331.json b/2021/21xxx/CVE-2021-21331.json index 8bac4492e22..c8bc98228be 100644 --- a/2021/21xxx/CVE-2021-21331.json +++ b/2021/21xxx/CVE-2021-21331.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This issue has been patched in version 1.0.0-beta.9. \n\nAs a workaround one may specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`." + "value": "The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This issue has been patched in version 1.0.0-beta.9. As a workaround one may specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`." } ] }, diff --git a/2021/27xxx/CVE-2021-27942.json b/2021/27xxx/CVE-2021-27942.json new file mode 100644 index 00000000000..901840ff8e7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27943.json b/2021/27xxx/CVE-2021-27943.json new file mode 100644 index 00000000000..513343b1d2b --- /dev/null +++ b/2021/27xxx/CVE-2021-27943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27944.json b/2021/27xxx/CVE-2021-27944.json new file mode 100644 index 00000000000..c18c255b9cc --- /dev/null +++ b/2021/27xxx/CVE-2021-27944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 5540cd679374bef8f5ba9464a1270df6ccaaa835 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 01:00:42 +0000 Subject: [PATCH 093/845] "-Synchronized-Data." --- 2020/8xxx/CVE-2020-8625.json | 10 ++++++++++ 2021/20xxx/CVE-2021-20247.json | 5 +++++ 2021/26xxx/CVE-2021-26937.json | 5 +++++ 3 files changed, 20 insertions(+) diff --git a/2020/8xxx/CVE-2020-8625.json b/2020/8xxx/CVE-2020-8625.json index 56a7eebb4aa..610462a7fd3 100644 --- a/2020/8xxx/CVE-2020-8625.json +++ b/2020/8xxx/CVE-2020-8625.json @@ -106,6 +106,16 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-195/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-195/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-0595625865", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-28f97e232d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/" } ] }, diff --git a/2021/20xxx/CVE-2021-20247.json b/2021/20xxx/CVE-2021-20247.json index 755cf1390d7..3195b7cbcf5 100644 --- a/2021/20xxx/CVE-2021-20247.json +++ b/2021/20xxx/CVE-2021-20247.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2021/02/22/1", "url": "https://www.openwall.com/lists/oss-security/2021/02/22/1" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-954ebabcf7", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXQLCK35QGRCRENRTGKJO4VVZGUXUJJ/" } ] }, diff --git a/2021/26xxx/CVE-2021-26937.json b/2021/26xxx/CVE-2021-26937.json index 2b2e0267ea0..35ace4636e3 100644 --- a/2021/26xxx/CVE-2021-26937.json +++ b/2021/26xxx/CVE-2021-26937.json @@ -81,6 +81,11 @@ "refsource": "DEBIAN", "name": "DSA-4861", "url": "https://www.debian.org/security/2021/dsa-4861" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5e9894a0c5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJWLXP45POUUYBJRRWPVAWNZDJTLYWVM/" } ] } From 01bd4a349c09e3d41491c51df678d4887a373ccb Mon Sep 17 00:00:00 2001 From: Bill Situ Date: Wed, 3 Mar 2021 19:31:33 -0800 Subject: [PATCH 094/845] Minor update to the text. On branch cna/Oracle/CVE-2021-2138 Changes to be committed: modified: 2021/2xxx/CVE-2021-2138.json --- 2021/2xxx/CVE-2021-2138.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/2xxx/CVE-2021-2138.json b/2021/2xxx/CVE-2021-2138.json index 32a4e5bcbe2..fc702b16ddb 100644 --- a/2021/2xxx/CVE-2021-2138.json +++ b/2021/2xxx/CVE-2021-2138.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Vulnerability in the Oracle Cloud Infrastructure Data Science Notebook Sessions. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Cloud Infrastructure Data Science Notebook Sessions executes to compromise Oracle Cloud Infrastructure Data Science Notebook Sessions. Successful attacks of this vulnerability can resultin unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data. All affected customers were notified of CVE-2021-2138 by Oracle. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)" + "value": "Vulnerability in the Oracle Cloud Infrastructure Data Science Notebook Sessions. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Cloud Infrastructure Data Science Notebook Sessions executes to compromise Oracle Cloud Infrastructure Data Science Notebook Sessions. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Data Science Notebook Sessions accessible data. All affected customers were notified of CVE-2021-2138 by Oracle. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)" } ] }, From a9d46125811eff7a30edebefedff37b3342c2c70 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 07:00:37 +0000 Subject: [PATCH 095/845] "-Synchronized-Data." --- 2019/18xxx/CVE-2019-18628.json | 67 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18629.json | 67 ++++++++++++++++++++++++++++++++++ 2 files changed, 134 insertions(+) create mode 100644 2019/18xxx/CVE-2019-18628.json create mode 100644 2019/18xxx/CVE-2019-18629.json diff --git a/2019/18xxx/CVE-2019-18628.json b/2019/18xxx/CVE-2019-18628.json new file mode 100644 index 00000000000..83ad4401e36 --- /dev/null +++ b/2019/18xxx/CVE-2019-18628.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18628", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow a user with administrative privileges to turn off data encryption on the device, thus leaving it open to potential cryptographic information disclosure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security.business.xerox.com", + "refsource": "MISC", + "name": "https://security.business.xerox.com" + }, + { + "refsource": "CONFIRM", + "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX20I_for_ALB80xx-C80xx_v1.1.pdf", + "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX20I_for_ALB80xx-C80xx_v1.1.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18629.json b/2019/18xxx/CVE-2019-18629.json new file mode 100644 index 00000000000..4612d00ac45 --- /dev/null +++ b/2019/18xxx/CVE-2019-18629.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18629", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a compromised private key." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security.business.xerox.com", + "refsource": "MISC", + "name": "https://security.business.xerox.com" + }, + { + "refsource": "CONFIRM", + "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX19AI_for_ALB80xx-C80xx_v1.1.pdf", + "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX19AI_for_ALB80xx-C80xx_v1.1.pdf" + } + ] + } +} \ No newline at end of file From 1a8b4f659d928bbde005ee5bc2d0cbd5fc7cbe10 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 08:01:03 +0000 Subject: [PATCH 096/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index db114b21723..ac8b6ab6c3a 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -395,6 +395,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210303 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210304 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E" } ] } From a8e145f8d943725136cfde0a29dec6bc48b16e31 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 13:00:48 +0000 Subject: [PATCH 097/845] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11945.json | 5 +++ 2020/16xxx/CVE-2020-16119.json | 7 +++- 2020/24xxx/CVE-2020-24036.json | 66 ++++++++++++++++++++++++++++++---- 2020/24xxx/CVE-2020-24912.json | 66 ++++++++++++++++++++++++++++++---- 2020/24xxx/CVE-2020-24913.json | 66 ++++++++++++++++++++++++++++++---- 2020/24xxx/CVE-2020-24914.json | 66 ++++++++++++++++++++++++++++++---- 2020/29xxx/CVE-2020-29443.json | 5 +++ 2020/8xxx/CVE-2020-8449.json | 5 +++ 2020/8xxx/CVE-2020-8450.json | 5 +++ 2020/8xxx/CVE-2020-8517.json | 5 +++ 2020/9xxx/CVE-2020-9492.json | 5 +++ 2021/26xxx/CVE-2021-26117.json | 5 +++ 2021/3xxx/CVE-2021-3326.json | 5 +++ 2021/3xxx/CVE-2021-3347.json | 5 +++ 14 files changed, 291 insertions(+), 25 deletions(-) diff --git a/2020/11xxx/CVE-2020-11945.json b/2020/11xxx/CVE-2020-11945.json index 820735c7d12..c2fe5139399 100644 --- a/2020/11xxx/CVE-2020-11945.json +++ b/2020/11xxx/CVE-2020-11945.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0004/" } ] } diff --git a/2020/16xxx/CVE-2020-16119.json b/2020/16xxx/CVE-2020-16119.json index c4616c152f6..fde7c10525d 100644 --- a/2020/16xxx/CVE-2020-16119.json +++ b/2020/16xxx/CVE-2020-16119.json @@ -154,6 +154,11 @@ "name": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695", "refsource": "UBUNTU", "url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0006/" } ] }, @@ -166,4 +171,4 @@ "discovery": "USER" }, "work_around": [] -} +} \ No newline at end of file diff --git a/2020/24xxx/CVE-2020-24036.json b/2020/24xxx/CVE-2020-24036.json index 9ee3bd7c863..2e1d50919b3 100644 --- a/2020/24xxx/CVE-2020-24036.json +++ b/2020/24xxx/CVE-2020-24036.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24036", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24036", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote user to execute malicious code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://forkcms.com", + "refsource": "MISC", + "name": "http://forkcms.com" + }, + { + "refsource": "MISC", + "name": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04", + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04" + }, + { + "refsource": "MISC", + "name": "https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036", + "url": "https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036" } ] } diff --git a/2020/24xxx/CVE-2020-24912.json b/2020/24xxx/CVE-2020-24912.json index fca810c56ee..3f9afd9f5bf 100644 --- a/2020/24xxx/CVE-2020-24912.json +++ b/2020/24xxx/CVE-2020-24912.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24912", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24912", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://qcubed.com", + "refsource": "MISC", + "name": "http://qcubed.com" + }, + { + "refsource": "MISC", + "name": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03", + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03" + }, + { + "refsource": "MISC", + "name": "https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912", + "url": "https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912" } ] } diff --git a/2020/24xxx/CVE-2020-24913.json b/2020/24xxx/CVE-2020-24913.json index 20945a19c10..8d254faa576 100644 --- a/2020/24xxx/CVE-2020-24913.json +++ b/2020/24xxx/CVE-2020-24913.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24913", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24913", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://qcubed.com", + "refsource": "MISC", + "name": "http://qcubed.com" + }, + { + "refsource": "MISC", + "name": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-02", + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-02" + }, + { + "refsource": "MISC", + "name": "https://tech.feedyourhead.at/content/QCubed-SQL-Injection-CVE-2020-24913", + "url": "https://tech.feedyourhead.at/content/QCubed-SQL-Injection-CVE-2020-24913" } ] } diff --git a/2020/24xxx/CVE-2020-24914.json b/2020/24xxx/CVE-2020-24914.json index 2e6386ae457..e1f2697b752 100644 --- a/2020/24xxx/CVE-2020-24914.json +++ b/2020/24xxx/CVE-2020-24914.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24914", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24914", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A PHP object injection bug in profile.php in qcubed (all versions including 3.1.1) unserializes the untrusted data of the POST-variable \"strProfileData\" and allows an unauthenticated attacker to execute code via a crafted POST request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://qcubed.com", + "refsource": "MISC", + "name": "http://qcubed.com" + }, + { + "refsource": "MISC", + "name": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-01", + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-01" + }, + { + "refsource": "MISC", + "name": "https://tech.feedyourhead.at/content/QCubed-PHP-Object-Injection-CVE-2020-24914", + "url": "https://tech.feedyourhead.at/content/QCubed-PHP-Object-Injection-CVE-2020-24914" } ] } diff --git a/2020/29xxx/CVE-2020-29443.json b/2020/29xxx/CVE-2020-29443.json index d8860e54b4c..a67ba320823 100644 --- a/2020/29xxx/CVE-2020-29443.json +++ b/2020/29xxx/CVE-2020-29443.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0003/" } ] } diff --git a/2020/8xxx/CVE-2020-8449.json b/2020/8xxx/CVE-2020-8449.json index c210a55edde..cc291792f14 100644 --- a/2020/8xxx/CVE-2020-8449.json +++ b/2020/8xxx/CVE-2020-8449.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0002/" } ] } diff --git a/2020/8xxx/CVE-2020-8450.json b/2020/8xxx/CVE-2020-8450.json index cbbc6d2319d..45c56955673 100644 --- a/2020/8xxx/CVE-2020-8450.json +++ b/2020/8xxx/CVE-2020-8450.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0002/" } ] } diff --git a/2020/8xxx/CVE-2020-8517.json b/2020/8xxx/CVE-2020-8517.json index 1e43ef0b068..b1fa67fb265 100644 --- a/2020/8xxx/CVE-2020-8517.json +++ b/2020/8xxx/CVE-2020-8517.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0623", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0002/" } ] } diff --git a/2020/9xxx/CVE-2020-9492.json b/2020/9xxx/CVE-2020-9492.json index f92d60507b4..797c3bf87b5 100644 --- a/2020/9xxx/CVE-2020-9492.json +++ b/2020/9xxx/CVE-2020-9492.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20210225 [GitHub] [druid] liangrui1988 commented on pull request #10847: Suppress CVE-2020-9492 for hadoop-mapreduce-client-core", "url": "https://lists.apache.org/thread.html/r0a534f1cde7555f7208e9f9b791c1ab396d215eaaef283b3a9153429@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0001/" } ] }, diff --git a/2021/26xxx/CVE-2021-26117.json b/2021/26xxx/CVE-2021-26117.json index c72c65f2041..ba8fcc8f089 100644 --- a/2021/26xxx/CVE-2021-26117.json +++ b/2021/26xxx/CVE-2021-26117.json @@ -94,6 +94,11 @@ "refsource": "MLIST", "name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0008/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0008/" } ] }, diff --git a/2021/3xxx/CVE-2021-3326.json b/2021/3xxx/CVE-2021-3326.json index 68ce4cfae2e..c391027dd98 100644 --- a/2021/3xxx/CVE-2021-3326.json +++ b/2021/3xxx/CVE-2021-3326.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210128 Re: glibc iconv crash with ISO-2022-JP-3", "url": "http://www.openwall.com/lists/oss-security/2021/01/28/2" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0007/" } ] } diff --git a/2021/3xxx/CVE-2021-3347.json b/2021/3xxx/CVE-2021-3347.json index 38c39e67f07..217d776e76a 100644 --- a/2021/3xxx/CVE-2021-3347.json +++ b/2021/3xxx/CVE-2021-3347.json @@ -136,6 +136,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0005/" } ] } From 0cd3b1fc1bf13f03db8c80811a37eea49840dfb3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 15:00:39 +0000 Subject: [PATCH 098/845] "-Synchronized-Data." --- 2021/22xxx/CVE-2021-22183.json | 90 ++++++++++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22189.json | 85 ++++++++++++++++++++++++++++++-- 2 files changed, 167 insertions(+), 8 deletions(-) diff --git a/2021/22xxx/CVE-2021-22183.json b/2021/22xxx/CVE-2021-22183.json index 213b7a6b7f4..c66a49ebc91 100644 --- a/2021/22xxx/CVE-2021-22183.json +++ b/2021/22xxx/CVE-2021-22183.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22183", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.8, <13.8.2" + }, + { + "version_value": ">=13.7, <13.7.6" + }, + { + "version_value": ">=11.8, <13.6.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/294176", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/294176", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1055814", + "url": "https://hackerone.com/reports/1055814", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22183.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22183.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab affecting all versions starting with 11.8. GitLab was vulnerable to a stored XSS in the epics page, which could be exploited with user interactions." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [mike12](https://hackerone.com/mike12) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22189.json b/2021/22xxx/CVE-2021-22189.json index cda46a62d98..2c9eee28603 100644 --- a/2021/22xxx/CVE-2021-22189.json +++ b/2021/22xxx/CVE-2021-22189.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22189", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.8.0, <13.8.4" + }, + { + "version_value": ">=13.7.0, <13.7.7" + }, + { + "version_value": "<13.6.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper certificate validation in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/296557", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/296557", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22189.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22189.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Starting with version 13.7 the Gitlab CE/EE editions were affected by a security issue related to the validation of the certificates for the Fortinet OTP that could result in authentication issues." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file From 0b62a28e14d283ff248168a9208c3e260bcc527d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 16:00:37 +0000 Subject: [PATCH 099/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35327.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35328.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35329.json | 56 ++++++++++++++++++++++++++++++---- 3 files changed, 150 insertions(+), 18 deletions(-) diff --git a/2020/35xxx/CVE-2020-35327.json b/2020/35xxx/CVE-2020-35327.json index 985c56a877a..016c2565185 100644 --- a/2020/35xxx/CVE-2020-35327.json +++ b/2020/35xxx/CVE-2020-35327.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35327", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35327", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerability was discovered in Courier Management System 1.0, which can be exploited via the ref_no (POST) parameter to admin_class.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49243", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49243" } ] } diff --git a/2020/35xxx/CVE-2020-35328.json b/2020/35xxx/CVE-2020-35328.json index 22031cb9f2d..1351fb03b84 100644 --- a/2020/35xxx/CVE-2020-35328.json +++ b/2020/35xxx/CVE-2020-35328.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35328", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35328", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Courier Management System 1.0 - 'First Name' Stored XSS" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49241", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49241" } ] } diff --git a/2020/35xxx/CVE-2020-35329.json b/2020/35xxx/CVE-2020-35329.json index 0b215f27dc5..86f774b1002 100644 --- a/2020/35xxx/CVE-2020-35329.json +++ b/2020/35xxx/CVE-2020-35329.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35329", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35329", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Courier Management System 1.0 1.0 is affected by SQL Injection via 'MULTIPART street '." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49242", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49242" } ] } From 7f25c5891e17a48c066bf49432cb1b8d5ae57f47 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Thu, 4 Mar 2021 18:50:24 +0200 Subject: [PATCH 100/845] Adds CVE-2021-23346 --- 2021/23xxx/CVE-2021-23346.json | 114 +++++++++++++++++++++++++++++++-- 1 file changed, 110 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23346.json b/2021/23xxx/CVE-2021-23346.json index 7dd798f1336..424aa8bc6ff 100644 --- a/2021/23xxx/CVE-2021-23346.json +++ b/2021/23xxx/CVE-2021-23346.json @@ -3,16 +3,122 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-04T16:50:22.856243Z", "ID": "CVE-2021-23346", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Regular Expression Denial of Service (ReDoS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "html-parse-stringify", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2.0.1" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + }, + { + "product": { + "product_data": [ + { + "product_name": "html-parse-stringify2", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Regular Expression Denial of Service (ReDoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2.\n Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:R", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Yeting Li" + } + ] } \ No newline at end of file From 2605da3728afafa8ef79e2c458ab0f4569c61a8d Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Thu, 4 Mar 2021 18:52:37 +0200 Subject: [PATCH 101/845] Adds CVE-2021-23344 --- 2021/23xxx/CVE-2021-23344.json | 84 ++++++++++++++++++++++++++++++++-- 1 file changed, 80 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23344.json b/2021/23xxx/CVE-2021-23344.json index 8bb8284ed37..ded1cf42f81 100644 --- a/2021/23xxx/CVE-2021-23344.json +++ b/2021/23xxx/CVE-2021-23344.json @@ -3,16 +3,92 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-04T16:52:36.196770Z", "ID": "CVE-2021-23344", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Remote Code Execution (RCE)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "total.js", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "3.4.8" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution (RCE)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.\r\n\r\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Chiao-Lin" + }, + { + "lang": "eng", + "value": "Yu" + } + ] } \ No newline at end of file From c42e3817efcd8c88913f63a542ffaadb7923e59d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 17:00:40 +0000 Subject: [PATCH 102/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23344.json | 12 +++++++----- 2021/27xxx/CVE-2021-27885.json | 5 +++++ 2021/27xxx/CVE-2021-27945.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27946.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27947.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27948.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27949.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27950.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27951.json | 18 ++++++++++++++++++ 9 files changed, 138 insertions(+), 5 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27945.json create mode 100644 2021/27xxx/CVE-2021-27946.json create mode 100644 2021/27xxx/CVE-2021-27947.json create mode 100644 2021/27xxx/CVE-2021-27948.json create mode 100644 2021/27xxx/CVE-2021-27949.json create mode 100644 2021/27xxx/CVE-2021-27950.json create mode 100644 2021/27xxx/CVE-2021-27951.json diff --git a/2021/23xxx/CVE-2021-23344.json b/2021/23xxx/CVE-2021-23344.json index ded1cf42f81..9541122fcb3 100644 --- a/2021/23xxx/CVE-2021-23344.json +++ b/2021/23xxx/CVE-2021-23344.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069", + "name": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069" }, { - "refsource": "CONFIRM", - "url": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04" + "refsource": "MISC", + "url": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04", + "name": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.\r\n\r\n" + "value": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set." } ] }, diff --git a/2021/27xxx/CVE-2021-27885.json b/2021/27xxx/CVE-2021-27885.json index d1b3a47c50f..47aa5a5f8c6 100644 --- a/2021/27xxx/CVE-2021-27885.json +++ b/2021/27xxx/CVE-2021-27885.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/e107inc/e107/commit/d9efdb9b5f424b4996c276e754a380a5e251f472", "url": "https://github.com/e107inc/e107/commit/d9efdb9b5f424b4996c276e754a380a5e251f472" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html" } ] } diff --git a/2021/27xxx/CVE-2021-27945.json b/2021/27xxx/CVE-2021-27945.json new file mode 100644 index 00000000000..0a2574661c7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json new file mode 100644 index 00000000000..6bce2aa58cf --- /dev/null +++ b/2021/27xxx/CVE-2021-27946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json new file mode 100644 index 00000000000..2c05915b449 --- /dev/null +++ b/2021/27xxx/CVE-2021-27947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27948.json b/2021/27xxx/CVE-2021-27948.json new file mode 100644 index 00000000000..9b811dacc4b --- /dev/null +++ b/2021/27xxx/CVE-2021-27948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27949.json b/2021/27xxx/CVE-2021-27949.json new file mode 100644 index 00000000000..740b9f8f158 --- /dev/null +++ b/2021/27xxx/CVE-2021-27949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27950.json b/2021/27xxx/CVE-2021-27950.json new file mode 100644 index 00000000000..ebb9d4fe430 --- /dev/null +++ b/2021/27xxx/CVE-2021-27950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27951.json b/2021/27xxx/CVE-2021-27951.json new file mode 100644 index 00000000000..bc7230241af --- /dev/null +++ b/2021/27xxx/CVE-2021-27951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d938beb52df528172623b17880f29104f9ace8e7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 18:00:43 +0000 Subject: [PATCH 103/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23346.json | 32 ++++++++++-------- 2021/27xxx/CVE-2021-27217.json | 61 ++++++++++++++++++++++++++++++---- 2 files changed, 74 insertions(+), 19 deletions(-) diff --git a/2021/23xxx/CVE-2021-23346.json b/2021/23xxx/CVE-2021-23346.json index 424aa8bc6ff..a9558871048 100644 --- a/2021/23xxx/CVE-2021-23346.json +++ b/2021/23xxx/CVE-2021-23346.json @@ -66,28 +66,34 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306", + "name": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307", + "name": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633" }, { - "refsource": "CONFIRM", - "url": "https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2" + "refsource": "MISC", + "url": "https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2", + "name": "https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2" }, { - "refsource": "CONFIRM", - "url": "https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2" + "refsource": "MISC", + "url": "https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2", + "name": "https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2" }, { - "refsource": "CONFIRM", - "url": "https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12" + "refsource": "MISC", + "url": "https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12", + "name": "https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12" } ] }, @@ -95,7 +101,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2.\n Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.\n" + "value": "This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process." } ] }, diff --git a/2021/27xxx/CVE-2021-27217.json b/2021/27xxx/CVE-2021-27217.json index a682bfec9ea..56bcf2561c3 100644 --- a/2021/27xxx/CVE-2021-27217.json +++ b/2021/27xxx/CVE-2021-27217.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27217", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27217", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the _send_secure_msg() function of Yubico yubihsm-shell through 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device. Out-of-bounds reads performed by aes_remove_padding() can crash the running process, depending on the memory layout. This could be used by an attacker to cause a client-side denial of service. The yubihsm-shell project is included in the YubiHSM 2 SDK product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Yubico/yubihsm-shell/releases", + "refsource": "MISC", + "name": "https://github.com/Yubico/yubihsm-shell/releases" + }, + { + "refsource": "CONFIRM", + "name": "https://www.yubico.com/support/security-advisories/ysa-2021-01/", + "url": "https://www.yubico.com/support/security-advisories/ysa-2021-01/" } ] } From 635bd00eb6ed9133b6051881b52cb5e0b013ea5e Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Thu, 4 Mar 2021 13:59:30 -0500 Subject: [PATCH 104/845] IBM20210304-135930 Added CVE-2020-4975, CVE-2020-4856, CVE-2020-4863, CVE-2020-4857, CVE-2021-20351, CVE-2020-4866, CVE-2021-20350, CVE-2021-20340 --- 2020/4xxx/CVE-2020-4856.json | 197 ++++++++++++++++++++++++++++++--- 2020/4xxx/CVE-2020-4857.json | 197 ++++++++++++++++++++++++++++++--- 2020/4xxx/CVE-2020-4863.json | 197 ++++++++++++++++++++++++++++++--- 2020/4xxx/CVE-2020-4866.json | 197 ++++++++++++++++++++++++++++++--- 2020/4xxx/CVE-2020-4975.json | 197 ++++++++++++++++++++++++++++++--- 2021/20xxx/CVE-2021-20340.json | 197 ++++++++++++++++++++++++++++++--- 2021/20xxx/CVE-2021-20350.json | 197 ++++++++++++++++++++++++++++++--- 2021/20xxx/CVE-2021-20351.json | 197 ++++++++++++++++++++++++++++++--- 8 files changed, 1456 insertions(+), 120 deletions(-) diff --git a/2020/4xxx/CVE-2020-4856.json b/2020/4xxx/CVE-2020-4856.json index 4bbd20dca5c..889f65e8d3b 100644 --- a/2020/4xxx/CVE-2020-4856.json +++ b/2020/4xxx/CVE-2020-4856.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4856", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "Rational Team Concert", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Workflow Management" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Quality Manager" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Test Management" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Lifecycle Optimization" + }, + { + "product_name" : "Rational DOORS Next Generation", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "data_type" : "CVE", + "data_format" : "MITRE", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190459." + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6417585", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6417585", + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)" + }, + { + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190459", + "name" : "ibm-engineering-cve20204856-xss (190459)", + "title" : "X-Force Vulnerability Report" + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "PR" : "L", + "A" : "N", + "S" : "C", + "AC" : "L", + "AV" : "N", + "UI" : "N", + "C" : "L", + "SCORE" : "6.400", + "I" : "L" + }, + "TM" : { + "RL" : "O", + "E" : "H", + "RC" : "C" + } + } + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-Site Scripting" + } + ] + } + ] + }, + "CVE_data_meta" : { + "ID" : "CVE-2020-4856", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-02-26T00:00:00" + } +} diff --git a/2020/4xxx/CVE-2020-4857.json b/2020/4xxx/CVE-2020-4857.json index c6c695b49fe..77904f2408c 100644 --- a/2020/4xxx/CVE-2020-4857.json +++ b/2020/4xxx/CVE-2020-4857.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4857", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "ID" : "CVE-2020-4857", + "DATE_PUBLIC" : "2021-02-26T00:00:00" + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RC" : "C", + "E" : "H", + "RL" : "O" + }, + "BM" : { + "PR" : "L", + "A" : "N", + "S" : "C", + "AC" : "L", + "AV" : "N", + "UI" : "N", + "C" : "L", + "SCORE" : "6.400", + "I" : "L" + } + } + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-Site Scripting" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", + "name" : "https://www.ibm.com/support/pages/node/6417585", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6417585" + }, + { + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190460", + "name" : "ibm-engineering-cve20204857-xss (190460)" + } + ] + }, + "description" : { + "description_data" : [ + { + "value" : "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190460.", + "lang" : "eng" + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Quality Manager" + }, + { + "product_name" : "Rational Team Concert", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + }, + { + "product_name" : "Engineering Workflow Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Test Management" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Rational DOORS Next Generation" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Lifecycle Optimization" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_type" : "CVE", + "data_format" : "MITRE" +} diff --git a/2020/4xxx/CVE-2020-4863.json b/2020/4xxx/CVE-2020-4863.json index d5d87d4df4e..4bcd8863186 100644 --- a/2020/4xxx/CVE-2020-4863.json +++ b/2020/4xxx/CVE-2020-4863.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4863", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", + "url" : "https://www.ibm.com/support/pages/node/6417585", + "refsource" : "CONFIRM", + "name" : "https://www.ibm.com/support/pages/node/6417585" + }, + { + "title" : "X-Force Vulnerability Report", + "name" : "ibm-engineering-cve20204863-xss (190566)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190566" + } + ] + }, + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Quality Manager" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Workflow Management" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Team Concert" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Lifecycle Optimization" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Rational DOORS Next Generation" + }, + { + "product_name" : "Engineering Test Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format" : "MITRE", + "description" : { + "description_data" : [ + { + "value" : "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190566.", + "lang" : "eng" + } + ] + }, + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "ID" : "CVE-2020-4863", + "DATE_PUBLIC" : "2021-02-26T00:00:00" + }, + "data_version" : "4.0", + "impact" : { + "cvssv3" : { + "TM" : { + "E" : "H", + "RC" : "C", + "RL" : "O" + }, + "BM" : { + "UI" : "N", + "I" : "L", + "SCORE" : "6.400", + "C" : "L", + "AV" : "N", + "AC" : "L", + "PR" : "L", + "S" : "C", + "A" : "N" + } + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-Site Scripting" + } + ] + } + ] + } +} diff --git a/2020/4xxx/CVE-2020-4866.json b/2020/4xxx/CVE-2020-4866.json index 390a17ce7b6..5bbb282b710 100644 --- a/2020/4xxx/CVE-2020-4866.json +++ b/2020/4xxx/CVE-2020-4866.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4866", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "product_name" : "Engineering Workflow Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "product_name" : "Rational Team Concert", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Quality Manager" + }, + { + "product_name" : "Engineering Lifecycle Optimization", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Rational DOORS Next Generation" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Test Management" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format" : "MITRE", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190742." + } + ] + }, + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", + "name" : "https://www.ibm.com/support/pages/node/6417585", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6417585" + }, + { + "title" : "X-Force Vulnerability Report", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190742", + "refsource" : "XF", + "name" : "ibm-engineering-cve20204866-xss (190742)" + } + ] + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RL" : "O", + "RC" : "C", + "E" : "U" + }, + "BM" : { + "AC" : "L", + "A" : "N", + "S" : "C", + "PR" : "L", + "C" : "L", + "I" : "L", + "SCORE" : "5.400", + "UI" : "R", + "AV" : "N" + } + } + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Cross-Site Scripting", + "lang" : "eng" + } + ] + } + ] + }, + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-02-26T00:00:00", + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "ID" : "CVE-2020-4866" + } +} diff --git a/2020/4xxx/CVE-2020-4975.json b/2020/4xxx/CVE-2020-4975.json index 2b969fd7dc9..54561ff9b4e 100644 --- a/2020/4xxx/CVE-2020-4975.json +++ b/2020/4xxx/CVE-2020-4975.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4975", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", + "name" : "https://www.ibm.com/support/pages/node/6417585", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6417585" + }, + { + "name" : "ibm-jazz-cve20204975-xss (192435)", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192435", + "refsource" : "XF", + "title" : "X-Force Vulnerability Report" + } + ] + }, + "description" : { + "description_data" : [ + { + "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435.", + "lang" : "eng" + } + ] + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "Rational Team Concert", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + }, + { + "product_name" : "Engineering Workflow Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "product_name" : "Rational Quality Manager", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + }, + { + "product_name" : "Engineering Test Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Lifecycle Optimization" + }, + { + "product_name" : "Rational DOORS Next Generation", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-02-26T00:00:00", + "STATE" : "PUBLIC", + "ID" : "CVE-2020-4975", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Cross-Site Scripting", + "lang" : "eng" + } + ] + } + ] + }, + "data_version" : "4.0", + "impact" : { + "cvssv3" : { + "BM" : { + "PR" : "L", + "S" : "C", + "A" : "N", + "AC" : "L", + "AV" : "N", + "UI" : "R", + "SCORE" : "5.400", + "I" : "L", + "C" : "L" + }, + "TM" : { + "RL" : "O", + "E" : "H", + "RC" : "C" + } + } + } +} diff --git a/2021/20xxx/CVE-2021-20340.json b/2021/20xxx/CVE-2021-20340.json index 155ea68eac5..2966e51e63d 100644 --- a/2021/20xxx/CVE-2021-20340.json +++ b/2021/20xxx/CVE-2021-20340.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20340", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6417585", + "url" : "https://www.ibm.com/support/pages/node/6417585", + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)" + }, + { + "name" : "ibm-engineering-cve202120340-xss (194451)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194451", + "title" : "X-Force Vulnerability Report" + } + ] + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194451." + } + ] + }, + "data_format" : "MITRE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Rational DOORS Next Generation" + }, + { + "product_name" : "Engineering Lifecycle Optimization", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "product_name" : "Engineering Test Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Quality Manager" + }, + { + "product_name" : "Engineering Workflow Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "product_name" : "Rational Team Concert", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "data_type" : "CVE", + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-02-26T00:00:00", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2021-20340" + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-Site Scripting" + } + ] + } + ] + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RC" : "C", + "E" : "H", + "RL" : "O" + }, + "BM" : { + "A" : "N", + "S" : "C", + "PR" : "L", + "AC" : "L", + "AV" : "N", + "C" : "L", + "I" : "L", + "SCORE" : "5.400", + "UI" : "R" + } + } + }, + "data_version" : "4.0" +} diff --git a/2021/20xxx/CVE-2021-20350.json b/2021/20xxx/CVE-2021-20350.json index 52828b8f731..65548879625 100644 --- a/2021/20xxx/CVE-2021-20350.json +++ b/2021/20xxx/CVE-2021-20350.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20350", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_version" : "4.0", + "impact" : { + "cvssv3" : { + "BM" : { + "AV" : "N", + "C" : "L", + "I" : "L", + "SCORE" : "5.400", + "UI" : "R", + "A" : "N", + "S" : "C", + "PR" : "L", + "AC" : "L" + }, + "TM" : { + "RC" : "C", + "E" : "H", + "RL" : "O" + } + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-Site Scripting" + } + ] + } + ] + }, + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-02-26T00:00:00", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2021-20350" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "product_name" : "Rational Quality Manager", + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Team Concert" + }, + { + "product_name" : "Engineering Workflow Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Test Management" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Rational DOORS Next Generation" + }, + { + "product_name" : "Engineering Lifecycle Optimization", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_type" : "CVE", + "data_format" : "MITRE", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194707." + } + ] + }, + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6417585", + "name" : "https://www.ibm.com/support/pages/node/6417585" + }, + { + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194707", + "name" : "ibm-engineering-cve202120350-xss (194707)", + "title" : "X-Force Vulnerability Report" + } + ] + } +} diff --git a/2021/20xxx/CVE-2021-20351.json b/2021/20xxx/CVE-2021-20351.json index 6d90efce863..06eb9b024df 100644 --- a/2021/20xxx/CVE-2021-20351.json +++ b/2021/20xxx/CVE-2021-20351.json @@ -1,18 +1,185 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20351", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-02-26T00:00:00", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2021-20351" + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Cross-Site Scripting", + "lang" : "eng" + } + ] + } + ] + }, + "data_version" : "4.0", + "impact" : { + "cvssv3" : { + "BM" : { + "UI" : "R", + "C" : "L", + "I" : "L", + "SCORE" : "5.400", + "AV" : "N", + "AC" : "L", + "PR" : "L", + "A" : "N", + "S" : "C" + }, + "TM" : { + "E" : "U", + "RC" : "C", + "RL" : "O" + } + } + }, + "references" : { + "reference_data" : [ + { + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6417585", + "name" : "https://www.ibm.com/support/pages/node/6417585", + "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)" + }, + { + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194708", + "name" : "ibm-engineering-cve202120351-xss (194708)" + } + ] + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Team Concert" + }, + { + "product_name" : "Engineering Workflow Management", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + } + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + } + ] + }, + "product_name" : "Rational Quality Manager" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Test Management" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Engineering Lifecycle Optimization" + }, + { + "version" : { + "version_data" : [ + { + "version_value" : "6.0.2" + }, + { + "version_value" : "6.0.6" + }, + { + "version_value" : "6.0.6.1" + }, + { + "version_value" : "7.0" + }, + { + "version_value" : "7.0.1" + }, + { + "version_value" : "7.0.2" + } + ] + }, + "product_name" : "Rational DOORS Next Generation" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194708." + } + ] + } +} From f2e10de14f21d3a6a4d595ea7677b8d439a0b1b4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 19:00:41 +0000 Subject: [PATCH 105/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27952.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27953.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27954.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27955.json | 18 ++++++++++++++++++ 4 files changed, 72 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27952.json create mode 100644 2021/27xxx/CVE-2021-27953.json create mode 100644 2021/27xxx/CVE-2021-27954.json create mode 100644 2021/27xxx/CVE-2021-27955.json diff --git a/2021/27xxx/CVE-2021-27952.json b/2021/27xxx/CVE-2021-27952.json new file mode 100644 index 00000000000..69d6ad50fdf --- /dev/null +++ b/2021/27xxx/CVE-2021-27952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27953.json b/2021/27xxx/CVE-2021-27953.json new file mode 100644 index 00000000000..0daa42708a3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27954.json b/2021/27xxx/CVE-2021-27954.json new file mode 100644 index 00000000000..e58655d1bde --- /dev/null +++ b/2021/27xxx/CVE-2021-27954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27955.json b/2021/27xxx/CVE-2021-27955.json new file mode 100644 index 00000000000..2e41645f104 --- /dev/null +++ b/2021/27xxx/CVE-2021-27955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From cc7622d793400174e3e0f19039fa12269745fe5c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 20:00:42 +0000 Subject: [PATCH 106/845] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15297.json | 5 + 2020/28xxx/CVE-2020-28601.json | 50 ++++- 2020/28xxx/CVE-2020-28636.json | 50 ++++- 2020/35xxx/CVE-2020-35628.json | 50 ++++- 2020/35xxx/CVE-2020-35636.json | 50 ++++- 2020/4xxx/CVE-2020-4856.json | 366 ++++++++++++++++----------------- 2020/4xxx/CVE-2020-4857.json | 366 ++++++++++++++++----------------- 2020/4xxx/CVE-2020-4863.json | 362 ++++++++++++++++---------------- 2020/4xxx/CVE-2020-4866.json | 366 ++++++++++++++++----------------- 2020/4xxx/CVE-2020-4975.json | 362 ++++++++++++++++---------------- 2020/8xxx/CVE-2020-8298.json | 60 +++++- 2021/20xxx/CVE-2021-20340.json | 362 ++++++++++++++++---------------- 2021/20xxx/CVE-2021-20350.json | 366 ++++++++++++++++----------------- 2021/20xxx/CVE-2021-20351.json | 364 ++++++++++++++++---------------- 14 files changed, 1707 insertions(+), 1472 deletions(-) diff --git a/2019/15xxx/CVE-2019-15297.json b/2019/15xxx/CVE-2019-15297.json index baf61fa815c..e32c3c43323 100644 --- a/2019/15xxx/CVE-2019-15297.json +++ b/2019/15xxx/CVE-2019-15297.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "http://downloads.asterisk.org/pub/security/AST-2019-004.html", "url": "http://downloads.asterisk.org/pub/security/AST-2019-004.html" + }, + { + "refsource": "FULLDISC", + "name": "20210304 AST-2021-006: Crash when negotiating T.38 with a zero port", + "url": "http://seclists.org/fulldisclosure/2021/Mar/5" } ] } diff --git a/2020/28xxx/CVE-2020-28601.json b/2020/28xxx/CVE-2020-28601.json index 7c508823ae6..2b1df1daf64 100644 --- a/2020/28xxx/CVE-2020-28601.json +++ b/2020/28xxx/CVE-2020-28601.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28601", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CGAL", + "version": { + "version_data": [ + { + "version_value": "CGAL Project libcgal CGAL-5.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability." } ] } diff --git a/2020/28xxx/CVE-2020-28636.json b/2020/28xxx/CVE-2020-28636.json index 4cdbf5daa86..52276187330 100644 --- a/2020/28xxx/CVE-2020-28636.json +++ b/2020/28xxx/CVE-2020-28636.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28636", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CGAL", + "version": { + "version_data": [ + { + "version_value": "CGAL Project libcgal CGAL-5.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability." } ] } diff --git a/2020/35xxx/CVE-2020-35628.json b/2020/35xxx/CVE-2020-35628.json index 063f3469364..b7ce6741101 100644 --- a/2020/35xxx/CVE-2020-35628.json +++ b/2020/35xxx/CVE-2020-35628.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35628", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CGAL", + "version": { + "version_data": [ + { + "version_value": "CGAL Project libcgal CGAL-5.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability." } ] } diff --git a/2020/35xxx/CVE-2020-35636.json b/2020/35xxx/CVE-2020-35636.json index 464093aa4d2..882becfbd5d 100644 --- a/2020/35xxx/CVE-2020-35636.json +++ b/2020/35xxx/CVE-2020-35636.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35636", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CGAL", + "version": { + "version_data": [ + { + "version_value": "CGAL Project libcgal CGAL-5.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume(). An attacker can provide malicious input to trigger this vulnerability." } ] } diff --git a/2020/4xxx/CVE-2020-4856.json b/2020/4xxx/CVE-2020-4856.json index 889f65e8d3b..64f088c9f3a 100644 --- a/2020/4xxx/CVE-2020-4856.json +++ b/2020/4xxx/CVE-2020-4856.json @@ -1,185 +1,185 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Rational Team Concert", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Workflow Management" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Quality Manager" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Test Management" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Lifecycle Optimization" - }, - { - "product_name" : "Rational DOORS Next Generation", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - } - ] - } - } - ] - } - }, - "data_type" : "CVE", - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190459." - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6417585", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6417585", - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190459", - "name" : "ibm-engineering-cve20204856-xss (190459)", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "PR" : "L", - "A" : "N", - "S" : "C", - "AC" : "L", - "AV" : "N", - "UI" : "N", - "C" : "L", - "SCORE" : "6.400", - "I" : "L" - }, - "TM" : { - "RL" : "O", - "E" : "H", - "RC" : "C" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Rational Team Concert", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Workflow Management" + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Quality Manager" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Test Management" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Lifecycle Optimization" + }, + { + "product_name": "Rational DOORS Next Generation", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-4856", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-02-26T00:00:00" - } -} + } + }, + "data_type": "CVE", + "data_format": "MITRE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190459." + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6417585", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6417585", + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190459", + "name": "ibm-engineering-cve20204856-xss (190459)", + "title": "X-Force Vulnerability Report" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "PR": "L", + "A": "N", + "S": "C", + "AC": "L", + "AV": "N", + "UI": "N", + "C": "L", + "SCORE": "6.400", + "I": "L" + }, + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + } + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2020-4856", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-02-26T00:00:00" + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4857.json b/2020/4xxx/CVE-2020-4857.json index 77904f2408c..a8816f25d6b 100644 --- a/2020/4xxx/CVE-2020-4857.json +++ b/2020/4xxx/CVE-2020-4857.json @@ -1,185 +1,185 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4857", - "DATE_PUBLIC" : "2021-02-26T00:00:00" - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "H", - "RL" : "O" - }, - "BM" : { - "PR" : "L", - "A" : "N", - "S" : "C", - "AC" : "L", - "AV" : "N", - "UI" : "N", - "C" : "L", - "SCORE" : "6.400", - "I" : "L" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", - "name" : "https://www.ibm.com/support/pages/node/6417585", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6417585" - }, - { - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190460", - "name" : "ibm-engineering-cve20204857-xss (190460)" - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190460.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Quality Manager" - }, - { - "product_name" : "Rational Team Concert", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - }, - { - "product_name" : "Engineering Workflow Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Test Management" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Lifecycle Optimization" - } - ] - }, - "vendor_name" : "IBM" + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2020-4857", + "DATE_PUBLIC": "2021-02-26T00:00:00" + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "H", + "RL": "O" + }, + "BM": { + "PR": "L", + "A": "N", + "S": "C", + "AC": "L", + "AV": "N", + "UI": "N", + "C": "L", + "SCORE": "6.400", + "I": "L" } - ] - } - }, - "data_type" : "CVE", - "data_format" : "MITRE" -} + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)", + "name": "https://www.ibm.com/support/pages/node/6417585", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6417585" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190460", + "name": "ibm-engineering-cve20204857-xss (190460)" + } + ] + }, + "description": { + "description_data": [ + { + "value": "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190460.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Quality Manager" + }, + { + "product_name": "Rational Team Concert", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + }, + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Test Management" + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Lifecycle Optimization" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_type": "CVE", + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4863.json b/2020/4xxx/CVE-2020-4863.json index 4bcd8863186..a6a2cbf5fc0 100644 --- a/2020/4xxx/CVE-2020-4863.json +++ b/2020/4xxx/CVE-2020-4863.json @@ -1,185 +1,185 @@ { - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", - "url" : "https://www.ibm.com/support/pages/node/6417585", - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6417585" - }, - { - "title" : "X-Force Vulnerability Report", - "name" : "ibm-engineering-cve20204863-xss (190566)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190566" - } - ] - }, - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Quality Manager" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Workflow Management" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Team Concert" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Lifecycle Optimization" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - }, - { - "product_name" : "Engineering Test Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)", + "url": "https://www.ibm.com/support/pages/node/6417585", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6417585" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-engineering-cve20204863-xss (190566)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190566" } - ] - } - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "value" : "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190566.", - "lang" : "eng" - } - ] - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4863", - "DATE_PUBLIC" : "2021-02-26T00:00:00" - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "H", - "RC" : "C", - "RL" : "O" - }, - "BM" : { - "UI" : "N", - "I" : "L", - "SCORE" : "6.400", - "C" : "L", - "AV" : "N", - "AC" : "L", - "PR" : "L", - "S" : "C", - "A" : "N" - } - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } + ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Quality Manager" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Workflow Management" + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Team Concert" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Lifecycle Optimization" + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + }, + { + "product_name": "Engineering Test Management", + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - } -} + } + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "value": "IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190566.", + "lang": "eng" + } + ] + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2020-4863", + "DATE_PUBLIC": "2021-02-26T00:00:00" + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "E": "H", + "RC": "C", + "RL": "O" + }, + "BM": { + "UI": "N", + "I": "L", + "SCORE": "6.400", + "C": "L", + "AV": "N", + "AC": "L", + "PR": "L", + "S": "C", + "A": "N" + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4866.json b/2020/4xxx/CVE-2020-4866.json index 5bbb282b710..9ddd71c8b24 100644 --- a/2020/4xxx/CVE-2020-4866.json +++ b/2020/4xxx/CVE-2020-4866.json @@ -1,185 +1,185 @@ { - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Engineering Workflow Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "product_name" : "Rational Team Concert", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Quality Manager" - }, - { - "product_name" : "Engineering Lifecycle Optimization", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Test Management" - } - ] - }, - "vendor_name" : "IBM" - } - ] - } - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190742." - } - ] - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", - "name" : "https://www.ibm.com/support/pages/node/6417585", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6417585" - }, - { - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190742", - "refsource" : "XF", - "name" : "ibm-engineering-cve20204866-xss (190742)" - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "AC" : "L", - "A" : "N", - "S" : "C", - "PR" : "L", - "C" : "L", - "I" : "L", - "SCORE" : "5.400", - "UI" : "R", - "AV" : "N" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Cross-Site Scripting", - "lang" : "eng" - } + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "product_name": "Rational Team Concert", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Quality Manager" + }, + { + "product_name": "Engineering Lifecycle Optimization", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Test Management" + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-02-26T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4866" - } -} + } + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190742." + } + ] + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)", + "name": "https://www.ibm.com/support/pages/node/6417585", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6417585" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190742", + "refsource": "XF", + "name": "ibm-engineering-cve20204866-xss (190742)" + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "AC": "L", + "A": "N", + "S": "C", + "PR": "L", + "C": "L", + "I": "L", + "SCORE": "5.400", + "UI": "R", + "AV": "N" + } + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-02-26T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2020-4866" + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4975.json b/2020/4xxx/CVE-2020-4975.json index 54561ff9b4e..d5533c3df2f 100644 --- a/2020/4xxx/CVE-2020-4975.json +++ b/2020/4xxx/CVE-2020-4975.json @@ -1,185 +1,185 @@ { - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", - "name" : "https://www.ibm.com/support/pages/node/6417585", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6417585" - }, - { - "name" : "ibm-jazz-cve20204975-xss (192435)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192435", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435.", - "lang" : "eng" - } - ] - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Rational Team Concert", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - }, - { - "product_name" : "Engineering Workflow Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "product_name" : "Rational Quality Manager", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - }, - { - "product_name" : "Engineering Test Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Lifecycle Optimization" - }, - { - "product_name" : "Rational DOORS Next Generation", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - } - ] - } + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)", + "name": "https://www.ibm.com/support/pages/node/6417585", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6417585" + }, + { + "name": "ibm-jazz-cve20204975-xss (192435)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192435", + "refsource": "XF", + "title": "X-Force Vulnerability Report" } - ] - } - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-02-26T00:00:00", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4975", - "ASSIGNER" : "psirt@us.ibm.com" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Cross-Site Scripting", - "lang" : "eng" - } + ] + }, + "description": { + "description_data": [ + { + "value": "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435.", + "lang": "eng" + } + ] + }, + "data_format": "MITRE", + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Rational Team Concert", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + }, + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "product_name": "Rational Quality Manager", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + }, + { + "product_name": "Engineering Test Management", + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Lifecycle Optimization" + }, + { + "product_name": "Rational DOORS Next Generation", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "BM" : { - "PR" : "L", - "S" : "C", - "A" : "N", - "AC" : "L", - "AV" : "N", - "UI" : "R", - "SCORE" : "5.400", - "I" : "L", - "C" : "L" - }, - "TM" : { - "RL" : "O", - "E" : "H", - "RC" : "C" - } - } - } -} + } + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-02-26T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2020-4975", + "ASSIGNER": "psirt@us.ibm.com" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] + } + ] + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "PR": "L", + "S": "C", + "A": "N", + "AC": "L", + "AV": "N", + "UI": "R", + "SCORE": "5.400", + "I": "L", + "C": "L" + }, + "TM": { + "RL": "O", + "E": "H", + "RC": "C" + } + } + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8298.json b/2020/8xxx/CVE-2020-8298.json index b875b0dc0ed..3c013233a79 100644 --- a/2020/8xxx/CVE-2020-8298.json +++ b/2020/8xxx/CVE-2020-8298.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8298", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "fs-path", + "version": { + "version_data": [ + { + "version_value": "Fixed in 0.0.25" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection - Generic (CWE-77)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/324491", + "url": "https://hackerone.com/reports/324491" + }, + { + "refsource": "MISC", + "name": "https://github.com/pillys/fs-path/pull/6", + "url": "https://github.com/pillys/fs-path/pull/6" + }, + { + "refsource": "MISC", + "name": "https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7", + "url": "https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods." } ] } diff --git a/2021/20xxx/CVE-2021-20340.json b/2021/20xxx/CVE-2021-20340.json index 2966e51e63d..57deebba1ca 100644 --- a/2021/20xxx/CVE-2021-20340.json +++ b/2021/20xxx/CVE-2021-20340.json @@ -1,185 +1,185 @@ { - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6417585", - "url" : "https://www.ibm.com/support/pages/node/6417585", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)" - }, - { - "name" : "ibm-engineering-cve202120340-xss (194451)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194451", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194451." - } - ] - }, - "data_format" : "MITRE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - }, - { - "product_name" : "Engineering Lifecycle Optimization", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "product_name" : "Engineering Test Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Quality Manager" - }, - { - "product_name" : "Engineering Workflow Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "product_name" : "Rational Team Concert", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - } - ] - } + "name": "https://www.ibm.com/support/pages/node/6417585", + "url": "https://www.ibm.com/support/pages/node/6417585", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)" + }, + { + "name": "ibm-engineering-cve202120340-xss (194451)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/194451", + "title": "X-Force Vulnerability Report" } - ] - } - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-02-26T00:00:00", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2021-20340" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194451." + } + ] + }, + "data_format": "MITRE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + }, + { + "product_name": "Engineering Lifecycle Optimization", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "product_name": "Engineering Test Management", + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Quality Manager" + }, + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "product_name": "Rational Team Concert", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + } + ] + } + } ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "H", - "RL" : "O" - }, - "BM" : { - "A" : "N", - "S" : "C", - "PR" : "L", - "AC" : "L", - "AV" : "N", - "C" : "L", - "I" : "L", - "SCORE" : "5.400", - "UI" : "R" - } - } - }, - "data_version" : "4.0" -} + } + }, + "data_type": "CVE", + "CVE_data_meta": { + "DATE_PUBLIC": "2021-02-26T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-20340" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "H", + "RL": "O" + }, + "BM": { + "A": "N", + "S": "C", + "PR": "L", + "AC": "L", + "AV": "N", + "C": "L", + "I": "L", + "SCORE": "5.400", + "UI": "R" + } + } + }, + "data_version": "4.0" +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20350.json b/2021/20xxx/CVE-2021-20350.json index 65548879625..cef652c97b3 100644 --- a/2021/20xxx/CVE-2021-20350.json +++ b/2021/20xxx/CVE-2021-20350.json @@ -1,185 +1,185 @@ { - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "BM" : { - "AV" : "N", - "C" : "L", - "I" : "L", - "SCORE" : "5.400", - "UI" : "R", - "A" : "N", - "S" : "C", - "PR" : "L", - "AC" : "L" - }, - "TM" : { - "RC" : "C", - "E" : "H", - "RL" : "O" - } - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } - ] - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-02-26T00:00:00", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2021-20350" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Rational Quality Manager", - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Team Concert" - }, - { - "product_name" : "Engineering Workflow Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Test Management" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - }, - { - "product_name" : "Engineering Lifecycle Optimization", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "C": "L", + "I": "L", + "SCORE": "5.400", + "UI": "R", + "A": "N", + "S": "C", + "PR": "L", + "AC": "L" + }, + "TM": { + "RC": "C", + "E": "H", + "RL": "O" } - ] - } - }, - "data_type" : "CVE", - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194707." - } - ] - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6417585", - "name" : "https://www.ibm.com/support/pages/node/6417585" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194707", - "name" : "ibm-engineering-cve202120350-xss (194707)", - "title" : "X-Force Vulnerability Report" - } - ] - } -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-02-26T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-20350" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Rational Quality Manager", + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Team Concert" + }, + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Test Management" + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + }, + { + "product_name": "Engineering Lifecycle Optimization", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_type": "CVE", + "data_format": "MITRE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194707." + } + ] + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6417585", + "name": "https://www.ibm.com/support/pages/node/6417585" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/194707", + "name": "ibm-engineering-cve202120350-xss (194707)", + "title": "X-Force Vulnerability Report" + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20351.json b/2021/20xxx/CVE-2021-20351.json index 06eb9b024df..7656254b400 100644 --- a/2021/20xxx/CVE-2021-20351.json +++ b/2021/20xxx/CVE-2021-20351.json @@ -1,185 +1,185 @@ { - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-02-26T00:00:00", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2021-20351" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Cross-Site Scripting", - "lang" : "eng" - } - ] - } - ] - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "BM" : { - "UI" : "R", - "C" : "L", - "I" : "L", - "SCORE" : "5.400", - "AV" : "N", - "AC" : "L", - "PR" : "L", - "A" : "N", - "S" : "C" - }, - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - } - } - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6417585", - "name" : "https://www.ibm.com/support/pages/node/6417585", - "title" : "IBM Security Bulletin 6417585 (Rational Team Concert)" - }, - { - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194708", - "name" : "ibm-engineering-cve202120351-xss (194708)" - } - ] - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "CVE_data_meta": { + "DATE_PUBLIC": "2021-02-26T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2021-20351" + }, + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Team Concert" - }, - { - "product_name" : "Engineering Workflow Management", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - } - ] - }, - "product_name" : "Rational Quality Manager" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Test Management" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Engineering Lifecycle Optimization" - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "6.0.2" - }, - { - "version_value" : "6.0.6" - }, - { - "version_value" : "6.0.6.1" - }, - { - "version_value" : "7.0" - }, - { - "version_value" : "7.0.1" - }, - { - "version_value" : "7.0.2" - } - ] - }, - "product_name" : "Rational DOORS Next Generation" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "value": "Cross-Site Scripting", + "lang": "eng" + } + ] } - ] - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194708." - } - ] - } -} + ] + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "UI": "R", + "C": "L", + "I": "L", + "SCORE": "5.400", + "AV": "N", + "AC": "L", + "PR": "L", + "A": "N", + "S": "C" + }, + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + } + } + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6417585", + "name": "https://www.ibm.com/support/pages/node/6417585", + "title": "IBM Security Bulletin 6417585 (Rational Team Concert)" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/194708", + "name": "ibm-engineering-cve202120351-xss (194708)" + } + ] + }, + "data_format": "MITRE", + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Team Concert" + }, + { + "product_name": "Engineering Workflow Management", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + } + ] + }, + "product_name": "Rational Quality Manager" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Test Management" + }, + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Engineering Lifecycle Optimization" + }, + { + "version": { + "version_data": [ + { + "version_value": "6.0.2" + }, + { + "version_value": "6.0.6" + }, + { + "version_value": "6.0.6.1" + }, + { + "version_value": "7.0" + }, + { + "version_value": "7.0.1" + }, + { + "version_value": "7.0.2" + } + ] + }, + "product_name": "Rational DOORS Next Generation" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194708." + } + ] + } +} \ No newline at end of file From 4008979f5d68402d4154a7c06ffb136f3a23559a Mon Sep 17 00:00:00 2001 From: Neal Poole Date: Thu, 4 Mar 2021 15:09:39 -0500 Subject: [PATCH 107/845] Publish CVE-2021-24031 / CVE-2021-24032 --- 2021/24xxx/CVE-2021-24031.json | 94 ++++++++++++++++++++++++++------ 2021/24xxx/CVE-2021-24032.json | 98 ++++++++++++++++++++++++++++------ 2 files changed, 158 insertions(+), 34 deletions(-) diff --git a/2021/24xxx/CVE-2021-24031.json b/2021/24xxx/CVE-2021-24031.json index 6c77c457df2..f5eabef64d5 100644 --- a/2021/24xxx/CVE-2021-24031.json +++ b/2021/24xxx/CVE-2021-24031.json @@ -1,18 +1,78 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24031", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2021-03-01", + "ID": "CVE-2021-24031", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "Zstandard", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "1.4.1" + }, + { + "version_affected": "<", + "version_value": "1.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Inherited Permissions (CWE-277)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/facebook/zstd/issues/1630", + "url": "https://github.com/facebook/zstd/issues/1630" + }, + { + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404", + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404" + }, + { + "refsource": "MISC", + "name": "https://www.facebook.com/security/advisories/cve-2021-24031", + "url": "https://www.facebook.com/security/advisories/cve-2021-24031" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24032.json b/2021/24xxx/CVE-2021-24032.json index bb9f4416cb2..929155f8295 100644 --- a/2021/24xxx/CVE-2021-24032.json +++ b/2021/24xxx/CVE-2021-24032.json @@ -1,18 +1,82 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24032", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2021-03-01", + "ID": "CVE-2021-24032", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "Zstandard", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "1.4.9" + }, + { + "version_affected": ">=", + "version_value": "1.4.1" + }, + { + "version_affected": "!<", + "version_value": "1.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Inherited Permissions (CWE-277)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/facebook/zstd/issues/2491", + "url": "https://github.com/facebook/zstd/issues/2491" + }, + { + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519", + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519" + }, + { + "refsource": "MISC", + "name": "https://www.facebook.com/security/advisories/cve-2021-24032", + "url": "https://www.facebook.com/security/advisories/cve-2021-24032" + } + ] + } +} From 122bd9202d3a697a983337bb2d35b25f37ae57da Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 21:00:41 +0000 Subject: [PATCH 108/845] "-Synchronized-Data." --- 2021/25xxx/CVE-2021-25331.json | 84 ++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25332.json | 84 ++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25333.json | 84 ++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25334.json | 85 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25335.json | 85 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25336.json | 85 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25337.json | 85 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25338.json | 85 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25339.json | 85 +++++++++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26293.json | 56 +++++++++++++++++++--- 2021/26xxx/CVE-2021-26988.json | 50 ++++++++++++++++++-- 2021/26xxx/CVE-2021-26989.json | 50 ++++++++++++++++++-- 2021/27xxx/CVE-2021-27940.json | 5 ++ 2021/27xxx/CVE-2021-27956.json | 18 +++++++ 14 files changed, 875 insertions(+), 66 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27956.json diff --git a/2021/25xxx/CVE-2021-25331.json b/2021/25xxx/CVE-2021-25331.json index 565db9842b2..d2e96a1bbeb 100644 --- a/2021/25xxx/CVE-2021-25331.json +++ b/2021/25xxx/CVE-2021-25331.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25331", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Pay Mini", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.0.14" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in Samsung Pay mini application prior to v4.0.14 allows unauthorized access to balance information over the lockscreen in specific condition." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 3.2, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25332.json b/2021/25xxx/CVE-2021-25332.json index eeca9dc7a40..0089139c525 100644 --- a/2021/25xxx/CVE-2021-25332.json +++ b/2021/25xxx/CVE-2021-25332.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25332", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Pay Mini", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.0.14" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in Samsung Pay mini application prior to v4.0.14 allows unauthorized access to contacts information over the lockscreen in specific condition." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 3.2, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25333.json b/2021/25xxx/CVE-2021-25333.json index 55c6dbde1eb..469cc848bb1 100644 --- a/2021/25xxx/CVE-2021-25333.json +++ b/2021/25xxx/CVE-2021-25333.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25333", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Pay Mini", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.0.14" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in Samsung Pay mini application prior to v4.0.14 allows unauthorized access to balance information over the lockscreen via scanning specific QR code." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 3.2, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25334.json b/2021/25xxx/CVE-2021-25334.json index efbe8fcb270..e4eaf2490df 100644 --- a/2021/25xxx/CVE-2021-25334.json +++ b/2021/25xxx/CVE-2021-25334.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25334", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "P(9.0), Q(10.0) , R(11.0)", + "version_value": "SMR Feb-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper input check in wallpaper service in Samsung mobile devices prior to SMR Feb-2021 Release 1 allows untrusted application to cause permanent denial of service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25335.json b/2021/25xxx/CVE-2021-25335.json index 77b23adb3b1..7ab6896d077 100644 --- a/2021/25xxx/CVE-2021-25335.json +++ b/2021/25xxx/CVE-2021-25335.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25335", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Selected Q(10.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper lockscreen status check in cocktailbar service in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows unauthenticated users to access hidden notification contents over the lockscreen in specific condition." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 2.5, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-703: Improper Check or Handling of Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25336.json b/2021/25xxx/CVE-2021-25336.json index bbed1dd760e..8e6ea6b19b6 100644 --- a/2021/25xxx/CVE-2021-25336.json +++ b/2021/25xxx/CVE-2021-25336.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25336", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "P(9.0), Q(10.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in NotificationManagerService in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows untrusted applications to acquire notification access via sending a crafted malicious intent." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 2.8, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269: Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25337.json b/2021/25xxx/CVE-2021-25337.json index bb262187b50..923354d5067 100644 --- a/2021/25xxx/CVE-2021-25337.json +++ b/2021/25xxx/CVE-2021-25337.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25337", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Selected P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in clipboard service in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows untrusted applications to read or write certain local files." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25338.json b/2021/25xxx/CVE-2021-25338.json index 6af6e14ecc2..a17f2e8b08a 100644 --- a/2021/25xxx/CVE-2021-25338.json +++ b/2021/25xxx/CVE-2021-25338.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25338", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Selected Q(10.0), R(11.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper memory access control in RKP in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows an attacker, given a compromised kernel, to write certain part of RKP EL2 memory region." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25339.json b/2021/25xxx/CVE-2021-25339.json index 2560ed01e22..72fb9e28729 100644 --- a/2021/25xxx/CVE-2021-25339.json +++ b/2021/25xxx/CVE-2021-25339.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25339", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Selected Q(10.0), R(11.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper address validation in HArx in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows an attacker, given a compromised kernel, to corrupt EL2 memory." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26293.json b/2021/26xxx/CVE-2021-26293.json index 883883354f6..a165ad399cd 100644 --- a/2021/26xxx/CVE-2021-26293.json +++ b/2021/26xxx/CVE-2021-26293.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26293", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26293", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in AfterLogic Aurora through 8.5.3 and WebMail Pro through 8.5.3, when DAV is enabled. They allow directory traversal to create new files (such as an executable file under the web root). This is related to DAVServer.php in 8.x and DAV/Server.php in 7.x." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://auroramail.wordpress.com/2021/02/03/addressing-dav-related-vulnerability-in-webmail-and-aurora/", + "url": "https://auroramail.wordpress.com/2021/02/03/addressing-dav-related-vulnerability-in-webmail-and-aurora/" } ] } diff --git a/2021/26xxx/CVE-2021-26988.json b/2021/26xxx/CVE-2021-26988.json index b3412d5a760..170d88f1ab5 100644 --- a/2021/26xxx/CVE-2021-26988.json +++ b/2021/26xxx/CVE-2021-26988.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26988", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Clustered Data ONTAP", + "version": { + "version_data": [ + { + "version_value": "Prior to 9.3P21, 9.5P16, 9.6P12, 9.7P8 and 9.8" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/NTAP-20210303-0001", + "url": "https://security.netapp.com/advisory/NTAP-20210303-0001" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Clustered Data ONTAP versions prior to 9.3P21, 9.5P16, 9.6P12, 9.7P8 and 9.8 are susceptible to a vulnerability which could allow unauthorized tenant users to discover information related to converting a 7-Mode directory to Cluster-mode such as Storage Virtual Machine (SVM) names, volume names, directory paths and Job IDs." } ] } diff --git a/2021/26xxx/CVE-2021-26989.json b/2021/26xxx/CVE-2021-26989.json index 70eba6af082..5b4d720ed69 100644 --- a/2021/26xxx/CVE-2021-26989.json +++ b/2021/26xxx/CVE-2021-26989.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26989", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Clustered Data ONTAP", + "version": { + "version_data": [ + { + "version_value": "Prior to 9.3P21, 9.5P16, 9.6P12, 9.7P9 and 9.8" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/NTAP-20210303-0002", + "url": "https://security.netapp.com/advisory/NTAP-20210303-0002" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Clustered Data ONTAP versions prior to 9.3P21, 9.5P16, 9.6P12, 9.7P9 and 9.8 are susceptible to a vulnerability which could allow a remote authenticated attacker to cause a Denial of Service (DoS) on clustered Data ONTAP configured for SMB access." } ] } diff --git a/2021/27xxx/CVE-2021-27940.json b/2021/27xxx/CVE-2021-27940.json index 9a9cb7dcf93..35ea4e985c9 100644 --- a/2021/27xxx/CVE-2021-27940.json +++ b/2021/27xxx/CVE-2021-27940.json @@ -61,6 +61,11 @@ "url": "https://github.com/openark/orchestrator/releases/tag/v3.2.4", "refsource": "MISC", "name": "https://github.com/openark/orchestrator/releases/tag/v3.2.4" + }, + { + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=DOYm0DIS3Us", + "url": "https://www.youtube.com/watch?v=DOYm0DIS3Us" } ] } diff --git a/2021/27xxx/CVE-2021-27956.json b/2021/27xxx/CVE-2021-27956.json new file mode 100644 index 00000000000..4b668ea9f4e --- /dev/null +++ b/2021/27xxx/CVE-2021-27956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 610e3ef0b8784ed6fed981b98eece33be16305d1 Mon Sep 17 00:00:00 2001 From: Bill Situ Date: Thu, 4 Mar 2021 13:56:45 -0800 Subject: [PATCH 109/845] Update affected versions. On branch cna/Oracle/CVE-2021-2047 Changes to be committed: modified: 2021/2xxx/CVE-2021-2047.json --- 2021/2xxx/CVE-2021-2047.json | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/2021/2xxx/CVE-2021-2047.json b/2021/2xxx/CVE-2021-2047.json index 597e9ee7755..1558adbe266 100644 --- a/2021/2xxx/CVE-2021-2047.json +++ b/2021/2xxx/CVE-2021-2047.json @@ -28,14 +28,6 @@ { "version_value": "12.2.1.3.0", "version_affected": "=" - }, - { - "version_value": "12.2.1.4.0", - "version_affected": "=" - }, - { - "version_value": "14.1.1.0.0", - "version_affected": "=" } ] } @@ -51,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." } ] }, From c2454245772c842522d6a65168bc71ec4fc259bf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 22:00:43 +0000 Subject: [PATCH 110/845] "-Synchronized-Data." --- 2015/8xxx/CVE-2015-8011.json | 5 ++ 2016/9xxx/CVE-2016-9560.json | 2 +- 2020/25xxx/CVE-2020-25639.json | 50 +++++++++++++++++-- 2020/35xxx/CVE-2020-35498.json | 5 ++ 2021/20xxx/CVE-2021-20247.json | 5 ++ 2021/22xxx/CVE-2021-22296.json | 12 ++++- 2021/25xxx/CVE-2021-25340.json | 85 +++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25341.json | 84 ++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25342.json | 84 ++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25343.json | 90 +++++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25344.json | 85 +++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25345.json | 85 +++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25346.json | 85 +++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25347.json | 85 +++++++++++++++++++++++++++++--- 2021/25xxx/CVE-2021-25348.json | 84 ++++++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26937.json | 5 ++ 2021/3xxx/CVE-2021-3403.json | 55 +++++++++++++++++++-- 2021/3xxx/CVE-2021-3404.json | 55 +++++++++++++++++++-- 18 files changed, 896 insertions(+), 65 deletions(-) diff --git a/2015/8xxx/CVE-2015-8011.json b/2015/8xxx/CVE-2015-8011.json index dfeaa738bb7..0c05c822b4d 100644 --- a/2015/8xxx/CVE-2015-8011.json +++ b/2015/8xxx/CVE-2015-8011.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fba11d37ee", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR/" } ] } diff --git a/2016/9xxx/CVE-2016-9560.json b/2016/9xxx/CVE-2016-9560.json index 6ef0bf5b253..13152bcdbcb 100644 --- a/2016/9xxx/CVE-2016-9560.json +++ b/2016/9xxx/CVE-2016-9560.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer 1.900.26, 1.900.27, 1.900.28, 1.900.29 and 1.900.30 allows remote attackers to have unspecified impact via a crafted image." + "value": "Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image." } ] }, diff --git a/2020/25xxx/CVE-2020-25639.json b/2020/25xxx/CVE-2020-25639.json index e6fb6919c21..1297e1d6403 100644 --- a/2020/25xxx/CVE-2020-25639.json +++ b/2020/25xxx/CVE-2020-25639.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25639", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "Linux kernel versions prior to 5.12-rc1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1876995", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876995" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system." } ] } diff --git a/2020/35xxx/CVE-2020-35498.json b/2020/35xxx/CVE-2020-35498.json index 7222b0b6f55..191146f32ca 100644 --- a/2020/35xxx/CVE-2020-35498.json +++ b/2020/35xxx/CVE-2020-35498.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-fba11d37ee", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR/" } ] }, diff --git a/2021/20xxx/CVE-2021-20247.json b/2021/20xxx/CVE-2021-20247.json index 3195b7cbcf5..146bc164700 100644 --- a/2021/20xxx/CVE-2021-20247.json +++ b/2021/20xxx/CVE-2021-20247.json @@ -61,6 +61,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-954ebabcf7", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXQLCK35QGRCRENRTGKJO4VVZGUXUJJ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-ef8c2acfce", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDEBZQJMWDW5JFK4NTHH6DAFNAZTESW/" } ] }, diff --git a/2021/22xxx/CVE-2021-22296.json b/2021/22xxx/CVE-2021-22296.json index 97d71b89cbe..8e53f4d2719 100644 --- a/2021/22xxx/CVE-2021-22296.json +++ b/2021/22xxx/CVE-2021-22296.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" + }, + { + "refsource": "MISC", + "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83&pageSize=10&pageIndex=1", + "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83&pageSize=10&pageIndex=1" + }, + { + "refsource": "MISC", + "name": "https://www.tenable.com/cve/CVE-2021-22296", + "url": "https://www.tenable.com/cve/CVE-2021-22296" } ] }, @@ -55,7 +65,7 @@ "description_data": [ { "lang": "eng", - "value": "A component of the HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." + "value": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." } ] } diff --git a/2021/25xxx/CVE-2021-25340.json b/2021/25xxx/CVE-2021-25340.json index 0add341347f..56317381697 100644 --- a/2021/25xxx/CVE-2021-25340.json +++ b/2021/25xxx/CVE-2021-25340.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25340", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_name": "Q(10.0)", + "version_value": "SMR Feb-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Samsung keyboard version prior to SMR Feb-2021 Release 1 allows physically proximate attackers to change in arbitrary settings during Initialization State." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25341.json b/2021/25xxx/CVE-2021-25341.json index 8640501d8e1..5c1b6d4e319 100644 --- a/2021/25xxx/CVE-2021-25341.json +++ b/2021/25xxx/CVE-2021-25341.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25341", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "S Assistant", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "6.5.01.22" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Calling of non-existent provider in S Assistant prior to version 6.5.01.22 allows unauthorized actions including denial of service attack by hijacking the provider." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25342.json b/2021/25xxx/CVE-2021-25342.json index 9995f4c5ba2..5b3c94e557c 100644 --- a/2021/25xxx/CVE-2021-25342.json +++ b/2021/25xxx/CVE-2021-25342.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25342", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SMP sdk", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "3.0.9" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Calling of non-existent provider in SMP sdk prior to version 3.0.9 allows unauthorized actions including denial of service attack by hijacking the provider." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com", + "name": "https://security.samsungmobile.com" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25343.json b/2021/25xxx/CVE-2021-25343.json index 979771437f2..9b19093aa28 100644 --- a/2021/25xxx/CVE-2021-25343.json +++ b/2021/25xxx/CVE-2021-25343.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25343", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Members", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Android O(8.1) and below", + "version_value": "2.4.81.13" + }, + { + "version_affected": "<", + "version_name": "Android P(9.0) and above", + "version_value": "3.8.00.13" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Calling of non-existent provider in Samsung Members prior to version 2.4.81.13 (in Android O(8.1) and below) and 3.8.00.13 (in Android P(9.0) and above) allows unauthorized actions including denial of service attack by hijacking the provider." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/", + "name": "https://security.samsungmobile.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25344.json b/2021/25xxx/CVE-2021-25344.json index af7e992e4ce..3e471f7330e 100644 --- a/2021/25xxx/CVE-2021-25344.json +++ b/2021/25xxx/CVE-2021-25344.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25344", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Q(10.0), R(11.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing permission check in knox_custom service prior to SMR Mar-2021 Release 1 allows attackers to gain access to device's serial number without permission." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/", + "name": "https://security.samsungmobile.com/" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25345.json b/2021/25xxx/CVE-2021-25345.json index c63ca856f39..05efae40a74 100644 --- a/2021/25xxx/CVE-2021-25345.json +++ b/2021/25xxx/CVE-2021-25345.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25345", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Q(10.0), R(11.0)", + "version_value": "SMR Mar-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Graphic format mismatch while converting video format in hwcomposer prior to SMR Mar-2021 Release 1 results in kernel panic due to unsupported format." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Copy without Checking Size of Input (\"Classic Buffer Overflow\")" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/", + "name": "https://security.samsungmobile.com/" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25346.json b/2021/25xxx/CVE-2021-25346.json index 694c819e13b..06e295fd054 100644 --- a/2021/25xxx/CVE-2021-25346.json +++ b/2021/25xxx/CVE-2021-25346.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25346", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "O(8.x), P(9.0), Q(10.0)", + "version_value": "SMR Jan-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A possible arbitrary memory overwrite vulnerabilities in quram library version prior to SMR Jan-2021 Release 1 allow arbitrary code execution." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Copy without Checking Size of Input (\"Classic Buffer Overflow\")" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/", + "name": "https://security.samsungmobile.com/" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25347.json b/2021/25xxx/CVE-2021-25347.json index d7e6049437f..d6a0454dd8f 100644 --- a/2021/25xxx/CVE-2021-25347.json +++ b/2021/25xxx/CVE-2021-25347.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25347", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Mobile Devices", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "P(9.0), Q(10.0), R(11.0)", + "version_value": "SMR Feb-2021 Release 1" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hijacking vulnerability in Samsung Email application version prior to SMR Feb-2021 Release 1 allows attackers to intercept when the provider is executed." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/securityUpdate.smsb", + "url": "https://security.samsungmobile.com/securityUpdate.smsb" + }, + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/", + "name": "https://security.samsungmobile.com/" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25348.json b/2021/25xxx/CVE-2021-25348.json index 6d91db8df84..7591ab58a49 100644 --- a/2021/25xxx/CVE-2021-25348.json +++ b/2021/25xxx/CVE-2021-25348.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25348", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Samsung Internet", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "13.0.1.60" + } + ] + } + } + ] + }, + "vendor_name": "Samsung Mobile" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper permission grant check in Samsung Internet prior to version 13.0.1.60 allows access to files in internal storage without authorized STORAGE permission." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "NONE", + "baseScore": 2.1, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-703 Improper Check or Handling of Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://security.samsungmobile.com/", + "name": "https://security.samsungmobile.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.samsungmobile.com/serviceWeb.smsb", + "url": "https://security.samsungmobile.com/serviceWeb.smsb" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26937.json b/2021/26xxx/CVE-2021-26937.json index 35ace4636e3..175fb7e4649 100644 --- a/2021/26xxx/CVE-2021-26937.json +++ b/2021/26xxx/CVE-2021-26937.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-5e9894a0c5", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJWLXP45POUUYBJRRWPVAWNZDJTLYWVM/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-9107eeb95c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNWBOIDEPOEQS5RMQVMFKHKXJCGNYWBL/" } ] } diff --git a/2021/3xxx/CVE-2021-3403.json b/2021/3xxx/CVE-2021-3403.json index 876c7f471be..cb8337dd77c 100644 --- a/2021/3xxx/CVE-2021-3403.json +++ b/2021/3xxx/CVE-2021-3403.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3403", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ytnef", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1926967", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926967" + }, + { + "refsource": "MISC", + "name": "https://github.com/Yeraze/ytnef/issues/85", + "url": "https://github.com/Yeraze/ytnef/issues/85" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file." } ] } diff --git a/2021/3xxx/CVE-2021-3404.json b/2021/3xxx/CVE-2021-3404.json index a764e555919..4962a248669 100644 --- a/2021/3xxx/CVE-2021-3404.json +++ b/2021/3xxx/CVE-2021-3404.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3404", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ytnef", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1926965", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926965" + }, + { + "refsource": "MISC", + "name": "https://github.com/Yeraze/ytnef/issues/86", + "url": "https://github.com/Yeraze/ytnef/issues/86" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file." } ] } From cf0aa393a4f4b2a7625c5769eaefd76a25f03a50 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 23:00:40 +0000 Subject: [PATCH 111/845] "-Synchronized-Data." --- 2019/18xxx/CVE-2019-18630.json | 62 ++++++++++++++++++++++++++++++++++ 1 file changed, 62 insertions(+) create mode 100644 2019/18xxx/CVE-2019-18630.json diff --git a/2019/18xxx/CVE-2019-18630.json b/2019/18xxx/CVE-2019-18630.json new file mode 100644 index 00000000000..6564cbf5fd5 --- /dev/null +++ b/2019/18xxx/CVE-2019-18630.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18630", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200, portions of the drive containing executable code were not encrypted thus leaving it open to potential cryptographic information disclosure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX20I_for_ALB80xx-C80xx_v1.2.pdf", + "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX20I_for_ALB80xx-C80xx_v1.2.pdf" + } + ] + } +} \ No newline at end of file From e359ca7cc2f619606a9504840f4686ef79921fd3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 00:00:41 +0000 Subject: [PATCH 112/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27314.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27957.json | 18 +++++++++++ 2021/27xxx/CVE-2021-27958.json | 18 +++++++++++ 3 files changed, 86 insertions(+), 6 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27957.json create mode 100644 2021/27xxx/CVE-2021-27958.json diff --git a/2021/27xxx/CVE-2021-27314.json b/2021/27xxx/CVE-2021-27314.json index f2556d64d00..b79e8fdaf4b 100644 --- a/2021/27xxx/CVE-2021-27314.json +++ b/2021/27xxx/CVE-2021-27314.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27314", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27314", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection in admin.php in doctor appointment system 1.0 allows an unauthenticated attacker to insert malicious SQL queries via username parameter at login page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html", + "url": "https://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html" } ] } diff --git a/2021/27xxx/CVE-2021-27957.json b/2021/27xxx/CVE-2021-27957.json new file mode 100644 index 00000000000..bab2a04c0d1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27958.json b/2021/27xxx/CVE-2021-27958.json new file mode 100644 index 00000000000..569b0664651 --- /dev/null +++ b/2021/27xxx/CVE-2021-27958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a371d21f92a1a00ee6857f5ef4922cd392042910 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 01:00:43 +0000 Subject: [PATCH 113/845] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11987.json | 5 +++++ 2020/11xxx/CVE-2020-11988.json | 5 +++++ 2021/27xxx/CVE-2021-27959.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27960.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27961.json | 18 ++++++++++++++++++ 5 files changed, 64 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27959.json create mode 100644 2021/27xxx/CVE-2021-27960.json create mode 100644 2021/27xxx/CVE-2021-27961.json diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json index 6b94ccb631f..689eebf60e0 100644 --- a/2020/11xxx/CVE-2020-11987.json +++ b/2020/11xxx/CVE-2020-11987.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://xmlgraphics.apache.org/security.html", "url": "https://xmlgraphics.apache.org/security.html" + }, + { + "refsource": "MLIST", + "name": "[poi-dev] 20210304 [Bug 65166] New: Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", + "url": "https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E" } ] }, diff --git a/2020/11xxx/CVE-2020-11988.json b/2020/11xxx/CVE-2020-11988.json index 27f06518308..9a837c272ae 100644 --- a/2020/11xxx/CVE-2020-11988.json +++ b/2020/11xxx/CVE-2020-11988.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://xmlgraphics.apache.org/security.html", "url": "https://xmlgraphics.apache.org/security.html" + }, + { + "refsource": "MLIST", + "name": "[poi-dev] 20210304 [Bug 65166] New: Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", + "url": "https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E" } ] }, diff --git a/2021/27xxx/CVE-2021-27959.json b/2021/27xxx/CVE-2021-27959.json new file mode 100644 index 00000000000..d43d7c25400 --- /dev/null +++ b/2021/27xxx/CVE-2021-27959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27960.json b/2021/27xxx/CVE-2021-27960.json new file mode 100644 index 00000000000..4f9570cf11c --- /dev/null +++ b/2021/27xxx/CVE-2021-27960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27961.json b/2021/27xxx/CVE-2021-27961.json new file mode 100644 index 00000000000..72d00b55cbc --- /dev/null +++ b/2021/27xxx/CVE-2021-27961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d2be75a5aefd269ddac226c10ea2da1a8bb1dc18 Mon Sep 17 00:00:00 2001 From: swpsirt <42012556+swpsirt@users.noreply.github.com> Date: Thu, 4 Mar 2021 17:21:44 -0800 Subject: [PATCH 114/845] Update CVE-2020-5148.json SonicWall Directory Services Connector SSO Agent submission- CVE-2020-5148 --- 2020/5xxx/CVE-2020-5148.json | 74 ++++++++++++++++++++++++++++-------- 1 file changed, 59 insertions(+), 15 deletions(-) diff --git a/2020/5xxx/CVE-2020-5148.json b/2020/5xxx/CVE-2020-5148.json index 6d90f45b72f..b0560833c17 100644 --- a/2020/5xxx/CVE-2020-5148.json +++ b/2020/5xxx/CVE-2020-5148.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-5148", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "psirt@sonicwall.com", + "ID": "CVE-2020-5148", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Directory Services Connector", + "version": { + "version_data": [ + { + "version_value": "4.1.17 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" + } + ] } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003" + } + ] + } } \ No newline at end of file From e85f560d17f482d3cac3a2a7ea1a2aee3219e7f6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 02:00:39 +0000 Subject: [PATCH 115/845] "-Synchronized-Data." --- 2019/18xxx/CVE-2019-18351.json | 67 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27962.json | 18 +++++++++ 2021/27xxx/CVE-2021-27963.json | 67 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27964.json | 67 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27965.json | 67 ++++++++++++++++++++++++++++++++++ 5 files changed, 286 insertions(+) create mode 100644 2019/18xxx/CVE-2019-18351.json create mode 100644 2021/27xxx/CVE-2021-27962.json create mode 100644 2021/27xxx/CVE-2021-27963.json create mode 100644 2021/27xxx/CVE-2021-27964.json create mode 100644 2021/27xxx/CVE-2021-27965.json diff --git a/2019/18xxx/CVE-2019-18351.json b/2019/18xxx/CVE-2019-18351.json new file mode 100644 index 00000000000..c6e810fd5d2 --- /dev/null +++ b/2019/18xxx/CVE-2019-18351.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18351", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in channels/chan_sip.c in Sangoma Asterisk through 13.29.1, through 16.6.1, and through 17.0.0; and Certified Asterisk through 13.21-cert4. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.asterisk.org/downloads/security-advisories", + "refsource": "MISC", + "name": "https://www.asterisk.org/downloads/security-advisories" + }, + { + "refsource": "MISC", + "name": "http://downloads.asterisk.org/pub/security/AST-2019-006.html", + "url": "http://downloads.asterisk.org/pub/security/AST-2019-006.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27962.json b/2021/27xxx/CVE-2021-27962.json new file mode 100644 index 00000000000..792ffc71f0c --- /dev/null +++ b/2021/27xxx/CVE-2021-27962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27963.json b/2021/27xxx/CVE-2021-27963.json new file mode 100644 index 00000000000..ac393ca30d3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27963.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27963", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/erberkan/SonLogger-vulns", + "refsource": "MISC", + "name": "https://github.com/erberkan/SonLogger-vulns" + }, + { + "url": "https://www.sonlogger.com/releasenotes", + "refsource": "MISC", + "name": "https://www.sonlogger.com/releasenotes" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27964.json b/2021/27xxx/CVE-2021-27964.json new file mode 100644 index 00000000000..739b39f73ba --- /dev/null +++ b/2021/27xxx/CVE-2021-27964.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27964", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An attacker can send a POST request to /Config/SaveUploadedHotspotLogoFile without any authentication or session header. There is no check for the file extension or content of the uploaded file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/erberkan/SonLogger-vulns", + "refsource": "MISC", + "name": "https://github.com/erberkan/SonLogger-vulns" + }, + { + "url": "https://www.sonlogger.com/releasenotes", + "refsource": "MISC", + "name": "https://www.sonlogger.com/releasenotes" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27965.json b/2021/27xxx/CVE-2021-27965.json new file mode 100644 index 00000000000..cb7a2acbc13 --- /dev/null +++ b/2021/27xxx/CVE-2021-27965.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-27965", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kronl/cve/tree/master/MSI_Dragon_Center", + "refsource": "MISC", + "name": "https://github.com/kronl/cve/tree/master/MSI_Dragon_Center" + }, + { + "url": "https://www.microsoft.com/en-us/p/msi-dragon-center/9nh7n2bv1cqq?activetab=pivot:overviewtab", + "refsource": "MISC", + "name": "https://www.microsoft.com/en-us/p/msi-dragon-center/9nh7n2bv1cqq?activetab=pivot:overviewtab" + } + ] + } +} \ No newline at end of file From 567307b01e3ffed0e72c9a3bfb1985689f09a79c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 03:00:39 +0000 Subject: [PATCH 116/845] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36255.json | 72 ++++++++++++++++++++++++++++++++++ 1 file changed, 72 insertions(+) create mode 100644 2020/36xxx/CVE-2020-36255.json diff --git a/2020/36xxx/CVE-2020-36255.json b/2020/36xxx/CVE-2020-36255.json new file mode 100644 index 00000000000..0b466593b90 --- /dev/null +++ b/2020/36xxx/CVE-2020-36255.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36255", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in IdentityModel (aka ScottBrady.IdentityModel) before 1.3.0. The Branca implementation allows an attacker to modify and forge authentication tokens." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/scottbrady91/IdentityModel/issues/4", + "refsource": "MISC", + "name": "https://github.com/scottbrady91/IdentityModel/issues/4" + }, + { + "url": "https://github.com/scottbrady91/IdentityModel/issues/3", + "refsource": "MISC", + "name": "https://github.com/scottbrady91/IdentityModel/issues/3" + }, + { + "url": "https://github.com/scottbrady91/IdentityModel/compare/1.2.0...1.3.0", + "refsource": "MISC", + "name": "https://github.com/scottbrady91/IdentityModel/compare/1.2.0...1.3.0" + } + ] + } +} \ No newline at end of file From cf931dc01f755fe94afd0e1d29f50d44a41a48ae Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 04:00:43 +0000 Subject: [PATCH 117/845] "-Synchronized-Data." --- 2020/5xxx/CVE-2020-5148.json | 112 +++++++++++++++++------------------ 1 file changed, 56 insertions(+), 56 deletions(-) diff --git a/2020/5xxx/CVE-2020-5148.json b/2020/5xxx/CVE-2020-5148.json index b0560833c17..c0920ad3582 100644 --- a/2020/5xxx/CVE-2020-5148.json +++ b/2020/5xxx/CVE-2020-5148.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@sonicwall.com", - "ID": "CVE-2020-5148", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Directory Services Connector", - "version": { - "version_data": [ - { - "version_value": "4.1.17 and earlier" - } - ] + "CVE_data_meta": { + "ASSIGNER": "PSIRT@sonicwall.com", + "ID": "CVE-2020-5148", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Directory Services Connector", + "version": { + "version_data": [ + { + "version_value": "4.1.17 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" } - } ] - }, - "vendor_name": "SonicWall" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-287: Improper Authentication" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003", - "refsource": "CONFIRM", - "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003" - } - ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003" + } + ] + } } \ No newline at end of file From 9ebcd8132953c66da95f7fdcf280616d0eddd34a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 06:00:41 +0000 Subject: [PATCH 118/845] "-Synchronized-Data." --- 2019/25xxx/CVE-2019-25025.json | 62 ++++++++++++++++++++++++++++++++++ 1 file changed, 62 insertions(+) create mode 100644 2019/25xxx/CVE-2019-25025.json diff --git a/2019/25xxx/CVE-2019-25025.json b/2019/25xxx/CVE-2019-25025.json new file mode 100644 index 00000000000..08b64fea476 --- /dev/null +++ b/2019/25xxx/CVE-2019-25025.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-25025", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/rails/activerecord-session_store/pull/151", + "refsource": "MISC", + "name": "https://github.com/rails/activerecord-session_store/pull/151" + } + ] + } +} \ No newline at end of file From 3af07a3c94c1ddeddb1472756bc445a6a3be3cbd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 07:00:39 +0000 Subject: [PATCH 119/845] "-Synchronized-Data." --- 2015/9xxx/CVE-2015-9267.json | 5 +++++ 2015/9xxx/CVE-2015-9268.json | 5 +++++ 2017/7xxx/CVE-2017-7657.json | 10 ++++++++++ 2017/7xxx/CVE-2017-7658.json | 10 ++++++++++ 4 files changed, 30 insertions(+) diff --git a/2015/9xxx/CVE-2015-9267.json b/2015/9xxx/CVE-2015-9267.json index a30dae3855d..96c99838e2d 100644 --- a/2015/9xxx/CVE-2015-9267.json +++ b/2015/9xxx/CVE-2015-9267.json @@ -61,6 +61,11 @@ "name": "https://sourceforge.net/p/nsis/bugs/1125/", "refsource": "MISC", "url": "https://sourceforge.net/p/nsis/bugs/1125/" + }, + { + "refsource": "JVN", + "name": "JVN#68418039", + "url": "http://jvn.jp/en/jp/JVN68418039/index.html" } ] } diff --git a/2015/9xxx/CVE-2015-9268.json b/2015/9xxx/CVE-2015-9268.json index ecdffd19ca8..e4f50dc4e2b 100644 --- a/2015/9xxx/CVE-2015-9268.json +++ b/2015/9xxx/CVE-2015-9268.json @@ -61,6 +61,11 @@ "name": "https://sourceforge.net/p/nsis/bugs/1125/", "refsource": "MISC", "url": "https://sourceforge.net/p/nsis/bugs/1125/" + }, + { + "refsource": "JVN", + "name": "JVN#68418039", + "url": "http://jvn.jp/en/jp/JVN68418039/index.html" } ] } diff --git a/2017/7xxx/CVE-2017-7657.json b/2017/7xxx/CVE-2017-7657.json index ef8a9ea5e7f..9cc51414103 100644 --- a/2017/7xxx/CVE-2017-7657.json +++ b/2017/7xxx/CVE-2017-7657.json @@ -133,6 +133,16 @@ "refsource": "MLIST", "name": "[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", "url": "https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s commented on issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", + "url": "https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", + "url": "https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E" } ] } diff --git a/2017/7xxx/CVE-2017-7658.json b/2017/7xxx/CVE-2017-7658.json index cdfca703ffa..62357b740bc 100644 --- a/2017/7xxx/CVE-2017-7658.json +++ b/2017/7xxx/CVE-2017-7658.json @@ -138,6 +138,16 @@ "refsource": "MLIST", "name": "[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", "url": "https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s commented on issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", + "url": "https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", + "url": "https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E" } ] } From 428726e8961179fe511363f581c4cf3b26ae9858 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 08:01:05 +0000 Subject: [PATCH 120/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27966.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27967.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27968.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27969.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27970.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27971.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27972.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27973.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27974.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27975.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27976.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27977.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27978.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27979.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27980.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27981.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27982.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27983.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27984.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27985.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27986.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27987.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27988.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27989.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27990.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27991.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27992.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27993.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27994.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27995.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27996.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27997.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27998.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27999.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28000.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28001.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28002.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28003.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28004.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28005.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28006.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28007.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28008.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28009.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28010.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28011.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28012.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28013.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28014.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28015.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28016.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28017.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28018.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28019.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28020.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28021.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28022.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28023.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28024.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28025.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28026.json | 18 ++++++++++++++++++ 61 files changed, 1098 insertions(+) create mode 100644 2021/27xxx/CVE-2021-27966.json create mode 100644 2021/27xxx/CVE-2021-27967.json create mode 100644 2021/27xxx/CVE-2021-27968.json create mode 100644 2021/27xxx/CVE-2021-27969.json create mode 100644 2021/27xxx/CVE-2021-27970.json create mode 100644 2021/27xxx/CVE-2021-27971.json create mode 100644 2021/27xxx/CVE-2021-27972.json create mode 100644 2021/27xxx/CVE-2021-27973.json create mode 100644 2021/27xxx/CVE-2021-27974.json create mode 100644 2021/27xxx/CVE-2021-27975.json create mode 100644 2021/27xxx/CVE-2021-27976.json create mode 100644 2021/27xxx/CVE-2021-27977.json create mode 100644 2021/27xxx/CVE-2021-27978.json create mode 100644 2021/27xxx/CVE-2021-27979.json create mode 100644 2021/27xxx/CVE-2021-27980.json create mode 100644 2021/27xxx/CVE-2021-27981.json create mode 100644 2021/27xxx/CVE-2021-27982.json create mode 100644 2021/27xxx/CVE-2021-27983.json create mode 100644 2021/27xxx/CVE-2021-27984.json create mode 100644 2021/27xxx/CVE-2021-27985.json create mode 100644 2021/27xxx/CVE-2021-27986.json create mode 100644 2021/27xxx/CVE-2021-27987.json create mode 100644 2021/27xxx/CVE-2021-27988.json create mode 100644 2021/27xxx/CVE-2021-27989.json create mode 100644 2021/27xxx/CVE-2021-27990.json create mode 100644 2021/27xxx/CVE-2021-27991.json create mode 100644 2021/27xxx/CVE-2021-27992.json create mode 100644 2021/27xxx/CVE-2021-27993.json create mode 100644 2021/27xxx/CVE-2021-27994.json create mode 100644 2021/27xxx/CVE-2021-27995.json create mode 100644 2021/27xxx/CVE-2021-27996.json create mode 100644 2021/27xxx/CVE-2021-27997.json create mode 100644 2021/27xxx/CVE-2021-27998.json create mode 100644 2021/27xxx/CVE-2021-27999.json create mode 100644 2021/28xxx/CVE-2021-28000.json create mode 100644 2021/28xxx/CVE-2021-28001.json create mode 100644 2021/28xxx/CVE-2021-28002.json create mode 100644 2021/28xxx/CVE-2021-28003.json create mode 100644 2021/28xxx/CVE-2021-28004.json create mode 100644 2021/28xxx/CVE-2021-28005.json create mode 100644 2021/28xxx/CVE-2021-28006.json create mode 100644 2021/28xxx/CVE-2021-28007.json create mode 100644 2021/28xxx/CVE-2021-28008.json create mode 100644 2021/28xxx/CVE-2021-28009.json create mode 100644 2021/28xxx/CVE-2021-28010.json create mode 100644 2021/28xxx/CVE-2021-28011.json create mode 100644 2021/28xxx/CVE-2021-28012.json create mode 100644 2021/28xxx/CVE-2021-28013.json create mode 100644 2021/28xxx/CVE-2021-28014.json create mode 100644 2021/28xxx/CVE-2021-28015.json create mode 100644 2021/28xxx/CVE-2021-28016.json create mode 100644 2021/28xxx/CVE-2021-28017.json create mode 100644 2021/28xxx/CVE-2021-28018.json create mode 100644 2021/28xxx/CVE-2021-28019.json create mode 100644 2021/28xxx/CVE-2021-28020.json create mode 100644 2021/28xxx/CVE-2021-28021.json create mode 100644 2021/28xxx/CVE-2021-28022.json create mode 100644 2021/28xxx/CVE-2021-28023.json create mode 100644 2021/28xxx/CVE-2021-28024.json create mode 100644 2021/28xxx/CVE-2021-28025.json create mode 100644 2021/28xxx/CVE-2021-28026.json diff --git a/2021/27xxx/CVE-2021-27966.json b/2021/27xxx/CVE-2021-27966.json new file mode 100644 index 00000000000..d5a912ceb67 --- /dev/null +++ b/2021/27xxx/CVE-2021-27966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27967.json b/2021/27xxx/CVE-2021-27967.json new file mode 100644 index 00000000000..aadd092b814 --- /dev/null +++ b/2021/27xxx/CVE-2021-27967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27968.json b/2021/27xxx/CVE-2021-27968.json new file mode 100644 index 00000000000..2b53a00ae56 --- /dev/null +++ b/2021/27xxx/CVE-2021-27968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27969.json b/2021/27xxx/CVE-2021-27969.json new file mode 100644 index 00000000000..28c438a2ee6 --- /dev/null +++ b/2021/27xxx/CVE-2021-27969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27970.json b/2021/27xxx/CVE-2021-27970.json new file mode 100644 index 00000000000..9c7f4205b3f --- /dev/null +++ b/2021/27xxx/CVE-2021-27970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27971.json b/2021/27xxx/CVE-2021-27971.json new file mode 100644 index 00000000000..cf71aeb7cf3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27972.json b/2021/27xxx/CVE-2021-27972.json new file mode 100644 index 00000000000..77e793700c9 --- /dev/null +++ b/2021/27xxx/CVE-2021-27972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27973.json b/2021/27xxx/CVE-2021-27973.json new file mode 100644 index 00000000000..eb59558949f --- /dev/null +++ b/2021/27xxx/CVE-2021-27973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27974.json b/2021/27xxx/CVE-2021-27974.json new file mode 100644 index 00000000000..6f2c62f5089 --- /dev/null +++ b/2021/27xxx/CVE-2021-27974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27975.json b/2021/27xxx/CVE-2021-27975.json new file mode 100644 index 00000000000..da62620fe27 --- /dev/null +++ b/2021/27xxx/CVE-2021-27975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27976.json b/2021/27xxx/CVE-2021-27976.json new file mode 100644 index 00000000000..997037bfa1c --- /dev/null +++ b/2021/27xxx/CVE-2021-27976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27977.json b/2021/27xxx/CVE-2021-27977.json new file mode 100644 index 00000000000..bd09e627224 --- /dev/null +++ b/2021/27xxx/CVE-2021-27977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27978.json b/2021/27xxx/CVE-2021-27978.json new file mode 100644 index 00000000000..da35bb76962 --- /dev/null +++ b/2021/27xxx/CVE-2021-27978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27979.json b/2021/27xxx/CVE-2021-27979.json new file mode 100644 index 00000000000..538b5ddd8bf --- /dev/null +++ b/2021/27xxx/CVE-2021-27979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27980.json b/2021/27xxx/CVE-2021-27980.json new file mode 100644 index 00000000000..0791dc3c566 --- /dev/null +++ b/2021/27xxx/CVE-2021-27980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27981.json b/2021/27xxx/CVE-2021-27981.json new file mode 100644 index 00000000000..375c262f2db --- /dev/null +++ b/2021/27xxx/CVE-2021-27981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27982.json b/2021/27xxx/CVE-2021-27982.json new file mode 100644 index 00000000000..be1ce1c6d6c --- /dev/null +++ b/2021/27xxx/CVE-2021-27982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27983.json b/2021/27xxx/CVE-2021-27983.json new file mode 100644 index 00000000000..c2177469411 --- /dev/null +++ b/2021/27xxx/CVE-2021-27983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27984.json b/2021/27xxx/CVE-2021-27984.json new file mode 100644 index 00000000000..482e7958f19 --- /dev/null +++ b/2021/27xxx/CVE-2021-27984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27985.json b/2021/27xxx/CVE-2021-27985.json new file mode 100644 index 00000000000..e0bd7ea4fc4 --- /dev/null +++ b/2021/27xxx/CVE-2021-27985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27986.json b/2021/27xxx/CVE-2021-27986.json new file mode 100644 index 00000000000..30a5cae4c73 --- /dev/null +++ b/2021/27xxx/CVE-2021-27986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27987.json b/2021/27xxx/CVE-2021-27987.json new file mode 100644 index 00000000000..cf08d529f58 --- /dev/null +++ b/2021/27xxx/CVE-2021-27987.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27987", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27988.json b/2021/27xxx/CVE-2021-27988.json new file mode 100644 index 00000000000..2a1e5e78e61 --- /dev/null +++ b/2021/27xxx/CVE-2021-27988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27989.json b/2021/27xxx/CVE-2021-27989.json new file mode 100644 index 00000000000..eb79f1f163a --- /dev/null +++ b/2021/27xxx/CVE-2021-27989.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27989", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27990.json b/2021/27xxx/CVE-2021-27990.json new file mode 100644 index 00000000000..72df8b96015 --- /dev/null +++ b/2021/27xxx/CVE-2021-27990.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27990", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27991.json b/2021/27xxx/CVE-2021-27991.json new file mode 100644 index 00000000000..e011b0855a7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27992.json b/2021/27xxx/CVE-2021-27992.json new file mode 100644 index 00000000000..7b5db205748 --- /dev/null +++ b/2021/27xxx/CVE-2021-27992.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27992", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27993.json b/2021/27xxx/CVE-2021-27993.json new file mode 100644 index 00000000000..8fc53305257 --- /dev/null +++ b/2021/27xxx/CVE-2021-27993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27994.json b/2021/27xxx/CVE-2021-27994.json new file mode 100644 index 00000000000..238ae54d18f --- /dev/null +++ b/2021/27xxx/CVE-2021-27994.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27994", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27995.json b/2021/27xxx/CVE-2021-27995.json new file mode 100644 index 00000000000..7eb9c3c64d2 --- /dev/null +++ b/2021/27xxx/CVE-2021-27995.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27995", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27996.json b/2021/27xxx/CVE-2021-27996.json new file mode 100644 index 00000000000..2767cd43bdf --- /dev/null +++ b/2021/27xxx/CVE-2021-27996.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27996", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27997.json b/2021/27xxx/CVE-2021-27997.json new file mode 100644 index 00000000000..672b95cc2a8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27997.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27997", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27998.json b/2021/27xxx/CVE-2021-27998.json new file mode 100644 index 00000000000..70d6b1b857d --- /dev/null +++ b/2021/27xxx/CVE-2021-27998.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27998", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27999.json b/2021/27xxx/CVE-2021-27999.json new file mode 100644 index 00000000000..9248a8d865d --- /dev/null +++ b/2021/27xxx/CVE-2021-27999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28000.json b/2021/28xxx/CVE-2021-28000.json new file mode 100644 index 00000000000..d498deb0dc8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28001.json b/2021/28xxx/CVE-2021-28001.json new file mode 100644 index 00000000000..cbe01124013 --- /dev/null +++ b/2021/28xxx/CVE-2021-28001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28002.json b/2021/28xxx/CVE-2021-28002.json new file mode 100644 index 00000000000..b39db8e9398 --- /dev/null +++ b/2021/28xxx/CVE-2021-28002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28003.json b/2021/28xxx/CVE-2021-28003.json new file mode 100644 index 00000000000..e58b3ef951e --- /dev/null +++ b/2021/28xxx/CVE-2021-28003.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28003", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28004.json b/2021/28xxx/CVE-2021-28004.json new file mode 100644 index 00000000000..af1eb56f654 --- /dev/null +++ b/2021/28xxx/CVE-2021-28004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28005.json b/2021/28xxx/CVE-2021-28005.json new file mode 100644 index 00000000000..01207ff7032 --- /dev/null +++ b/2021/28xxx/CVE-2021-28005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28006.json b/2021/28xxx/CVE-2021-28006.json new file mode 100644 index 00000000000..ecfdc546106 --- /dev/null +++ b/2021/28xxx/CVE-2021-28006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28007.json b/2021/28xxx/CVE-2021-28007.json new file mode 100644 index 00000000000..4321c80efc2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28007.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28007", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28008.json b/2021/28xxx/CVE-2021-28008.json new file mode 100644 index 00000000000..4cadeb75cd4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28008.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28008", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28009.json b/2021/28xxx/CVE-2021-28009.json new file mode 100644 index 00000000000..906b2a8e422 --- /dev/null +++ b/2021/28xxx/CVE-2021-28009.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28009", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28010.json b/2021/28xxx/CVE-2021-28010.json new file mode 100644 index 00000000000..f673af04171 --- /dev/null +++ b/2021/28xxx/CVE-2021-28010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28011.json b/2021/28xxx/CVE-2021-28011.json new file mode 100644 index 00000000000..9984e4c7960 --- /dev/null +++ b/2021/28xxx/CVE-2021-28011.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28011", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28012.json b/2021/28xxx/CVE-2021-28012.json new file mode 100644 index 00000000000..11705b2273e --- /dev/null +++ b/2021/28xxx/CVE-2021-28012.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28012", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28013.json b/2021/28xxx/CVE-2021-28013.json new file mode 100644 index 00000000000..5bb6832d6e5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28013.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28013", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28014.json b/2021/28xxx/CVE-2021-28014.json new file mode 100644 index 00000000000..b73748db4bf --- /dev/null +++ b/2021/28xxx/CVE-2021-28014.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28014", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28015.json b/2021/28xxx/CVE-2021-28015.json new file mode 100644 index 00000000000..d07516e6ef0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28015.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28015", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28016.json b/2021/28xxx/CVE-2021-28016.json new file mode 100644 index 00000000000..d53c4e4e6ce --- /dev/null +++ b/2021/28xxx/CVE-2021-28016.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28016", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28017.json b/2021/28xxx/CVE-2021-28017.json new file mode 100644 index 00000000000..d1d2a3b32ab --- /dev/null +++ b/2021/28xxx/CVE-2021-28017.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28017", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28018.json b/2021/28xxx/CVE-2021-28018.json new file mode 100644 index 00000000000..76bb242ca05 --- /dev/null +++ b/2021/28xxx/CVE-2021-28018.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28018", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28019.json b/2021/28xxx/CVE-2021-28019.json new file mode 100644 index 00000000000..83f8a1043a3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28019.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28019", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28020.json b/2021/28xxx/CVE-2021-28020.json new file mode 100644 index 00000000000..704d076bd16 --- /dev/null +++ b/2021/28xxx/CVE-2021-28020.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28020", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28021.json b/2021/28xxx/CVE-2021-28021.json new file mode 100644 index 00000000000..35fb487d8a5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28021.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28021", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28022.json b/2021/28xxx/CVE-2021-28022.json new file mode 100644 index 00000000000..d74aacd917e --- /dev/null +++ b/2021/28xxx/CVE-2021-28022.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28022", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28023.json b/2021/28xxx/CVE-2021-28023.json new file mode 100644 index 00000000000..db8d7c844ba --- /dev/null +++ b/2021/28xxx/CVE-2021-28023.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28023", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28024.json b/2021/28xxx/CVE-2021-28024.json new file mode 100644 index 00000000000..545601af3cb --- /dev/null +++ b/2021/28xxx/CVE-2021-28024.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28024", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28025.json b/2021/28xxx/CVE-2021-28025.json new file mode 100644 index 00000000000..1211f1bffe0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28025.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28025", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28026.json b/2021/28xxx/CVE-2021-28026.json new file mode 100644 index 00000000000..785b1c36961 --- /dev/null +++ b/2021/28xxx/CVE-2021-28026.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28026", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d1222a21c7960275c4a0c5ebc33c26827fe64979 Mon Sep 17 00:00:00 2001 From: Johannes Segitz Date: Fri, 5 Mar 2021 09:32:32 +0100 Subject: [PATCH 121/845] data for CVE-2021-25313 --- 2021/25xxx/CVE-2021-25313.json | 96 +++++++++++++++++++++++++++++++--- 1 file changed, 90 insertions(+), 6 deletions(-) diff --git a/2021/25xxx/CVE-2021-25313.json b/2021/25xxx/CVE-2021-25313.json index 9933885c025..ca47f944ff0 100644 --- a/2021/25xxx/CVE-2021-25313.json +++ b/2021/25xxx/CVE-2021-25313.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@suse.de", + "DATE_PUBLIC": "2021-03-04T00:00:00.000Z", "ID": "CVE-2021-25313", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Rancher: XSS on /v3/cluster/" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Rancher", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Rancher", + "version_value": "2.5.6" + } + ] + } + } + ] + }, + "vendor_name": "SUSE" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links.\nThis issue affects:\nSUSE Rancher\nRancher versions prior to 2.5.6." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1181852", + "refsource": "CONFIRM", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1181852" + }, + { + "name": "https://github.com/rancher/rancher/issues/31583", + "refsource": "CONFIRM", + "url": "https://github.com/rancher/rancher/issues/31583" + }, + { + "name": "https://github.com/rancher/rancher/releases/tag/v2.5.6", + "refsource": "CONFIRM", + "url": "https://github.com/rancher/rancher/releases/tag/v2.5.6" + } + ] + }, + "source": { + "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1181852", + "defect": [ + "1181852" + ], + "discovery": "UNKNOWN" } } \ No newline at end of file From 834907c2d7fc6955dbf34a04fc52d80df49f1cf6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 09:00:41 +0000 Subject: [PATCH 122/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29658.json | 56 ++++++++++++++++++++++++++---- 2021/25xxx/CVE-2021-25313.json | 4 +-- 2021/28xxx/CVE-2021-28027.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28028.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28029.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28030.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28031.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28032.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28033.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28034.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28035.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28036.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28037.json | 62 ++++++++++++++++++++++++++++++++++ 13 files changed, 734 insertions(+), 8 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28027.json create mode 100644 2021/28xxx/CVE-2021-28028.json create mode 100644 2021/28xxx/CVE-2021-28029.json create mode 100644 2021/28xxx/CVE-2021-28030.json create mode 100644 2021/28xxx/CVE-2021-28031.json create mode 100644 2021/28xxx/CVE-2021-28032.json create mode 100644 2021/28xxx/CVE-2021-28033.json create mode 100644 2021/28xxx/CVE-2021-28034.json create mode 100644 2021/28xxx/CVE-2021-28035.json create mode 100644 2021/28xxx/CVE-2021-28036.json create mode 100644 2021/28xxx/CVE-2021-28037.json diff --git a/2020/29xxx/CVE-2020-29658.json b/2020/29xxx/CVE-2020-29658.json index ec090df92ad..2c614c49a07 100644 --- a/2020/29xxx/CVE-2020-29658.json +++ b/2020/29xxx/CVE-2020-29658.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29658", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29658", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine Application Control Plus before 100523 has an insecure SSL configuration setting for Nginx, leading to Privilege Escalation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.manageengine.com/application-control/knowledge-base/privilege-escalation-vulnerability-open-SSL.html", + "url": "https://www.manageengine.com/application-control/knowledge-base/privilege-escalation-vulnerability-open-SSL.html" } ] } diff --git a/2021/25xxx/CVE-2021-25313.json b/2021/25xxx/CVE-2021-25313.json index ca47f944ff0..760454b213f 100644 --- a/2021/25xxx/CVE-2021-25313.json +++ b/2021/25xxx/CVE-2021-25313.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-03-04T00:00:00.000Z", "ID": "CVE-2021-25313", "STATE": "PUBLIC", @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links.\nThis issue affects:\nSUSE Rancher\nRancher versions prior to 2.5.6." + "value": "A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6." } ] }, diff --git a/2021/28xxx/CVE-2021-28027.json b/2021/28xxx/CVE-2021-28027.json new file mode 100644 index 00000000000..298d7fea2c1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28027.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28027", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the bam crate before 0.1.3 for Rust. There is an integer underflow and out-of-bounds write during the loading of a bgzip block." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0027.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0027.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28028.json b/2021/28xxx/CVE-2021-28028.json new file mode 100644 index 00000000000..742630787cc --- /dev/null +++ b/2021/28xxx/CVE-2021-28028.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28028", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the toodee crate before 0.3.0 for Rust. Row insertion can cause a double free upon an iterator panic." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0028.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0028.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28029.json b/2021/28xxx/CVE-2021-28029.json new file mode 100644 index 00000000000..1eaf08f054c --- /dev/null +++ b/2021/28xxx/CVE-2021-28029.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28029", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the toodee crate before 0.3.0 for Rust. The row-insertion feature allows attackers to read the contents of uninitialized memory locations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0028.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0028.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28030.json b/2021/28xxx/CVE-2021-28030.json new file mode 100644 index 00000000000..4a3d15b4199 --- /dev/null +++ b/2021/28xxx/CVE-2021-28030.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28030", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the truetype crate before 0.30.1 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation within Tape::take_bytes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0029.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0029.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28031.json b/2021/28xxx/CVE-2021-28031.json new file mode 100644 index 00000000000..23ecd21afab --- /dev/null +++ b/2021/28xxx/CVE-2021-28031.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28031", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the scratchpad crate before 1.3.1 for Rust. The move_elements function can have a double-free upon a panic in a user-provided f function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28032.json b/2021/28xxx/CVE-2021-28032.json new file mode 100644 index 00000000000..d70a88b4924 --- /dev/null +++ b/2021/28xxx/CVE-2021-28032.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28032", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the nano_arena crate before 0.5.2 for Rust. There is an aliasing violation in split_at because two mutable references can exist for the same element, if Borrow behaves in certain ways. This can have a resultant out-of-bounds write or use-after-free." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0031.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0031.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28033.json b/2021/28xxx/CVE-2021-28033.json new file mode 100644 index 00000000000..8a1bf2293a9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28033.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28033", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the byte_struct crate before 0.6.1 for Rust. There can be a drop of uninitialized memory if a certain deserialization method panics." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0032.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0032.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28034.json b/2021/28xxx/CVE-2021-28034.json new file mode 100644 index 00000000000..1c6cf61d240 --- /dev/null +++ b/2021/28xxx/CVE-2021-28034.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28034", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the stack_dst crate before 0.6.1 for Rust. Because of the push_inner behavior, a double free can occur upon a val.clone() panic." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0033.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0033.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28035.json b/2021/28xxx/CVE-2021-28035.json new file mode 100644 index 00000000000..c32f1d34cfd --- /dev/null +++ b/2021/28xxx/CVE-2021-28035.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28035", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the stack_dst crate before 0.6.1 for Rust. Because of the push_inner behavior, a drop of uninitialized memory can occur upon a val.clone() panic." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0033.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0033.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28036.json b/2021/28xxx/CVE-2021-28036.json new file mode 100644 index 00000000000..002f7d3fb1e --- /dev/null +++ b/2021/28xxx/CVE-2021-28036.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28036", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the quinn crate before 0.7.0 for Rust. It may have invalid memory access for certain versions of the standard library because it relies on a direct cast of std::net::SocketAddrV4 and std::net::SocketAddrV6 data structures." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0035.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0035.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28037.json b/2021/28xxx/CVE-2021-28037.json new file mode 100644 index 00000000000..87444491577 --- /dev/null +++ b/2021/28xxx/CVE-2021-28037.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28037", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the internment crate before 0.4.2 for Rust. There is a data race that can cause memory corruption because of the unconditional implementation of Sync for Intern." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0036.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0036.html" + } + ] + } +} \ No newline at end of file From fab47197c4190b29cf3f93d4816c7314ccde2812 Mon Sep 17 00:00:00 2001 From: Ikuya Fukumoto Date: Fri, 5 Mar 2021 18:12:40 +0900 Subject: [PATCH 123/845] JPCERT/CC 2021-03-05-18-12 --- 2021/20xxx/CVE-2021-20663.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20664.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20665.json | 50 ++++++++++++++++++++++++++++++++-- 3 files changed, 141 insertions(+), 9 deletions(-) diff --git a/2021/20xxx/CVE-2021-20663.json b/2021/20xxx/CVE-2021-20663.json index 5ab3d2273e7..9ccda1d6f5e 100644 --- a/2021/20xxx/CVE-2021-20663.json +++ b/2021/20xxx/CVE-2021-20663.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20663", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Six Apart Ltd.", + "product": { + "product_data": [ + { + "product_name": "Movable Type", + "version": { + "version_data": [ + { + "version_value": "Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jvn.jp/en/jp/JVN66542874/index.html" + }, + { + "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in in Role authority setting screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20664.json b/2021/20xxx/CVE-2021-20664.json index 156b7bcb6ab..186e4ec04fc 100644 --- a/2021/20xxx/CVE-2021-20664.json +++ b/2021/20xxx/CVE-2021-20664.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20664", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Six Apart Ltd.", + "product": { + "product_data": [ + { + "product_name": "Movable Type", + "version": { + "version_data": [ + { + "version_value": "Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jvn.jp/en/jp/JVN66542874/index.html" + }, + { + "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in in Asset registration screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20665.json b/2021/20xxx/CVE-2021-20665.json index 82316b5073b..787956f4cd3 100644 --- a/2021/20xxx/CVE-2021-20665.json +++ b/2021/20xxx/CVE-2021-20665.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20665", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Six Apart Ltd.", + "product": { + "product_data": [ + { + "product_name": "Movable Type", + "version": { + "version_data": [ + { + "version_value": "Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jvn.jp/en/jp/JVN66542874/index.html" + }, + { + "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in in Add asset screen of Contents field of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors." } ] } From 2c6454750397e820d81924607d51252b35ddf2f3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 10:00:44 +0000 Subject: [PATCH 124/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20663.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20664.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20665.json | 11 ++++++++--- 2021/25xxx/CVE-2021-25122.json | 5 +++++ 2021/3xxx/CVE-2021-3423.json | 18 ++++++++++++++++++ 5 files changed, 47 insertions(+), 9 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3423.json diff --git a/2021/20xxx/CVE-2021-20663.json b/2021/20xxx/CVE-2021-20663.json index 9ccda1d6f5e..b81bf3f05e8 100644 --- a/2021/20xxx/CVE-2021-20663.json +++ b/2021/20xxx/CVE-2021-20663.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20663", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN66542874/index.html" + "url": "https://jvn.jp/en/jp/JVN66542874/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN66542874/index.html" }, { - "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html" + "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/02/mt-760-676-released.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20664.json b/2021/20xxx/CVE-2021-20664.json index 186e4ec04fc..4fe9357d3ef 100644 --- a/2021/20xxx/CVE-2021-20664.json +++ b/2021/20xxx/CVE-2021-20664.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20664", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN66542874/index.html" + "url": "https://jvn.jp/en/jp/JVN66542874/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN66542874/index.html" }, { - "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html" + "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/02/mt-760-676-released.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20665.json b/2021/20xxx/CVE-2021-20665.json index 787956f4cd3..15fd856e84b 100644 --- a/2021/20xxx/CVE-2021-20665.json +++ b/2021/20xxx/CVE-2021-20665.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20665", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN66542874/index.html" + "url": "https://jvn.jp/en/jp/JVN66542874/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN66542874/index.html" }, { - "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html" + "url": "https://movabletype.org/news/2021/02/mt-760-676-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/02/mt-760-676-released.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index e227b64f8e7..303b88af70c 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -103,6 +103,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210301 CVE-2021-25122: Apache Tomcat h2c request mix-up", "url": "http://www.openwall.com/lists/oss-security/2021/03/01/1" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20210305 RE: [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", + "url": "https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E" } ] }, diff --git a/2021/3xxx/CVE-2021-3423.json b/2021/3xxx/CVE-2021-3423.json new file mode 100644 index 00000000000..c2d39e51bde --- /dev/null +++ b/2021/3xxx/CVE-2021-3423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 9ca64c9d7e42e38aafb0c4f67628fab6dd9a8e0d Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Fri, 5 Mar 2021 11:30:44 +0000 Subject: [PATCH 125/845] Add CVE-2021-27907 --- 2021/27xxx/CVE-2021-27907.json | 73 ++++++++++++++++++++++++++++++---- 1 file changed, 66 insertions(+), 7 deletions(-) diff --git a/2021/27xxx/CVE-2021-27907.json b/2021/27xxx/CVE-2021-27907.json index 557f30650bb..9dbfca4eb39 100644 --- a/2021/27xxx/CVE-2021-27907.json +++ b/2021/27xxx/CVE-2021-27907.json @@ -1,18 +1,77 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-27907", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Apache Superset stored XSS on Dashboard markdown" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Superset", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Apache Superset ", + "version_value": "0.38.0" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was reported by Gianluca Veltri and Dario Castrogiovanni of Cuebiq" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a “div” section and embedding in it a “svg” element with javascript code." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From cb4b65e0a45d72731526a4a54888479e7a45e7b4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 12:00:44 +0000 Subject: [PATCH 126/845] "-Synchronized-Data." --- 2021/25xxx/CVE-2021-25122.json | 5 +++++ 2021/27xxx/CVE-2021-27907.json | 9 +++++---- 2 files changed, 10 insertions(+), 4 deletions(-) diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index 303b88af70c..423d99cd6d7 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -108,6 +108,11 @@ "refsource": "MLIST", "name": "[tomcat-users] 20210305 RE: [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", "url": "https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20210305 Re: [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", + "url": "https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E" } ] }, diff --git a/2021/27xxx/CVE-2021-27907.json b/2021/27xxx/CVE-2021-27907.json index 9dbfca4eb39..7cfe8c86b20 100644 --- a/2021/27xxx/CVE-2021-27907.json +++ b/2021/27xxx/CVE-2021-27907.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a “div” section and embedding in it a “svg” element with javascript code." + "value": "Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a \u201cdiv\u201d section and embedding in it a \u201csvg\u201d element with javascript code." } ] }, @@ -66,12 +66,13 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E", + "name": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file From e71b90fe3a893c54135a86d41dc48ffd4c306150 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 13:00:47 +0000 Subject: [PATCH 127/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27907.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/27xxx/CVE-2021-27907.json b/2021/27xxx/CVE-2021-27907.json index 7cfe8c86b20..d2b22f4db5c 100644 --- a/2021/27xxx/CVE-2021-27907.json +++ b/2021/27xxx/CVE-2021-27907.json @@ -69,6 +69,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E", "name": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[superset-dev] 20210305 CVE-2021-27907: Apache Superset stored XSS on Dashboard markdown", + "url": "https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a@%3Cdev.superset.apache.org%3E" } ] }, From 4e613a6930080fa049077fc0f76e074e6b0e3fd3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 14:00:38 +0000 Subject: [PATCH 128/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28026.json | 56 ++++++++++++++++++++++++++++++---- 1 file changed, 50 insertions(+), 6 deletions(-) diff --git a/2021/28xxx/CVE-2021-28026.json b/2021/28xxx/CVE-2021-28026.json index 785b1c36961..8a9ddcb32bb 100644 --- a/2021/28xxx/CVE-2021-28026.json +++ b/2021/28xxx/CVE-2021-28026.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28026", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28026", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "jpeg-xl v0.3.2 is affected by a heap buffer overflow in /lib/jxl/coeff_order.cc ReadPermutation. When decoding a malicous jxl file using djxl, an attacker can trigger arbitrary code execution or a denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/wg1/jpeg-xl/-/issues/163", + "refsource": "MISC", + "name": "https://gitlab.com/wg1/jpeg-xl/-/issues/163" } ] } From 2f7b7785754c8d9dbeb711d12d440ba7da81686f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 16:00:42 +0000 Subject: [PATCH 129/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29134.json | 56 ++++++++++++++++++++++++++++++---- 2021/26xxx/CVE-2021-26960.json | 50 ++++++++++++++++++++++++++++-- 2021/26xxx/CVE-2021-26961.json | 50 ++++++++++++++++++++++++++++-- 2021/26xxx/CVE-2021-26962.json | 50 ++++++++++++++++++++++++++++-- 4 files changed, 191 insertions(+), 15 deletions(-) diff --git a/2020/29xxx/CVE-2020-29134.json b/2020/29xxx/CVE-2020-29134.json index bd4ea448180..2431ff0a2dd 100644 --- a/2020/29xxx/CVE-2020-29134.json +++ b/2020/29xxx/CVE-2020-29134.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29134", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29134", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TOTVS Fluig Luke platform allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217 Fluig Lake 1.7.0-210112 Fluig Lake 1.7.0-201215 Fluig Lake 1.7.0-201124 Fluig Lake 1.7.0-200915" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/lucxssouza/CVE-2020-29134", + "url": "https://github.com/lucxssouza/CVE-2020-29134" } ] } diff --git a/2021/26xxx/CVE-2021-26960.json b/2021/26xxx/CVE-2021-26960.json index e59ce8a373a..e3de3c4085e 100644 --- a/2021/26xxx/CVE-2021-26960.json +++ b/2021/26xxx/CVE-2021-26960.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26960", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote unauthenticated cross-site request forgery (csrf)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote unauthenticated cross-site request forgery (csrf) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. A vulnerability in the AirWave web-based management interface could allow an unauthenticated remote attacker to conduct a CSRF attack against a vulnerable system. A successful exploit would consist of an attacker persuading an authorized user to follow a malicious link, resulting in arbitrary actions being carried out with the privilege level of the targeted user." } ] } diff --git a/2021/26xxx/CVE-2021-26961.json b/2021/26xxx/CVE-2021-26961.json index 2e1a498f662..3dd065918c2 100644 --- a/2021/26xxx/CVE-2021-26961.json +++ b/2021/26xxx/CVE-2021-26961.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26961", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote unauthenticated cross-site request forgery (csrf)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote unauthenticated cross-site request forgery (csrf) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. A vulnerability in the AirWave web-based management interface could allow an unauthenticated remote attacker to conduct a CSRF attack against a vulnerable system. A successful exploit would consist of an attacker persuading an authorized user to follow a malicious link, resulting in arbitrary actions being carried out with the privilege level of the targeted user." } ] } diff --git a/2021/26xxx/CVE-2021-26962.json b/2021/26xxx/CVE-2021-26962.json index fdd18f47d46..750893dd3d4 100644 --- a/2021/26xxx/CVE-2021-26962.json +++ b/2021/26xxx/CVE-2021-26962.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26962", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated arbitrary command execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities in the AirWave CLI could allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to full system compromise." } ] } From 0a5aaf934e39d672c823ab5d2b9951c43b62ae63 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 17:00:41 +0000 Subject: [PATCH 130/845] "-Synchronized-Data." --- 2016/10xxx/CVE-2016-10092.json | 2 +- 2017/15xxx/CVE-2017-15045.json | 2 +- 2017/6xxx/CVE-2017-6831.json | 2 +- 2020/11xxx/CVE-2020-11988.json | 5 ++ 2020/28xxx/CVE-2020-28050.json | 61 ++++++++++++++++++++--- 2020/29xxx/CVE-2020-29032.json | 91 +++++++++++++++++++++++++++++++--- 2020/35xxx/CVE-2020-35594.json | 56 ++++++++++++++++++--- 2021/21xxx/CVE-2021-21725.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26963.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26964.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26965.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26966.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26967.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26968.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26969.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26970.json | 50 +++++++++++++++++-- 2021/26xxx/CVE-2021-26971.json | 50 +++++++++++++++++-- 2021/27xxx/CVE-2021-27098.json | 56 ++++++++++++++++++--- 18 files changed, 718 insertions(+), 57 deletions(-) diff --git a/2016/10xxx/CVE-2016-10092.json b/2016/10xxx/CVE-2016-10092.json index 2def199b810..daea26046a5 100644 --- a/2016/10xxx/CVE-2016-10092.json +++ b/2016/10xxx/CVE-2016-10092.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5 and 4.0.0alpha6 allows remote attackers to have unspecified impact via a crafted image." + "value": "Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image." } ] }, diff --git a/2017/15xxx/CVE-2017-15045.json b/2017/15xxx/CVE-2017-15045.json index 4f5ccba123b..f214083edea 100644 --- a/2017/15xxx/CVE-2017-15045.json +++ b/2017/15xxx/CVE-2017-15045.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "LAME 3.99.5, 3.98.4, 3.98.2 and 3.98 has a heap-based buffer over-read in fill_buffer in libmp3lame/util.c, related to lame_encode_buffer_sample_t in libmp3lame/lame.c, a different vulnerability than CVE-2017-9410." + "value": "LAME 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4, 3.99.5, 3.98.4, 3.98.2 and 3.98 has a heap-based buffer over-read in fill_buffer in libmp3lame/util.c, related to lame_encode_buffer_sample_t in libmp3lame/lame.c, a different vulnerability than CVE-2017-9410." } ] }, diff --git a/2017/6xxx/CVE-2017-6831.json b/2017/6xxx/CVE-2017-6831.json index 13cd8c644c8..71254aee7a2 100644 --- a/2017/6xxx/CVE-2017-6831.json +++ b/2017/6xxx/CVE-2017-6831.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file." + "value": "Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file." } ] }, diff --git a/2020/11xxx/CVE-2020-11988.json b/2020/11xxx/CVE-2020-11988.json index 9a837c272ae..c1c3d09e718 100644 --- a/2020/11xxx/CVE-2020-11988.json +++ b/2020/11xxx/CVE-2020-11988.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[poi-dev] 20210304 [Bug 65166] New: Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", "url": "https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[jmeter-dev] 20210305 [GitHub] [jmeter] sseide opened a new pull request #648: update xmlgraphics-commons to 2.6 (from 2.3)", + "url": "https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E" } ] }, diff --git a/2020/28xxx/CVE-2020-28050.json b/2020/28xxx/CVE-2020-28050.json index 7be96269f2d..310a345ebdd 100644 --- a/2020/28xxx/CVE-2020-28050.json +++ b/2020/28xxx/CVE-2020-28050.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28050", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28050", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine Desktop Central before build 10.0.647 allows a single authentication secret from multiple agents to communicate with the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.manageengine.com/products/desktop-central/fixing-multiple-vulnerabilities.html", + "url": "https://www.manageengine.com/products/desktop-central/fixing-multiple-vulnerabilities.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.manageengine.com/products/desktop-central/cve-2020-28050.html", + "url": "https://www.manageengine.com/products/desktop-central/cve-2020-28050.html" } ] } diff --git a/2020/29xxx/CVE-2020-29032.json b/2020/29xxx/CVE-2020-29032.json index b4a0a4508de..470da2f6e3a 100644 --- a/2020/29xxx/CVE-2020-29032.json +++ b/2020/29xxx/CVE-2020-29032.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", + "DATE_PUBLIC": "2021-03-04T22:00:00.000Z", "ID": "CVE-2020-29032", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Add integrity check of GateManager firmware" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GateManager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "all", + "version_value": "9.4.621054022" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Tenable" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Upload of Code Without Integrity Check vulnerability in firmware archive of Secomea GateManager allows authenticated attacker to execute malicious code on server. This issue affects: Secomea GateManager all versions prior to 9.4.621054022" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-494 Download of Code Without Integrity Check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/#3737", + "name": "https://www.secomea.com/support/cybersecurity-advisory/#3737" + } + ] + }, + "source": { + "defect": [ + "RD-3737" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35594.json b/2020/35xxx/CVE-2020-35594.json index 27bae075473..e6495431400 100644 --- a/2020/35xxx/CVE-2020-35594.json +++ b/2020/35xxx/CVE-2020-35594.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35594", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35594", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ADManager Plus before 7066 allows XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7066", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7066" } ] } diff --git a/2021/21xxx/CVE-2021-21725.json b/2021/21xxx/CVE-2021-21725.json index 3b94074e568..fdff404199f 100644 --- a/2021/21xxx/CVE-2021-21725.json +++ b/2021/21xxx/CVE-2021-21725.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21725", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@zte.com.cn", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ZXHN H196Q", + "version": { + "version_data": [ + { + "version_value": "V9.1.0C2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Leak" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014624", + "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014624" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A ZTE product has an information leak vulnerability. An attacker with higher authority can go beyond their authority to access files in other directories by performing specific operations, resulting in information leak. This affects: ZXHN H196Q V9.1.0C2." } ] } diff --git a/2021/26xxx/CVE-2021-26963.json b/2021/26xxx/CVE-2021-26963.json index aa58f447452..870bcf58e6f 100644 --- a/2021/26xxx/CVE-2021-26963.json +++ b/2021/26xxx/CVE-2021-26963.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26963", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated arbitrary command execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities in the AirWave CLI could allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to full system compromise." } ] } diff --git a/2021/26xxx/CVE-2021-26964.json b/2021/26xxx/CVE-2021-26964.json index d911acf08ab..3113e3b1947 100644 --- a/2021/26xxx/CVE-2021-26964.json +++ b/2021/26xxx/CVE-2021-26964.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26964", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authentication restriction bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authentication restriction bypass vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. A vulnerability in the AirWave web-based management interface could allow an authenticated remote attacker to improperly access and modify devices and management user details. A successful exploit would consist of an attacker using a lower privileged account to change management user or device details. This could allow the attacker to escalate privileges and/or change network details that they should not have access to." } ] } diff --git a/2021/26xxx/CVE-2021-26965.json b/2021/26xxx/CVE-2021-26965.json index 44d107b6b36..988a0105ae4 100644 --- a/2021/26xxx/CVE-2021-26965.json +++ b/2021/26xxx/CVE-2021-26965.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26965", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated sql injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated sql injection vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Multiple vulnerabilities in the API of AirWave could allow an authenticated remote attacker to conduct SQL injection attacks against the AirWave instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database." } ] } diff --git a/2021/26xxx/CVE-2021-26966.json b/2021/26xxx/CVE-2021-26966.json index 8d8394d0e17..b70f095a9af 100644 --- a/2021/26xxx/CVE-2021-26966.json +++ b/2021/26xxx/CVE-2021-26966.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26966", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated sql injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated sql injection vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Multiple vulnerabilities in the API of AirWave could allow an authenticated remote attacker to conduct SQL injection attacks against the AirWave instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database." } ] } diff --git a/2021/26xxx/CVE-2021-26967.json b/2021/26xxx/CVE-2021-26967.json index 3a681675e1a..cde0459b311 100644 --- a/2021/26xxx/CVE-2021-26967.json +++ b/2021/26xxx/CVE-2021-26967.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26967", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote reflected cross-site scripting (xss)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote reflected cross-site scripting (xss) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. A vulnerability in the web-based management interface of AirWave could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of certain components of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim\u2019s browser in the context of the AirWave management interface." } ] } diff --git a/2021/26xxx/CVE-2021-26968.json b/2021/26xxx/CVE-2021-26968.json index 47e2a69345a..fd0e8a5869f 100644 --- a/2021/26xxx/CVE-2021-26968.json +++ b/2021/26xxx/CVE-2021-26968.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26968", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated stored cross-site scripting (xss)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated stored cross-site scripting (xss) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. A vulnerability in the web-based management interface of AirWave could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim\u2019s browser in the context of the affected interface." } ] } diff --git a/2021/26xxx/CVE-2021-26969.json b/2021/26xxx/CVE-2021-26969.json index 51feeeded1f..b9fa22e39e6 100644 --- a/2021/26xxx/CVE-2021-26969.json +++ b/2021/26xxx/CVE-2021-26969.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26969", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated authenticated xml external entity (xxe)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated authenticated xml external entity (xxe) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Due to improper restrictions on XML entities a vulnerability exists in the web-based management interface of AirWave. A successful exploit could allow an authenticated attacker to retrieve files from the local system or cause the application to consume system resources, resulting in a denial of service condition." } ] } diff --git a/2021/26xxx/CVE-2021-26970.json b/2021/26xxx/CVE-2021-26970.json index b8296d54062..7fca36d3c4b 100644 --- a/2021/26xxx/CVE-2021-26970.json +++ b/2021/26xxx/CVE-2021-26970.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26970", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated arbitrary command execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities in the AirWave web-base management interface could allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system leading to partial system compromise." } ] } diff --git a/2021/26xxx/CVE-2021-26971.json b/2021/26xxx/CVE-2021-26971.json index 7519dd296c2..3057c5884d5 100644 --- a/2021/26xxx/CVE-2021-26971.json +++ b/2021/26xxx/CVE-2021-26971.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26971", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_value": "Prior to 8.2.12.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "remote authenticated arbitrary command execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt", + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-005.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote authenticated arbitrary command execution vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.12.0. Vulnerabilities in the AirWave web-base management interface could allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system leading to partial system compromise." } ] } diff --git a/2021/27xxx/CVE-2021-27098.json b/2021/27xxx/CVE-2021-27098.json index 6be197550c2..539f3f2377b 100644 --- a/2021/27xxx/CVE-2021-27098.json +++ b/2021/27xxx/CVE-2021-27098.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27098", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27098", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server\u2019s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq", + "url": "https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq" } ] } From 72daef9f3c12426aa6807878c56b072db39ba6d6 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Fri, 5 Mar 2021 19:20:06 +0200 Subject: [PATCH 131/845] Adds CVE-2020-28502 --- 2020/28xxx/CVE-2020-28502.json | 110 +++++++++++++++++++++++++++++++-- 1 file changed, 106 insertions(+), 4 deletions(-) diff --git a/2020/28xxx/CVE-2020-28502.json b/2020/28xxx/CVE-2020-28502.json index 8dfd67a8274..733da61b3ee 100644 --- a/2020/28xxx/CVE-2020-28502.json +++ b/2020/28xxx/CVE-2020-28502.json @@ -3,16 +3,118 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-05T17:20:04.331575Z", "ID": "CVE-2020-28502", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Arbitrary Code Injection" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "xmlhttprequest", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.7.0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + }, + { + "product": { + "product_data": [ + { + "product_name": "xmlhttprequest-ssl", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary Code Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl.\n Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.\r\n\r\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "rinsuki" + } + ] } \ No newline at end of file From 65055ec2c03d28068bc810ec0b1ec6fff311b0dc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 18:00:44 +0000 Subject: [PATCH 132/845] "-Synchronized-Data." --- 2017/8xxx/CVE-2017-8461.json | 5 +++ 2018/18xxx/CVE-2018-18557.json | 2 +- 2019/15xxx/CVE-2019-15297.json | 5 +++ 2020/28xxx/CVE-2020-28502.json | 27 +++++++++------ 2020/29xxx/CVE-2020-29134.json | 7 +++- 2021/27xxx/CVE-2021-27099.json | 56 ++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28038.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28039.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28040.json | 62 ++++++++++++++++++++++++++++++++++ 9 files changed, 269 insertions(+), 19 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28038.json create mode 100644 2021/28xxx/CVE-2021-28039.json create mode 100644 2021/28xxx/CVE-2021-28040.json diff --git a/2017/8xxx/CVE-2017-8461.json b/2017/8xxx/CVE-2017-8461.json index 851a43f50df..05e3da0f656 100644 --- a/2017/8xxx/CVE-2017-8461.json +++ b/2017/8xxx/CVE-2017-8461.json @@ -66,6 +66,11 @@ "name": "1038701", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038701" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html", + "url": "http://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html" } ] } diff --git a/2018/18xxx/CVE-2018-18557.json b/2018/18xxx/CVE-2018-18557.json index 23cbabddf00..f840587f43e 100644 --- a/2018/18xxx/CVE-2018-18557.json +++ b/2018/18xxx/CVE-2018-18557.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "LibTIFF 3.9.3, 3.9.4, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write." + "value": "LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write." } ] }, diff --git a/2019/15xxx/CVE-2019-15297.json b/2019/15xxx/CVE-2019-15297.json index e32c3c43323..1d0cc137205 100644 --- a/2019/15xxx/CVE-2019-15297.json +++ b/2019/15xxx/CVE-2019-15297.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20210304 AST-2021-006: Crash when negotiating T.38 with a zero port", "url": "http://seclists.org/fulldisclosure/2021/Mar/5" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html", + "url": "http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html" } ] } diff --git a/2020/28xxx/CVE-2020-28502.json b/2020/28xxx/CVE-2020-28502.json index 733da61b3ee..a9497be1e60 100644 --- a/2020/28xxx/CVE-2020-28502.json +++ b/2020/28xxx/CVE-2020-28502.json @@ -66,24 +66,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935", + "name": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936", + "name": "https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938" }, { - "refsource": "CONFIRM", - "url": "https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480" + "refsource": "MISC", + "url": "https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480", + "name": "https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480" } ] }, @@ -91,7 +96,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl.\n Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.\r\n\r\n" + "value": "This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run." } ] }, diff --git a/2020/29xxx/CVE-2020-29134.json b/2020/29xxx/CVE-2020-29134.json index 2431ff0a2dd..0c3daefaad1 100644 --- a/2020/29xxx/CVE-2020-29134.json +++ b/2020/29xxx/CVE-2020-29134.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "TOTVS Fluig Luke platform allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217 Fluig Lake 1.7.0-210112 Fluig Lake 1.7.0-201215 Fluig Lake 1.7.0-201124 Fluig Lake 1.7.0-200915" + "value": "TOTVS Fluig Luke 1.7.0 allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201124 and Fluig Lake 1.7.0-200915." } ] }, @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/lucxssouza/CVE-2020-29134", "url": "https://github.com/lucxssouza/CVE-2020-29134" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49622", + "url": "https://www.exploit-db.com/exploits/49622" } ] } diff --git a/2021/27xxx/CVE-2021-27099.json b/2021/27xxx/CVE-2021-27099.json index 82256a888ee..c005ee5a8ba 100644 --- a/2021/27xxx/CVE-2021-27099.json +++ b/2021/27xxx/CVE-2021-27099.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27099", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27099", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the \"aws_iid\" Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the value of an EC2 tag prior to attestation, and the attestor is configured for agent ID templating where the tag value is the last element in the path. This issue has been fixed in SPIRE versions 0.11.3 and 0.12.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/spiffe/spire/security/advisories/GHSA-q7gm-mjrg-44h9", + "url": "https://github.com/spiffe/spire/security/advisories/GHSA-q7gm-mjrg-44h9" } ] } diff --git a/2021/28xxx/CVE-2021-28038.json b/2021/28xxx/CVE-2021-28038.json new file mode 100644 index 00000000000..513cbd82cee --- /dev/null +++ b/2021/28xxx/CVE-2021-28038.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28038", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://xenbits.xen.org/xsa/advisory-367.html", + "refsource": "MISC", + "name": "http://xenbits.xen.org/xsa/advisory-367.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28039.json b/2021/28xxx/CVE-2021-28039.json new file mode 100644 index 00000000000..0d8a6d18961 --- /dev/null +++ b/2021/28xxx/CVE-2021-28039.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28039", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFIG_XEN_UNPOPULATED_ALLOC but not CONFIG_XEN_BALLOON_MEMORY_HOTPLUG." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://xenbits.xen.org/xsa/advisory-369.html", + "refsource": "MISC", + "name": "http://xenbits.xen.org/xsa/advisory-369.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28040.json b/2021/28xxx/CVE-2021-28040.json new file mode 100644 index 00000000000..0379540e386 --- /dev/null +++ b/2021/28xxx/CVE-2021-28040.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28040", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ossec/ossec-hids/issues/1953", + "refsource": "MISC", + "name": "https://github.com/ossec/ossec-hids/issues/1953" + } + ] + } +} \ No newline at end of file From 94d7b3ff7a41becb6d06ca5a24d8c289a4d6afc5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 19:00:41 +0000 Subject: [PATCH 133/845] "-Synchronized-Data." --- 2015/9xxx/CVE-2015-9101.json | 2 +- 2016/10xxx/CVE-2016-10093.json | 2 +- 2017/15xxx/CVE-2017-15709.json | 5 +++ 2018/11xxx/CVE-2018-11775.json | 5 +++ 2018/12xxx/CVE-2018-12900.json | 2 +- 2018/6xxx/CVE-2018-6381.json | 2 +- 2019/0xxx/CVE-2019-0222.json | 10 ++++++ 2021/26xxx/CVE-2021-26117.json | 5 +++ 2021/26xxx/CVE-2021-26705.json | 56 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28038.json | 5 +++ 2021/28xxx/CVE-2021-28039.json | 5 +++ 11 files changed, 89 insertions(+), 10 deletions(-) diff --git a/2015/9xxx/CVE-2015-9101.json b/2015/9xxx/CVE-2015-9101.json index 932b8d7ef52..191ac4e265c 100644 --- a/2015/9xxx/CVE-2015-9101.json +++ b/2015/9xxx/CVE-2015-9101.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.98.4, 3.98.2, 3.98 and 3.99.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file." + "value": "The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.98.4, 3.98.2, 3.98, 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4 and 3.99.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file." } ] }, diff --git a/2016/10xxx/CVE-2016-10093.json b/2016/10xxx/CVE-2016-10093.json index 26b799cdfd1..cd64ba4b90c 100644 --- a/2016/10xxx/CVE-2016-10093.json +++ b/2016/10xxx/CVE-2016-10093.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5 and 4.0.0alpha6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow." + "value": "Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow." } ] }, diff --git a/2017/15xxx/CVE-2017-15709.json b/2017/15xxx/CVE-2017-15709.json index 1666ad34b87..126c2692925 100644 --- a/2017/15xxx/CVE-2017-15709.json +++ b/2017/15xxx/CVE-2017-15709.json @@ -87,6 +87,11 @@ "refsource": "MLIST", "name": "[activemq-gitbox] 20191022 [GitHub] [activemq-website] coheigea commented on a change in pull request #17: Fix the ordering in the security advisories page", "url": "https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html" } ] } diff --git a/2018/11xxx/CVE-2018-11775.json b/2018/11xxx/CVE-2018-11775.json index 85c135f19e7..d59e3ed698b 100644 --- a/2018/11xxx/CVE-2018-11775.json +++ b/2018/11xxx/CVE-2018-11775.json @@ -122,6 +122,11 @@ "name": "http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt", "refsource": "CONFIRM", "url": "http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html" } ] } diff --git a/2018/12xxx/CVE-2018-12900.json b/2018/12xxx/CVE-2018-12900.json index 8950c4dac85..b9eabbf42cf 100644 --- a/2018/12xxx/CVE-2018-12900.json +++ b/2018/12xxx/CVE-2018-12900.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file." + "value": "Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file." } ] }, diff --git a/2018/6xxx/CVE-2018-6381.json b/2018/6xxx/CVE-2018-6381.json index 7e341a9e0d4..b93206e22bf 100644 --- a/2018/6xxx/CVE-2018-6381.json +++ b/2018/6xxx/CVE-2018-6381.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In ZZIPlib 0.13.67, 0.13.66, 0.13.65, 0.13.64 and 0.13.63 there is a segmentation fault caused by invalid memory access in the zzip_disk_fread function (zzip/mmapped.c) because the size variable is not validated against the amount of file->stored data." + "value": "In ZZIPlib 0.13.67, 0.13.66, 0.13.65, 0.13.64, 0.13.63, 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57 and 0.13.56 there is a segmentation fault caused by invalid memory access in the zzip_disk_fread function (zzip/mmapped.c) because the size variable is not validated against the amount of file->stored data." } ] }, diff --git a/2019/0xxx/CVE-2019-0222.json b/2019/0xxx/CVE-2019-0222.json index 364e0a386eb..66dab5d3316 100644 --- a/2019/0xxx/CVE-2019-0222.json +++ b/2019/0xxx/CVE-2019-0222.json @@ -128,6 +128,16 @@ "refsource": "MLIST", "name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2582-1] mqtt-client security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26117.json b/2021/26xxx/CVE-2021-26117.json index ba8fcc8f089..51cd5c308f8 100644 --- a/2021/26xxx/CVE-2021-26117.json +++ b/2021/26xxx/CVE-2021-26117.json @@ -99,6 +99,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210304-0008/", "url": "https://security.netapp.com/advisory/ntap-20210304-0008/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26705.json b/2021/26xxx/CVE-2021-26705.json index edda42bacef..9fc3334984b 100644 --- a/2021/26xxx/CVE-2021-26705.json +++ b/2021/26xxx/CVE-2021-26705.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26705", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26705", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SquareBox CatDV Server through 9.2. An attacker can invoke sensitive RMI methods such as getConnections without authentication, the results of which can be used to generate valid authentication tokens. These tokens can then be used to invoke administrative tasks within the application, such as disclosing password hashes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49621", + "url": "https://www.exploit-db.com/exploits/49621" } ] } diff --git a/2021/28xxx/CVE-2021-28038.json b/2021/28xxx/CVE-2021-28038.json index 513cbd82cee..a4c1335cb22 100644 --- a/2021/28xxx/CVE-2021-28038.json +++ b/2021/28xxx/CVE-2021-28038.json @@ -56,6 +56,11 @@ "url": "http://xenbits.xen.org/xsa/advisory-367.html", "refsource": "MISC", "name": "http://xenbits.xen.org/xsa/advisory-367.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210305 Xen Security Advisory 367 v2 (CVE-2021-28038) - Linux: netback fails to honor grant mapping errors", + "url": "http://www.openwall.com/lists/oss-security/2021/03/05/1" } ] } diff --git a/2021/28xxx/CVE-2021-28039.json b/2021/28xxx/CVE-2021-28039.json index 0d8a6d18961..329c3c7402c 100644 --- a/2021/28xxx/CVE-2021-28039.json +++ b/2021/28xxx/CVE-2021-28039.json @@ -56,6 +56,11 @@ "url": "http://xenbits.xen.org/xsa/advisory-369.html", "refsource": "MISC", "name": "http://xenbits.xen.org/xsa/advisory-369.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210305 Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages", + "url": "http://www.openwall.com/lists/oss-security/2021/03/05/2" } ] } From 50e4f83fc764edd4d788043b6d2cde2c9c29dba7 Mon Sep 17 00:00:00 2001 From: zdi-team Date: Fri, 5 Mar 2021 13:58:19 -0600 Subject: [PATCH 134/845] ZDI assigns the following CVEs: M 2021/27xxx/CVE-2021-27254.json M 2021/27xxx/CVE-2021-27255.json M 2021/27xxx/CVE-2021-27256.json M 2021/27xxx/CVE-2021-27257.json --- 2021/27xxx/CVE-2021-27254.json | 84 +++++++++++++++++++++++++++------- 2021/27xxx/CVE-2021-27255.json | 84 +++++++++++++++++++++++++++------- 2021/27xxx/CVE-2021-27256.json | 84 +++++++++++++++++++++++++++------- 2021/27xxx/CVE-2021-27257.json | 84 +++++++++++++++++++++++++++------- 4 files changed, 272 insertions(+), 64 deletions(-) diff --git a/2021/27xxx/CVE-2021-27254.json b/2021/27xxx/CVE-2021-27254.json index 96e51bbfa7a..5e47aeffc75 100644 --- a/2021/27xxx/CVE-2021-27254.json +++ b/2021/27xxx/CVE-2021-27254.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27254", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27254", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" + } + ] } -} \ No newline at end of file + }, + "credit": "84c0", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7800. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the apply_save.cgi endpoint. This issue results from the use of hard-coded encryption key. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-12287." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-259: Use of Hard-coded Password" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-252/" + }, + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } + } +} diff --git a/2021/27xxx/CVE-2021-27255.json b/2021/27xxx/CVE-2021-27255.json index d7f806cd385..5a673224ef0 100644 --- a/2021/27xxx/CVE-2021-27255.json +++ b/2021/27xxx/CVE-2021-27255.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27255", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27255", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" + } + ] } -} \ No newline at end of file + }, + "credit": "STARLabs", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the refresh_status.aspx endpoint. The issue results from a lack of authentication required to start a service on the server. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12360." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306: Missing Authentication for Critical Function" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-263/" + }, + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } + } +} diff --git a/2021/27xxx/CVE-2021-27256.json b/2021/27xxx/CVE-2021-27256.json index 409f9475ecd..ba24c937f78 100644 --- a/2021/27xxx/CVE-2021-27256.json +++ b/2021/27xxx/CVE-2021-27256.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27256", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27256", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" + } + ] } -} \ No newline at end of file + }, + "credit": "takeshi", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of the rc_service parameter provided to apply_save.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12355." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-262/" + }, + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2021/27xxx/CVE-2021-27257.json b/2021/27xxx/CVE-2021-27257.json index 1ae88be264b..c1d4c039031 100644 --- a/2021/27xxx/CVE-2021-27257.json +++ b/2021/27xxx/CVE-2021-27257.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27257", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27257", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" + } + ] } -} \ No newline at end of file + }, + "credit": "botto", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "\t\nThis vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the downloading of files via FTP. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-12362." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-295: Improper Certificate Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-264/" + }, + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.0" + } + } +} From 6960f54089d378756a4d3ddee5b085367ff14637 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 20:00:40 +0000 Subject: [PATCH 135/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29020.json | 100 ++++++++++++++++++++++++++++++--- 2020/29xxx/CVE-2020-29028.json | 91 ++++++++++++++++++++++++++++-- 2020/29xxx/CVE-2020-29029.json | 98 ++++++++++++++++++++++++++++++-- 2020/29xxx/CVE-2020-29030.json | 91 ++++++++++++++++++++++++++++-- 2021/28xxx/CVE-2021-28041.json | 77 +++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3377.json | 61 ++++++++++++++++++-- 2021/3xxx/CVE-2021-3420.json | 50 ++++++++++++++++- 7 files changed, 534 insertions(+), 34 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28041.json diff --git a/2020/29xxx/CVE-2020-29020.json b/2020/29xxx/CVE-2020-29020.json index 3e30fd44a28..5ff77ea15c7 100644 --- a/2020/29xxx/CVE-2020-29020.json +++ b/2020/29xxx/CVE-2020-29020.json @@ -1,18 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", + "DATE_PUBLIC": "2021-03-04T22:00:00.000Z", "ID": "CVE-2020-29020", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Reject Remote Management via Cellular UPLINK2" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SiteManager", + "version": { + "version_data": [ + { + "platform": "Hardware", + "version_affected": "<", + "version_name": "All", + "version_value": "9.4.620527004" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "TR electronic se" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Access Control vulnerability in web service of Secomea SiteManager allows remote attacker to access the web UI from the internet using the configured credentials. This issue affects: Secomea SiteManager All versions prior to 9.4.620527004 on Hardware." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/#3217", + "name": "https://www.secomea.com/support/cybersecurity-advisory/#3217" + } + ] + }, + "source": { + "defect": [ + "RD-3217" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Configure Uplink (WAN) to disable management via Uplink" + } + ] } \ No newline at end of file diff --git a/2020/29xxx/CVE-2020-29028.json b/2020/29xxx/CVE-2020-29028.json index 4c8c3f6fb57..0d2ebf92b75 100644 --- a/2020/29xxx/CVE-2020-29028.json +++ b/2020/29xxx/CVE-2020-29028.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", + "DATE_PUBLIC": "2021-03-04T22:00:00.000Z", "ID": "CVE-2020-29028", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Reflected XSS issues" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GateManager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "all", + "version_value": "9.4" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Tenable, Inc." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site Scripting (XSS) vulnerability in web GUI of Secomea GateManager allows an attacker to inject arbitrary javascript code. This issue affects: Secomea GateManager all versions prior to 9.4." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/", + "name": "https://www.secomea.com/support/cybersecurity-advisory/" + } + ] + }, + "source": { + "defect": [ + "RD-3493" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/29xxx/CVE-2020-29029.json b/2020/29xxx/CVE-2020-29029.json index 85f3c5a3f03..978f1f8ae1c 100644 --- a/2020/29xxx/CVE-2020-29029.json +++ b/2020/29xxx/CVE-2020-29029.json @@ -1,18 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", + "DATE_PUBLIC": "2021-03-04T22:00:00.000Z", "ID": "CVE-2020-29029", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "XSS issue due to insufficient sanitization of input field" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GateManager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "all", + "version_value": "9.4" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation, Cross-site Scripting (XSS) vulnerability in Web GUI of Secomea GateManager allows an attacker to execute arbitrary javascript code. This issue affects: Secomea GateManager all versions prior to 9.4." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/", + "name": "https://www.secomea.com/support/cybersecurity-advisory/" + } + ] + }, + "source": { + "defect": [ + "RD-3452" + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2020/29xxx/CVE-2020-29030.json b/2020/29xxx/CVE-2020-29030.json index 68366475f73..2e33d17a48b 100644 --- a/2020/29xxx/CVE-2020-29030.json +++ b/2020/29xxx/CVE-2020-29030.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", + "DATE_PUBLIC": "2021-03-04T22:00:00.000Z", "ID": "CVE-2020-29030", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Insufficient CSRF guards" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GateManager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "All", + "version_value": "9.4" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Schneider Electric" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in web GUI of Secomea GateManager allows an attacker to execute malicious code. This issue affects: Secomea GateManager All versions prior to 9.4." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/", + "name": "https://www.secomea.com/support/cybersecurity-advisory/" + } + ] + }, + "source": { + "defect": [ + "RD-2417" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28041.json b/2021/28xxx/CVE-2021-28041.json new file mode 100644 index 00000000000..3cfff0f83ce --- /dev/null +++ b/2021/28xxx/CVE-2021-28041.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28041", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.openssh.com/security.html", + "refsource": "MISC", + "name": "https://www.openssh.com/security.html" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2021/03/03/1", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/03/03/1" + }, + { + "url": "https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db", + "refsource": "MISC", + "name": "https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db" + }, + { + "url": "https://www.openssh.com/txt/release-8.5", + "refsource": "MISC", + "name": "https://www.openssh.com/txt/release-8.5" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3377.json b/2021/3xxx/CVE-2021-3377.json index 193e5f74c15..4222b6561e7 100644 --- a/2021/3xxx/CVE-2021-3377.json +++ b/2021/3xxx/CVE-2021-3377.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3377", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3377", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf", + "url": "https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf" + }, + { + "refsource": "MISC", + "name": "https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27", + "url": "https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27" } ] } diff --git a/2021/3xxx/CVE-2021-3420.json b/2021/3xxx/CVE-2021-3420.json index dec2015be06..bbb49ae954c 100644 --- a/2021/3xxx/CVE-2021-3420.json +++ b/2021/3xxx/CVE-2021-3420.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3420", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "newlib", + "version": { + "version_data": [ + { + "version_value": "newlib versions prior to 4.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190->CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1934088", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934088" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow." } ] } From 5eed47464f7ba1541edcd5edc0f8bc03d375c293 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 21:00:38 +0000 Subject: [PATCH 136/845] "-Synchronized-Data." --- 2020/25xxx/CVE-2020-25678.json | 5 ++ 2020/28xxx/CVE-2020-28599.json | 10 +++ 2021/27xxx/CVE-2021-27254.json | 132 +++++++++++++++++---------------- 2021/27xxx/CVE-2021-27255.json | 132 +++++++++++++++++---------------- 2021/27xxx/CVE-2021-27256.json | 132 +++++++++++++++++---------------- 2021/27xxx/CVE-2021-27257.json | 132 +++++++++++++++++---------------- 2021/3xxx/CVE-2021-3407.json | 10 +++ 7 files changed, 297 insertions(+), 256 deletions(-) diff --git a/2020/25xxx/CVE-2020-25678.json b/2020/25xxx/CVE-2020-25678.json index 119c8fba1bf..b2ee64472df 100644 --- a/2020/25xxx/CVE-2020-25678.json +++ b/2020/25xxx/CVE-2020-25678.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://tracker.ceph.com/issues/37503", "url": "https://tracker.ceph.com/issues/37503" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-93ff9e9103", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQTBKVXVYP7GPQNZ5VASOIJHMLK7727M/" } ] }, diff --git a/2020/28xxx/CVE-2020-28599.json b/2020/28xxx/CVE-2020-28599.json index e37178c038d..ab4cc37d09d 100644 --- a/2020/28xxx/CVE-2020-28599.json +++ b/2020/28xxx/CVE-2020-28599.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-8349f28cb9", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRHYUWXQ7QQIC6TXDYYLYFFF7B7L3EBD/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-793da7882b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFXQZK6BAYARVVWBBXDKPVPN3N77PPDX/" } ] }, diff --git a/2021/27xxx/CVE-2021-27254.json b/2021/27xxx/CVE-2021-27254.json index 5e47aeffc75..e3068b85a31 100644 --- a/2021/27xxx/CVE-2021-27254.json +++ b/2021/27xxx/CVE-2021-27254.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2021-27254", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "R7800", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.0.2.76" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27254", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "84c0", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7800. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the apply_save.cgi endpoint. This issue results from the use of hard-coded encryption key. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-12287." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-259: Use of Hard-coded Password" - } + }, + "credit": "84c0", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7800. Authentication is not required to exploit this vulnerability. The specific flaw exists within the apply_save.cgi endpoint. This issue results from the use of hard-coded encryption key. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-12287." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-252/" - }, - { - "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-259: Use of Hard-coded Password" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-252/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-252/" + }, + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27255.json b/2021/27xxx/CVE-2021-27255.json index 5a673224ef0..cdef960578c 100644 --- a/2021/27xxx/CVE-2021-27255.json +++ b/2021/27xxx/CVE-2021-27255.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2021-27255", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "R7800", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.0.2.76" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27255", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "STARLabs", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the refresh_status.aspx endpoint. The issue results from a lack of authentication required to start a service on the server. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12360." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-306: Missing Authentication for Critical Function" - } + }, + "credit": "STARLabs", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the refresh_status.aspx endpoint. The issue results from a lack of authentication required to start a service on the server. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12360." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-263/" - }, - { - "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306: Missing Authentication for Critical Function" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-263/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-263/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27256.json b/2021/27xxx/CVE-2021-27256.json index ba24c937f78..5e9b8daa3d5 100644 --- a/2021/27xxx/CVE-2021-27256.json +++ b/2021/27xxx/CVE-2021-27256.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2021-27256", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "R7800", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.0.2.76" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27256", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "takeshi", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of the rc_service parameter provided to apply_save.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12355." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" - } + }, + "credit": "takeshi", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_save.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12355." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-262/" - }, - { - "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-262/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-262/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27257.json b/2021/27xxx/CVE-2021-27257.json index c1d4c039031..fdcbcf5cb39 100644 --- a/2021/27xxx/CVE-2021-27257.json +++ b/2021/27xxx/CVE-2021-27257.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2021-27257", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "R7800", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.0.2.76" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-27257", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "R7800", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.0.2.76" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "botto", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "\t\nThis vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the downloading of files via FTP. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-12362." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-295: Improper Certificate Validation" - } + }, + "credit": "botto", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via FTP. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-12362." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-264/" - }, - { - "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-295: Improper Certificate Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-264/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-264/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3407.json b/2021/3xxx/CVE-2021-3407.json index eb0a79657f0..ed7dd785a17 100644 --- a/2021/3xxx/CVE-2021-3407.json +++ b/2021/3xxx/CVE-2021-3407.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "http://git.ghostscript.com/?p=mupdf.git;h=cee7cefc610d42fd383b3c80c12cbc675443176a", "url": "http://git.ghostscript.com/?p=mupdf.git;h=cee7cefc610d42fd383b3c80c12cbc675443176a" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-d8e6f014e5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCADE3VSPWCGTE5BV4KL273R5VK3GDKM/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-572bb0f886", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M44PNYCBL33OD7GC75XNE6CDS4VSGVWO/" } ] }, From f19e6ff65a4488d403fdd778286700aa6bac7fa8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 22:00:41 +0000 Subject: [PATCH 137/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 10 +++++ 2021/28xxx/CVE-2021-28042.json | 67 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28043.json | 18 +++++++++ 2021/28xxx/CVE-2021-28044.json | 18 +++++++++ 2021/28xxx/CVE-2021-28045.json | 18 +++++++++ 2021/28xxx/CVE-2021-28046.json | 18 +++++++++ 6 files changed, 149 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28042.json create mode 100644 2021/28xxx/CVE-2021-28043.json create mode 100644 2021/28xxx/CVE-2021-28044.json create mode 100644 2021/28xxx/CVE-2021-28045.json create mode 100644 2021/28xxx/CVE-2021-28046.json diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index ac8b6ab6c3a..a5b64b1f174 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -400,6 +400,16 @@ "refsource": "MLIST", "name": "[beam-issues] 20210304 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210305 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210305 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/28xxx/CVE-2021-28042.json b/2021/28xxx/CVE-2021-28042.json new file mode 100644 index 00000000000..26402a47122 --- /dev/null +++ b/2021/28xxx/CVE-2021-28042.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28042", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://herolab.usd.de/security-advisories/usd-2020-0028/", + "refsource": "MISC", + "name": "https://herolab.usd.de/security-advisories/usd-2020-0028/" + }, + { + "url": "https://www.deutschepost.de/de/m/mailoptimizer.html", + "refsource": "MISC", + "name": "https://www.deutschepost.de/de/m/mailoptimizer.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28043.json b/2021/28xxx/CVE-2021-28043.json new file mode 100644 index 00000000000..61052c02bc5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28044.json b/2021/28xxx/CVE-2021-28044.json new file mode 100644 index 00000000000..b94ff33b561 --- /dev/null +++ b/2021/28xxx/CVE-2021-28044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28045.json b/2021/28xxx/CVE-2021-28045.json new file mode 100644 index 00000000000..da12abb8b3b --- /dev/null +++ b/2021/28xxx/CVE-2021-28045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28046.json b/2021/28xxx/CVE-2021-28046.json new file mode 100644 index 00000000000..a3be48d3ffe --- /dev/null +++ b/2021/28xxx/CVE-2021-28046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 950bf1d75e2a9b20a8ed0494c9b06f3f40db2f56 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Mar 2021 23:00:42 +0000 Subject: [PATCH 138/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27581.json | 61 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28047.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28048.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28049.json | 18 ++++++++++ 4 files changed, 109 insertions(+), 6 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28047.json create mode 100644 2021/28xxx/CVE-2021-28048.json create mode 100644 2021/28xxx/CVE-2021-28049.json diff --git a/2021/27xxx/CVE-2021-27581.json b/2021/27xxx/CVE-2021-27581.json index 4ecb2bffc65..21829e36973 100644 --- a/2021/27xxx/CVE-2021-27581.json +++ b/2021/27xxx/CVE-2021-27581.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27581", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27581", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kontent.ai", + "refsource": "MISC", + "name": "https://kontent.ai" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/stasinopoulos/673ae3c31d703b4d67449f4d8888c686", + "url": "https://gist.github.com/stasinopoulos/673ae3c31d703b4d67449f4d8888c686" } ] } diff --git a/2021/28xxx/CVE-2021-28047.json b/2021/28xxx/CVE-2021-28047.json new file mode 100644 index 00000000000..384f15d8f22 --- /dev/null +++ b/2021/28xxx/CVE-2021-28047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28048.json b/2021/28xxx/CVE-2021-28048.json new file mode 100644 index 00000000000..9fb8f3103cc --- /dev/null +++ b/2021/28xxx/CVE-2021-28048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28049.json b/2021/28xxx/CVE-2021-28049.json new file mode 100644 index 00000000000..af28308e5c5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 50fdb4b9265034a8bcfbb0a3e00cd2e3bd06b1ad Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 6 Mar 2021 02:00:39 +0000 Subject: [PATCH 139/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26814.json | 61 ++++++++++++++++++++++++++++++---- 1 file changed, 55 insertions(+), 6 deletions(-) diff --git a/2021/26xxx/CVE-2021-26814.json b/2021/26xxx/CVE-2021-26814.json index 128aeb2c92f..9940bbbbc07 100644 --- a/2021/26xxx/CVE-2021-26814.json +++ b/2021/26xxx/CVE-2021-26814.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26814", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26814", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html", + "refsource": "MISC", + "name": "https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html" + }, + { + "url": "https://github.com/wazuh/wazuh/releases/tag/v4.0.4", + "refsource": "MISC", + "name": "https://github.com/wazuh/wazuh/releases/tag/v4.0.4" } ] } From 2a035260259395fd2167cbcdc8613d48fa98eccf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 04:00:42 +0000 Subject: [PATCH 140/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26294.json | 56 +++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27363.json | 66 ++++++++++++++++++++++++++++++---- 2 files changed, 110 insertions(+), 12 deletions(-) diff --git a/2021/26xxx/CVE-2021-26294.json b/2021/26xxx/CVE-2021-26294.json index 8c041dfbc0b..f3cc963dde1 100644 --- a/2021/26xxx/CVE-2021-26294.json +++ b/2021/26xxx/CVE-2021-26294.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26294", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26294", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26294-exposure-of-sensitive-information-vulnerability.md", + "url": "https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26294-exposure-of-sensitive-information-vulnerability.md" } ] } diff --git a/2021/27xxx/CVE-2021-27363.json b/2021/27xxx/CVE-2021-27363.json index 6934ab0e8da..c7b9b4cb99b 100644 --- a/2021/27xxx/CVE-2021-27363.json +++ b/2021/27xxx/CVE-2021-27363.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27363", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27363", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2021/03/06/1", + "url": "http://www.openwall.com/lists/oss-security/2021/03/06/1" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1182716", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182716" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa" } ] } From 49c7dab8cfcdf52f2e2bdeb70eff3ef246ef29d7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 05:00:42 +0000 Subject: [PATCH 141/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27364.json | 66 ++++++++++++++++++++++++++++--- 2021/27xxx/CVE-2021-27365.json | 71 +++++++++++++++++++++++++++++++--- 2 files changed, 125 insertions(+), 12 deletions(-) diff --git a/2021/27xxx/CVE-2021-27364.json b/2021/27xxx/CVE-2021-27364.json index e9edd58d7b8..0011a0c0561 100644 --- a/2021/27xxx/CVE-2021-27364.json +++ b/2021/27xxx/CVE-2021-27364.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27364", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27364", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/03/06/1", + "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1182717", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182717" } ] } diff --git a/2021/27xxx/CVE-2021-27365.json b/2021/27xxx/CVE-2021-27365.json index c84dc0255e1..7457e524d51 100644 --- a/2021/27xxx/CVE-2021-27365.json +++ b/2021/27xxx/CVE-2021-27365.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27365", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27365", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/03/06/1", + "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1182715", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182715" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5" } ] } From 967ca8ccd037f9498022db6c317292a813587ac5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 08:00:47 +0000 Subject: [PATCH 142/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3410.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/3xxx/CVE-2021-3410.json b/2021/3xxx/CVE-2021-3410.json index 31120cc1ac0..046a071fe1e 100644 --- a/2021/3xxx/CVE-2021-3410.json +++ b/2021/3xxx/CVE-2021-3410.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://github.com/cacalabs/libcaca/issues/52", "url": "https://github.com/cacalabs/libcaca/issues/52" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210307 [SECURITY] [DLA 2584-1] libcaca security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00006.html" } ] }, From 4b8378bb43415ab4a87152c84db9783a2225af6e Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Sun, 7 Mar 2021 11:53:43 +0200 Subject: [PATCH 143/845] Adds CVE-2020-28466 --- 2020/28xxx/CVE-2020-28466.json | 80 ++++++++++++++++++++++++++++++++-- 1 file changed, 76 insertions(+), 4 deletions(-) diff --git a/2020/28xxx/CVE-2020-28466.json b/2020/28xxx/CVE-2020-28466.json index 1b7f4b1c9a9..df073d405ca 100644 --- a/2020/28xxx/CVE-2020-28466.json +++ b/2020/28xxx/CVE-2020-28466.json @@ -3,16 +3,88 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-07T09:53:41.365005Z", "ID": "CVE-2020-28466", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Denial of Service (DoS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "github.com/nats-io/nats-server/server", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/nats-io/nats-server/pull/1731" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects all versions of package github.com/nats-io/nats-server/server.\n Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. \r\n\r\n Disclaimer from the maintainers:\r\nRunning a NATS service which is exposed to\r\nuntrusted users presents a heightened risk. Any remote execution flaw\r\nor equivalent seriousness, or denial-of-service by unauthenticated\r\nusers, will lead to prompt releases by the NATS maintainers. Fixes\r\nfor denial of service issues with no threat of remote execution, when\r\nlimited to account holders, are likely to just be committed to the\r\nmain development branch with no special attention. Those who are\r\nrunning such services are encouraged to build regularly from git.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "derekcollison" + } + ] } \ No newline at end of file From 8fe6e614d865500f37a0a6ebd15dc5dac591f952 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 10:00:49 +0000 Subject: [PATCH 144/845] "-Synchronized-Data." --- 2020/28xxx/CVE-2020-28466.json | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/2020/28xxx/CVE-2020-28466.json b/2020/28xxx/CVE-2020-28466.json index df073d405ca..6a3e2e235a2 100644 --- a/2020/28xxx/CVE-2020-28466.json +++ b/2020/28xxx/CVE-2020-28466.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967", + "name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967" }, { - "refsource": "CONFIRM", - "url": "https://github.com/nats-io/nats-server/pull/1731" + "refsource": "MISC", + "url": "https://github.com/nats-io/nats-server/pull/1731", + "name": "https://github.com/nats-io/nats-server/pull/1731" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package github.com/nats-io/nats-server/server.\n Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. \r\n\r\n Disclaimer from the maintainers:\r\nRunning a NATS service which is exposed to\r\nuntrusted users presents a heightened risk. Any remote execution flaw\r\nor equivalent seriousness, or denial-of-service by unauthenticated\r\nusers, will lead to prompt releases by the NATS maintainers. Fixes\r\nfor denial of service issues with no threat of remote execution, when\r\nlimited to account holders, are likely to just be committed to the\r\nmain development branch with no special attention. Those who are\r\nrunning such services are encouraged to build regularly from git.\n" + "value": "This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git." } ] }, From 74a07d9facc77b6e0ee6ef234ae3814640eb0655 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 11:00:42 +0000 Subject: [PATCH 145/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 35 ++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 44554cd1512..db76f6ceb67 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -154,6 +154,41 @@ "refsource": "MLIST", "name": "[activemq-gitbox] 20210303 [GitHub] [activemq] ehossack-aws opened a new pull request #616: Upgrade to Jetty 9.4.38.v20210224", "url": "https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg opened a new pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-issues] 20210307 [jira] [Updated] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-issues] 20210307 [jira] [Created] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg opened a new pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg opened a new pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-dev] 20210307 [jira] [Created] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E" } ] } From 1aa7890e33c1ba86f376307caf45ab23f8826fed Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 15:00:40 +0000 Subject: [PATCH 146/845] "-Synchronized-Data." --- 2020/0xxx/CVE-2020-0822.json | 5 +++++ 2020/8xxx/CVE-2020-8022.json | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/2020/0xxx/CVE-2020-0822.json b/2020/0xxx/CVE-2020-0822.json index 03af2a24e7b..cacdfdf00cb 100644 --- a/2020/0xxx/CVE-2020-0822.json +++ b/2020/0xxx/CVE-2020-0822.json @@ -250,6 +250,11 @@ "refsource": "MLIST", "name": "[axis-java-dev] 20210228 axis2 1.7.9 is exposed to CVE-2020-8022 via tomcat dependency", "url": "https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928@%3Cjava-dev.axis.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[axis-java-dev] 20210307 Re: axis2 1.7.9 is exposed to CVE-2020-8022 via tomcat dependency", + "url": "https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E" } ] } diff --git a/2020/8xxx/CVE-2020-8022.json b/2020/8xxx/CVE-2020-8022.json index 48225516ecb..70074e13e62 100644 --- a/2020/8xxx/CVE-2020-8022.json +++ b/2020/8xxx/CVE-2020-8022.json @@ -261,6 +261,11 @@ "refsource": "MLIST", "name": "[axis-java-dev] 20210228 axis2 1.7.9 is exposed to CVE-2020-8022 via tomcat dependency", "url": "https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928@%3Cjava-dev.axis.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[axis-java-dev] 20210307 Re: axis2 1.7.9 is exposed to CVE-2020-8022 via tomcat dependency", + "url": "https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E" } ] }, From 0ed48bbd58f82785c97b8456c3bd278e2c6fc38f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 16:00:41 +0000 Subject: [PATCH 147/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13977.json | 10 ++++++++++ 2021/21xxx/CVE-2021-21330.json | 5 +++++ 2 files changed, 15 insertions(+) diff --git a/2020/13xxx/CVE-2020-13977.json b/2020/13xxx/CVE-2020-13977.json index 5befa542637..fdaae1aa133 100644 --- a/2020/13xxx/CVE-2020-13977.json +++ b/2020/13xxx/CVE-2020-13977.json @@ -66,6 +66,16 @@ "url": "https://github.com/sawolf/nagioscore/tree/url-injection-fix", "refsource": "MISC", "name": "https://github.com/sawolf/nagioscore/tree/url-injection-fix" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b5e897a2e5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-5689072a7e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/" } ] } diff --git a/2021/21xxx/CVE-2021-21330.json b/2021/21xxx/CVE-2021-21330.json index a73baf4497e..0cd57495a4e 100644 --- a/2021/21xxx/CVE-2021-21330.json +++ b/2021/21xxx/CVE-2021-21330.json @@ -93,6 +93,11 @@ "refsource": "DEBIAN", "name": "DSA-4864", "url": "https://www.debian.org/security/2021/dsa-4864" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-673b10ed77", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/" } ] }, From 3efd49615dd3c5dcedef6b8376afd3eb8eb6a34a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 20:00:40 +0000 Subject: [PATCH 148/845] "-Synchronized-Data." --- 2009/20xxx/CVE-2009-20001.json | 67 ++++++++++++++++++++++++++++++++++ 2019/25xxx/CVE-2019-25008.json | 58 ++++------------------------- 2021/28xxx/CVE-2021-28050.json | 18 +++++++++ 2021/28xxx/CVE-2021-28051.json | 18 +++++++++ 2021/28xxx/CVE-2021-28052.json | 18 +++++++++ 5 files changed, 128 insertions(+), 51 deletions(-) create mode 100644 2009/20xxx/CVE-2009-20001.json create mode 100644 2021/28xxx/CVE-2021-28050.json create mode 100644 2021/28xxx/CVE-2021-28051.json create mode 100644 2021/28xxx/CVE-2021-28052.json diff --git a/2009/20xxx/CVE-2009-20001.json b/2009/20xxx/CVE-2009-20001.json new file mode 100644 index 00000000000..02c46b83f0f --- /dev/null +++ b/2009/20xxx/CVE-2009-20001.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2009-20001", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://mantisbt.org/bugs/view.php?id=27976", + "refsource": "MISC", + "name": "https://mantisbt.org/bugs/view.php?id=27976" + }, + { + "url": "https://mantisbt.org/bugs/view.php?id=11296", + "refsource": "MISC", + "name": "https://mantisbt.org/bugs/view.php?id=11296" + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25008.json b/2019/25xxx/CVE-2019-25008.json index e2140fe50ec..57aab344c73 100644 --- a/2019/25xxx/CVE-2019-25008.json +++ b/2019/25xxx/CVE-2019-25008.json @@ -1,61 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-25008", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25008", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "An issue was discovered in the http crate before 0.1.20 for Rust. HeaderMap::reserve() has an integer overflow that allows attackers to cause a denial of service." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://rustsec.org/advisories/RUSTSEC-2019-0033.html", - "refsource": "MISC", - "name": "https://rustsec.org/advisories/RUSTSEC-2019-0033.html" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-25574. Reason: This candidate is a duplicate of CVE-2020-25574. Notes: All CVE users should reference CVE-2020-25574 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2021/28xxx/CVE-2021-28050.json b/2021/28xxx/CVE-2021-28050.json new file mode 100644 index 00000000000..1d75ecfa213 --- /dev/null +++ b/2021/28xxx/CVE-2021-28050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28051.json b/2021/28xxx/CVE-2021-28051.json new file mode 100644 index 00000000000..8833724ed54 --- /dev/null +++ b/2021/28xxx/CVE-2021-28051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28052.json b/2021/28xxx/CVE-2021-28052.json new file mode 100644 index 00000000000..8835903cc3c --- /dev/null +++ b/2021/28xxx/CVE-2021-28052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From ca6449f8735b901f8a78f732da9cd96b28631803 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 7 Mar 2021 21:00:39 +0000 Subject: [PATCH 149/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28053.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28054.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28055.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28056.json | 18 ++++++++++++++++++ 4 files changed, 72 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28053.json create mode 100644 2021/28xxx/CVE-2021-28054.json create mode 100644 2021/28xxx/CVE-2021-28055.json create mode 100644 2021/28xxx/CVE-2021-28056.json diff --git a/2021/28xxx/CVE-2021-28053.json b/2021/28xxx/CVE-2021-28053.json new file mode 100644 index 00000000000..61471671475 --- /dev/null +++ b/2021/28xxx/CVE-2021-28053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28054.json b/2021/28xxx/CVE-2021-28054.json new file mode 100644 index 00000000000..95d09ab1026 --- /dev/null +++ b/2021/28xxx/CVE-2021-28054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28055.json b/2021/28xxx/CVE-2021-28055.json new file mode 100644 index 00000000000..5862461acdb --- /dev/null +++ b/2021/28xxx/CVE-2021-28055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28056.json b/2021/28xxx/CVE-2021-28056.json new file mode 100644 index 00000000000..bf08b67ea54 --- /dev/null +++ b/2021/28xxx/CVE-2021-28056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a4b7c2ac9d541ec0745df368fe560d38019f9865 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 01:00:44 +0000 Subject: [PATCH 150/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13848.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/13xxx/CVE-2020-13848.json b/2020/13xxx/CVE-2020-13848.json index 554ef36ab7b..0b52cf8e285 100644 --- a/2020/13xxx/CVE-2020-13848.json +++ b/2020/13xxx/CVE-2020-13848.json @@ -76,6 +76,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0821", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210307 [SECURITY] [DLA 2585-1] libupnp security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00007.html" } ] } From 8b5bf29f705cc41ae2e1e2f13872d8095be391e7 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Mon, 8 Mar 2021 06:40:55 +0200 Subject: [PATCH 151/845] Adds CVE-2021-23351 --- 2021/23xxx/CVE-2021-23351.json | 88 ++++++++++++++++++++++++++++++++-- 1 file changed, 84 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23351.json b/2021/23xxx/CVE-2021-23351.json index 43832f5fd0b..554cd060460 100644 --- a/2021/23xxx/CVE-2021-23351.json +++ b/2021/23xxx/CVE-2021-23351.json @@ -3,16 +3,96 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-08T04:40:53.457117Z", "ID": "CVE-2021-23351", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Denial of Service (DoS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "github.com/pires/go-proxyproto", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "0.5.0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/pires/go-proxyproto/pull/71" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/pires/go-proxyproto/issues/69" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function.\r\n\r\nThe reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline.\r\nSince no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging.\r\n\r\nThe risk here is small, because only trusted sources should be allowed to send proxy protocol headers.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Iestyn Elfick" + } + ] } \ No newline at end of file From 74512b5e7724b5b0c12537fbe8d813e0a2bd2ddd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 05:00:45 +0000 Subject: [PATCH 152/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23351.json | 22 +++++++++++++--------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/2021/23xxx/CVE-2021-23351.json b/2021/23xxx/CVE-2021-23351.json index 554cd060460..853bb28ec32 100644 --- a/2021/23xxx/CVE-2021-23351.json +++ b/2021/23xxx/CVE-2021-23351.json @@ -48,20 +48,24 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577", + "name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577" }, { - "refsource": "CONFIRM", - "url": "https://github.com/pires/go-proxyproto/pull/71" + "refsource": "MISC", + "url": "https://github.com/pires/go-proxyproto/pull/71", + "name": "https://github.com/pires/go-proxyproto/pull/71" }, { - "refsource": "CONFIRM", - "url": "https://github.com/pires/go-proxyproto/issues/69" + "refsource": "MISC", + "url": "https://github.com/pires/go-proxyproto/issues/69", + "name": "https://github.com/pires/go-proxyproto/issues/69" }, { - "refsource": "CONFIRM", - "url": "https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b" + "refsource": "MISC", + "url": "https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b", + "name": "https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b" } ] }, @@ -69,7 +73,7 @@ "description_data": [ { "lang": "eng", - "value": "The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function.\r\n\r\nThe reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline.\r\nSince no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging.\r\n\r\nThe risk here is small, because only trusted sources should be allowed to send proxy protocol headers.\n" + "value": "The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers." } ] }, From 8fa06bd69aef8f737ec180a31d833743bb78f876 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 06:00:41 +0000 Subject: [PATCH 153/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28057.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28058.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28059.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28060.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28061.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28062.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28063.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28064.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28065.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28066.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28067.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28068.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28069.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28070.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28071.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28072.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28073.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28074.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28075.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28076.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28077.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28078.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28079.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28080.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28081.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28082.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28083.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28084.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28085.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28086.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28087.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28088.json | 18 ++++++++++++++++++ 32 files changed, 576 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28057.json create mode 100644 2021/28xxx/CVE-2021-28058.json create mode 100644 2021/28xxx/CVE-2021-28059.json create mode 100644 2021/28xxx/CVE-2021-28060.json create mode 100644 2021/28xxx/CVE-2021-28061.json create mode 100644 2021/28xxx/CVE-2021-28062.json create mode 100644 2021/28xxx/CVE-2021-28063.json create mode 100644 2021/28xxx/CVE-2021-28064.json create mode 100644 2021/28xxx/CVE-2021-28065.json create mode 100644 2021/28xxx/CVE-2021-28066.json create mode 100644 2021/28xxx/CVE-2021-28067.json create mode 100644 2021/28xxx/CVE-2021-28068.json create mode 100644 2021/28xxx/CVE-2021-28069.json create mode 100644 2021/28xxx/CVE-2021-28070.json create mode 100644 2021/28xxx/CVE-2021-28071.json create mode 100644 2021/28xxx/CVE-2021-28072.json create mode 100644 2021/28xxx/CVE-2021-28073.json create mode 100644 2021/28xxx/CVE-2021-28074.json create mode 100644 2021/28xxx/CVE-2021-28075.json create mode 100644 2021/28xxx/CVE-2021-28076.json create mode 100644 2021/28xxx/CVE-2021-28077.json create mode 100644 2021/28xxx/CVE-2021-28078.json create mode 100644 2021/28xxx/CVE-2021-28079.json create mode 100644 2021/28xxx/CVE-2021-28080.json create mode 100644 2021/28xxx/CVE-2021-28081.json create mode 100644 2021/28xxx/CVE-2021-28082.json create mode 100644 2021/28xxx/CVE-2021-28083.json create mode 100644 2021/28xxx/CVE-2021-28084.json create mode 100644 2021/28xxx/CVE-2021-28085.json create mode 100644 2021/28xxx/CVE-2021-28086.json create mode 100644 2021/28xxx/CVE-2021-28087.json create mode 100644 2021/28xxx/CVE-2021-28088.json diff --git a/2021/28xxx/CVE-2021-28057.json b/2021/28xxx/CVE-2021-28057.json new file mode 100644 index 00000000000..5088399980e --- /dev/null +++ b/2021/28xxx/CVE-2021-28057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28058.json b/2021/28xxx/CVE-2021-28058.json new file mode 100644 index 00000000000..a3c69068740 --- /dev/null +++ b/2021/28xxx/CVE-2021-28058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28059.json b/2021/28xxx/CVE-2021-28059.json new file mode 100644 index 00000000000..ed66ecaacd8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28060.json b/2021/28xxx/CVE-2021-28060.json new file mode 100644 index 00000000000..24896bf1ae8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28061.json b/2021/28xxx/CVE-2021-28061.json new file mode 100644 index 00000000000..12a8f9da755 --- /dev/null +++ b/2021/28xxx/CVE-2021-28061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28062.json b/2021/28xxx/CVE-2021-28062.json new file mode 100644 index 00000000000..1d087048cc4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28063.json b/2021/28xxx/CVE-2021-28063.json new file mode 100644 index 00000000000..23f53f435a5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28064.json b/2021/28xxx/CVE-2021-28064.json new file mode 100644 index 00000000000..f991e356916 --- /dev/null +++ b/2021/28xxx/CVE-2021-28064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28065.json b/2021/28xxx/CVE-2021-28065.json new file mode 100644 index 00000000000..815871eacfe --- /dev/null +++ b/2021/28xxx/CVE-2021-28065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28066.json b/2021/28xxx/CVE-2021-28066.json new file mode 100644 index 00000000000..a7abbfa1fbf --- /dev/null +++ b/2021/28xxx/CVE-2021-28066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28067.json b/2021/28xxx/CVE-2021-28067.json new file mode 100644 index 00000000000..496100ffca2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28068.json b/2021/28xxx/CVE-2021-28068.json new file mode 100644 index 00000000000..1a1cfd3ac8a --- /dev/null +++ b/2021/28xxx/CVE-2021-28068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28069.json b/2021/28xxx/CVE-2021-28069.json new file mode 100644 index 00000000000..8c04d81d965 --- /dev/null +++ b/2021/28xxx/CVE-2021-28069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28070.json b/2021/28xxx/CVE-2021-28070.json new file mode 100644 index 00000000000..a7c4ab3e7d9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28071.json b/2021/28xxx/CVE-2021-28071.json new file mode 100644 index 00000000000..1d8126dd79f --- /dev/null +++ b/2021/28xxx/CVE-2021-28071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28072.json b/2021/28xxx/CVE-2021-28072.json new file mode 100644 index 00000000000..20bfdd59b21 --- /dev/null +++ b/2021/28xxx/CVE-2021-28072.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28072", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28073.json b/2021/28xxx/CVE-2021-28073.json new file mode 100644 index 00000000000..5c283b20f0b --- /dev/null +++ b/2021/28xxx/CVE-2021-28073.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28073", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28074.json b/2021/28xxx/CVE-2021-28074.json new file mode 100644 index 00000000000..c268a688da0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28074.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28074", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28075.json b/2021/28xxx/CVE-2021-28075.json new file mode 100644 index 00000000000..410891610f8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28075.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28075", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28076.json b/2021/28xxx/CVE-2021-28076.json new file mode 100644 index 00000000000..a21468fe654 --- /dev/null +++ b/2021/28xxx/CVE-2021-28076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28077.json b/2021/28xxx/CVE-2021-28077.json new file mode 100644 index 00000000000..1077a921f88 --- /dev/null +++ b/2021/28xxx/CVE-2021-28077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28078.json b/2021/28xxx/CVE-2021-28078.json new file mode 100644 index 00000000000..0affe862afe --- /dev/null +++ b/2021/28xxx/CVE-2021-28078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28079.json b/2021/28xxx/CVE-2021-28079.json new file mode 100644 index 00000000000..64b49a0ba02 --- /dev/null +++ b/2021/28xxx/CVE-2021-28079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28080.json b/2021/28xxx/CVE-2021-28080.json new file mode 100644 index 00000000000..036be84f18c --- /dev/null +++ b/2021/28xxx/CVE-2021-28080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28081.json b/2021/28xxx/CVE-2021-28081.json new file mode 100644 index 00000000000..0d5937703d6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28082.json b/2021/28xxx/CVE-2021-28082.json new file mode 100644 index 00000000000..9eb2aa9374b --- /dev/null +++ b/2021/28xxx/CVE-2021-28082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28083.json b/2021/28xxx/CVE-2021-28083.json new file mode 100644 index 00000000000..d0f23c725b2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28084.json b/2021/28xxx/CVE-2021-28084.json new file mode 100644 index 00000000000..dffea1eba3d --- /dev/null +++ b/2021/28xxx/CVE-2021-28084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28085.json b/2021/28xxx/CVE-2021-28085.json new file mode 100644 index 00000000000..129a513c725 --- /dev/null +++ b/2021/28xxx/CVE-2021-28085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28086.json b/2021/28xxx/CVE-2021-28086.json new file mode 100644 index 00000000000..a6302046a8c --- /dev/null +++ b/2021/28xxx/CVE-2021-28086.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28086", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28087.json b/2021/28xxx/CVE-2021-28087.json new file mode 100644 index 00000000000..f32913a2810 --- /dev/null +++ b/2021/28xxx/CVE-2021-28087.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28087", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28088.json b/2021/28xxx/CVE-2021-28088.json new file mode 100644 index 00000000000..ab32de3b220 --- /dev/null +++ b/2021/28xxx/CVE-2021-28088.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28088", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From b0e2c200eb601bcf1756d195e9389e28a1c04fd9 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Mon, 8 Mar 2021 10:31:42 +0100 Subject: [PATCH 154/845] Commit CVE-2018-13380 --- 2018/13xxx/CVE-2018-13380.json | 42 +++++++++++++++++----------------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/2018/13xxx/CVE-2018-13380.json b/2018/13xxx/CVE-2018-13380.json index ee7fb9181d6..210fa295ff8 100644 --- a/2018/13xxx/CVE-2018-13380.json +++ b/2018/13xxx/CVE-2018-13380.json @@ -15,17 +15,11 @@ "product": { "product_data": [ { - "product_name": "Fortinet FortiOS", + "product_name": "Fortinet FortiOS, FortiProxy", "version": { "version_data": [ { - "version_value": "FortiOS 6.0.0 to 6.0.4" - }, - { - "version_value": "5.6.0 to 5.6.7" - }, - { - "version_value": "5.4 and below versions" + "version_value": "FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below, FortiProxy 2.0.0, 1.2.8 and below" } ] } @@ -36,6 +30,22 @@ ] } }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 4.6, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Changed", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "version": "3.1" + } + }, "problemtype": { "problemtype_data": [ { @@ -52,18 +62,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://fortiguard.com/advisory/FG-IR-18-383", - "url": "https://fortiguard.com/advisory/FG-IR-18-383" - }, - { - "refsource": "BID", - "name": "108681", - "url": "http://www.securityfocus.com/bid/108681" - }, - { - "refsource": "MISC", - "name": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/", - "url": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/" + "name": "https://fortiguard.com/advisory/FG-IR-18-383\r\nhttps://fortiguard.com/advisory/FG-IR-20-230", + "url": "https://fortiguard.com/advisory/FG-IR-18-383\r\nhttps://fortiguard.com/advisory/FG-IR-20-230" } ] }, @@ -71,7 +71,7 @@ "description_data": [ { "lang": "eng", - "value": "A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below versions under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters." + "value": "A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below and Fortinet FortiProxy 2.0.0, 1.2.8 and below under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters." } ] } From a2f6ee8eb8248358ddc980021c442f8684b0d57b Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Mon, 8 Mar 2021 10:39:29 +0000 Subject: [PATCH 155/845] Commit CVE-2018-13380.json --- 2018/13xxx/CVE-2018-13380.json | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/2018/13xxx/CVE-2018-13380.json b/2018/13xxx/CVE-2018-13380.json index 210fa295ff8..428fe3f39a1 100644 --- a/2018/13xxx/CVE-2018-13380.json +++ b/2018/13xxx/CVE-2018-13380.json @@ -62,8 +62,13 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://fortiguard.com/advisory/FG-IR-18-383\r\nhttps://fortiguard.com/advisory/FG-IR-20-230", - "url": "https://fortiguard.com/advisory/FG-IR-18-383\r\nhttps://fortiguard.com/advisory/FG-IR-20-230" + "name": "https://fortiguard.com/advisory/FG-IR-18-383\r", + "url": "https://fortiguard.com/advisory/FG-IR-18-383\r" + }, + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-230", + "url": "https://fortiguard.com/advisory/FG-IR-20-230" } ] }, @@ -75,4 +80,4 @@ } ] } -} \ No newline at end of file +} From 49bc25c5a9c416e3b5f6b215e720d481d8966569 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 11:00:37 +0000 Subject: [PATCH 156/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index a5b64b1f174..864ab670256 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -410,6 +410,21 @@ "refsource": "MLIST", "name": "[beam-issues] 20210305 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[iotdb-commits] 20210308 [iotdb] branch master updated: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[iotdb-reviews] 20210308 [GitHub] [iotdb] jixuan1989 merged pull request #2768: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[iotdb-reviews] 20210308 [GitHub] [iotdb] jixuan1989 commented on pull request #2768: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E" } ] } From cc62b760bc1b26b556a22782b6538b8bb6d22663 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 12:00:42 +0000 Subject: [PATCH 157/845] "-Synchronized-Data." --- 2019/5xxx/CVE-2019-5086.json | 5 +++++ 2019/5xxx/CVE-2019-5087.json | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/2019/5xxx/CVE-2019-5086.json b/2019/5xxx/CVE-2019-5086.json index d621aa8e4c0..b5a36e54c03 100644 --- a/2019/5xxx/CVE-2019-5086.json +++ b/2019/5xxx/CVE-2019-5086.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210210 [SECURITY] [DLA 2553-1] xcftools security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210308 [SECURITY] [DLA 2553-2] xcftools regression update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00008.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5087.json b/2019/5xxx/CVE-2019-5087.json index 8e64483be49..8c7f05a1830 100644 --- a/2019/5xxx/CVE-2019-5087.json +++ b/2019/5xxx/CVE-2019-5087.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210210 [SECURITY] [DLA 2553-1] xcftools security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210308 [SECURITY] [DLA 2553-2] xcftools regression update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00008.html" } ] }, From d6d54d0ef4a64a743be72afd4a25b27de8e36381 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 13:00:50 +0000 Subject: [PATCH 158/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26788.json | 56 ++++++++++++++++++++++++++++++---- 1 file changed, 50 insertions(+), 6 deletions(-) diff --git a/2021/26xxx/CVE-2021-26788.json b/2021/26xxx/CVE-2021-26788.json index 89f293c91fe..2cddf123bd9 100644 --- a/2021/26xxx/CVE-2021-26788.json +++ b/2021/26xxx/CVE-2021-26788.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26788", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26788", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). To exploit the vulnerability, an attacker needs to have TCP connectivity to the target system. Receiving a maliciously crafted TCP packet from an unauthenticated endpoint is sufficient to trigger the bug." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Oryx-Embedded/CycloneTCP/commit/de5336016edbe1e90327d0ed1cba5c4e49114366?branch=de5336016edbe1e90327d0ed1cba5c4e49114366&diff=split", + "refsource": "MISC", + "name": "https://github.com/Oryx-Embedded/CycloneTCP/commit/de5336016edbe1e90327d0ed1cba5c4e49114366?branch=de5336016edbe1e90327d0ed1cba5c4e49114366&diff=split" } ] } From 479bbe4576f36061cdf09305a67cfbe45f5a0ba3 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Mon, 8 Mar 2021 14:00:11 +0000 Subject: [PATCH 159/845] Commit CVE-2018-13380 --- 2018/13xxx/CVE-2018-13380.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2018/13xxx/CVE-2018-13380.json b/2018/13xxx/CVE-2018-13380.json index 428fe3f39a1..a898957b7e5 100644 --- a/2018/13xxx/CVE-2018-13380.json +++ b/2018/13xxx/CVE-2018-13380.json @@ -62,8 +62,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://fortiguard.com/advisory/FG-IR-18-383\r", - "url": "https://fortiguard.com/advisory/FG-IR-18-383\r" + "name": "https://fortiguard.com/advisory/FG-IR-18-383", + "url": "https://fortiguard.com/advisory/FG-IR-18-383" }, { "refsource": "CONFIRM", From 3b7ca4a14c9d0e7c1deebb33e1931d2a7ad77a2a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 14:00:38 +0000 Subject: [PATCH 160/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3424.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3424.json diff --git a/2021/3xxx/CVE-2021-3424.json b/2021/3xxx/CVE-2021-3424.json new file mode 100644 index 00000000000..d3247ba0c01 --- /dev/null +++ b/2021/3xxx/CVE-2021-3424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 2eded337299ff4cf79bd4a0f890b8fac248af34f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 15:00:39 +0000 Subject: [PATCH 161/845] "-Synchronized-Data." --- 2020/23xxx/CVE-2020-23967.json | 66 ++++++++++++++++++++++++++++++---- 2020/25xxx/CVE-2020-25657.json | 6 ++-- 2021/23xxx/CVE-2021-23339.json | 9 +++-- 2021/27xxx/CVE-2021-27222.json | 66 ++++++++++++++++++++++++++++++---- 4 files changed, 127 insertions(+), 20 deletions(-) diff --git a/2020/23xxx/CVE-2020-23967.json b/2020/23xxx/CVE-2020-23967.json index 11938f79afb..83aab3c6a1d 100644 --- a/2020/23xxx/CVE-2020-23967.json +++ b/2020/23xxx/CVE-2020-23967.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23967", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23967", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dr.Web Security Space versions 11 and 12 allow elevation of privilege for local users without administrative privileges to NT AUTHORITY\\SYSTEM due to insufficient control during autoupdate." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://amonitoring.ru/article/drweb/", + "refsource": "MISC", + "name": "https://amonitoring.ru/article/drweb/" + }, + { + "url": "https://habr.com/ru/company/pm/blog/509592/", + "refsource": "MISC", + "name": "https://habr.com/ru/company/pm/blog/509592/" + }, + { + "url": "https://www.youtube.com/watch?v=q7Kqi7kE59U", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=q7Kqi7kE59U" } ] } diff --git a/2020/25xxx/CVE-2020-25657.json b/2020/25xxx/CVE-2020-25657.json index bf7441a5c2f..5a6114e6471 100644 --- a/2020/25xxx/CVE-2020-25657.json +++ b/2020/25xxx/CVE-2020-25657.json @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "all versions" + "version_value": "All released versions of m2crypto" } ] } @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823,https://gitlab.com/m2crypto/m2crypto/-/issues/285", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823,https://gitlab.com/m2crypto/m2crypto/-/issues/285" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823" } ] }, diff --git a/2021/23xxx/CVE-2021-23339.json b/2021/23xxx/CVE-2021-23339.json index 7b52156d0c1..f92ed823492 100644 --- a/2021/23xxx/CVE-2021-23339.json +++ b/2021/23xxx/CVE-2021-23339.json @@ -13,6 +13,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { @@ -20,15 +21,13 @@ "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "0" + "version_value": "all versions before 10.1.14 and from 10.2.0 to 10.2.4" } ] } } ] - }, - "vendor_name": "n/a" + } } ] } @@ -63,7 +62,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package com.typesafe.akka:akka-http-core. It allows multiple Transfer-Encoding headers." + "value": "This affects all versions before 10.1.14 and from 10.2.0 to 10.2.4 of package com.typesafe.akka:akka-http-core. It allows multiple Transfer-Encoding headers." } ] }, diff --git a/2021/27xxx/CVE-2021-27222.json b/2021/27xxx/CVE-2021-27222.json index 740145bdac7..d28f8e62b83 100644 --- a/2021/27xxx/CVE-2021-27222.json +++ b/2021/27xxx/CVE-2021-27222.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27222", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27222", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the \"Time in Status\" app before 4.13.0 for Jira, remote authenticated attackers can cause Stored XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://marketplace.atlassian.com/apps/1211756/time-in-status/version-history", + "refsource": "MISC", + "name": "https://marketplace.atlassian.com/apps/1211756/time-in-status/version-history" + }, + { + "refsource": "MISC", + "name": "https://dev.obss.com.tr/confluence/display/MD/2021-02-25+Time+in+Status+for+Jira+Server+and+Data+Center+Security+Advisory", + "url": "https://dev.obss.com.tr/confluence/display/MD/2021-02-25+Time+in+Status+for+Jira+Server+and+Data+Center+Security+Advisory" + }, + { + "refsource": "MISC", + "name": "https://dev.obss.com.tr/jira/browse/APDTIS-1097?src=confmacro", + "url": "https://dev.obss.com.tr/jira/browse/APDTIS-1097?src=confmacro" } ] } From 3bd4769f3cc7d6ef104c672d17258bac69cfc737 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Mon, 8 Mar 2021 15:23:21 +0000 Subject: [PATCH 162/845] Commit CVE-2018-13380 --- 2018/13xxx/CVE-2018-13380.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2018/13xxx/CVE-2018-13380.json b/2018/13xxx/CVE-2018-13380.json index a898957b7e5..596ab4a974e 100644 --- a/2018/13xxx/CVE-2018-13380.json +++ b/2018/13xxx/CVE-2018-13380.json @@ -15,11 +15,11 @@ "product": { "product_data": [ { - "product_name": "Fortinet FortiOS, FortiProxy", + "product_name": "Fortinet FortiOS and FortiProxy", "version": { "version_data": [ { - "version_value": "FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below, FortiProxy 2.0.0, 1.2.8 and below" + "version_value": "FortiGate 6.0.0 through 6.0.4, 5.6.0 through 5.6.7, 5.4.0 through 5.4.12, 5.2 and earlier and FortiProxy versions 2.0.0, 1.2.8 and earlier" } ] } From 14afb3b4ec0601ed6746084408e9797135e535f6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 16:00:38 +0000 Subject: [PATCH 163/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2020/25xxx/CVE-2020-25902.json | 2 +- 2020/27xxx/CVE-2020-27817.json | 4 ++-- 2020/36xxx/CVE-2020-36256.json | 18 ++++++++++++++++++ 4 files changed, 26 insertions(+), 3 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36256.json diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 672f5df8726..cd9fd617f6d 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -138,6 +138,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210303 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210308 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/25xxx/CVE-2020-25902.json b/2020/25xxx/CVE-2020-25902.json index ac6d71dfa18..ad23df41799 100644 --- a/2020/25xxx/CVE-2020-25902.json +++ b/2020/25xxx/CVE-2020-25902.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Blackboard Collaborate Ultra 20.02 is affected by a cross-site scripting (XSS) vulnerability. The XSS payload will execute on the class room, which leads to stealing cookies from users who join the class." + "value": "** DISPUTED ** Blackboard Collaborate Ultra 20.02 is affected by a cross-site scripting (XSS) vulnerability. The XSS payload will execute on the class room, which leads to stealing cookies from users who join the class. NOTE: Third-parties dispute the validity of this entry as a possible false positive during research." } ] }, diff --git a/2020/27xxx/CVE-2020-27817.json b/2020/27xxx/CVE-2020-27817.json index 99ab070e7ea..d195cdc8d47 100644 --- a/2020/27xxx/CVE-2020-27817.json +++ b/2020/27xxx/CVE-2020-27817.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2020-27817", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA." } ] } diff --git a/2020/36xxx/CVE-2020-36256.json b/2020/36xxx/CVE-2020-36256.json new file mode 100644 index 00000000000..985a6b320ae --- /dev/null +++ b/2020/36xxx/CVE-2020-36256.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36256", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From b94e22188a85bee82dbb53594a9fd070a0ec9339 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 09:55:11 -0700 Subject: [PATCH 164/845] Add CVE-2021-21324 for GHSA-jvwm-gq36-3v7v --- 2021/21xxx/CVE-2021-21324.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21324.json b/2021/21xxx/CVE-2021-21324.json index 19047f916e1..7cd2d36f1d1 100644 --- a/2021/21xxx/CVE-2021-21324.json +++ b/2021/21xxx/CVE-2021-21324.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21324", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Insecure Direct Object Reference (IDOR) on \"Solutions\"" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts.\n\n" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" + }, + { + "name": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-jvwm-gq36-3v7v", + "discovery": "UNKNOWN" } } \ No newline at end of file From 40573fefe9e689c5c7ebef97bb08c3dd0c8727cd Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 09:56:48 -0700 Subject: [PATCH 165/845] Add CVE-2021-21325 for GHSA-m574-f3jw-pwrf --- 2021/21xxx/CVE-2021-21325.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21325.json b/2021/21xxx/CVE-2021-21325.json index 5d425eab25b..93e0e5e2ce8 100644 --- a/2021/21xxx/CVE-2021-21325.json +++ b/2021/21xxx/CVE-2021-21325.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21325", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Stored XSS in budget type" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-m574-f3jw-pwrf", + "discovery": "UNKNOWN" } } \ No newline at end of file From 68d356a0fd31c5c29b05a64d06dbd6c7c4ffeb6f Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 09:57:51 -0700 Subject: [PATCH 166/845] Add CVE-2021-21326 for GHSA-vmj9-cg56-p7wh --- 2021/21xxx/CVE-2021-21326.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21326.json b/2021/21xxx/CVE-2021-21326.json index fe0ba8a0e91..3c4d650201b 100644 --- a/2021/21xxx/CVE-2021-21326.json +++ b/2021/21xxx/CVE-2021-21326.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21326", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Horizontal Privilege Escalation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 it is possible to create tickets for another user with self-service interface without delegatee systems enabled. This is fixed in version 9.5.4." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-vmj9-cg56-p7wh", + "discovery": "UNKNOWN" } } \ No newline at end of file From a2c085c42ec486e49e011ab36fdaee2e9f3fd911 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 09:58:54 -0700 Subject: [PATCH 167/845] Add CVE-2021-21327 for GHSA-qmw7-w2m4-rjwp --- 2021/21xxx/CVE-2021-21327.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21327.json b/2021/21xxx/CVE-2021-21327.json index 3a8d557f355..6ec45951a13 100644 --- a/2021/21xxx/CVE-2021-21327.json +++ b/2021/21xxx/CVE-2021-21327.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21327", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Unsafe Reflection in getItemForItemtype()" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "glpi", + "version": { + "version_data": [ + { + "version_value": "< 9.5.4" + } + ] + } + } + ] + }, + "vendor_name": "glpi-project" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp" + }, + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + } + ] + }, + "source": { + "advisory": "GHSA-qmw7-w2m4-rjwp", + "discovery": "UNKNOWN" } } \ No newline at end of file From ed1fec4160b3cd600279c4bb5fe96f89b4391b3f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 17:00:41 +0000 Subject: [PATCH 168/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 25 +++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28089.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28090.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28091.json | 18 ++++++++++++++++++ 4 files changed, 79 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28089.json create mode 100644 2021/28xxx/CVE-2021-28090.json create mode 100644 2021/28xxx/CVE-2021-28091.json diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index db76f6ceb67..10f61800450 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -189,6 +189,31 @@ "refsource": "MLIST", "name": "[zookeeper-dev] 20210307 [jira] [Created] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-commits] 20210308 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-commits] 20210308 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on a change in pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2021/28xxx/CVE-2021-28089.json b/2021/28xxx/CVE-2021-28089.json new file mode 100644 index 00000000000..a1a1f52c57f --- /dev/null +++ b/2021/28xxx/CVE-2021-28089.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28089", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28090.json b/2021/28xxx/CVE-2021-28090.json new file mode 100644 index 00000000000..148e817c3ee --- /dev/null +++ b/2021/28xxx/CVE-2021-28090.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28090", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28091.json b/2021/28xxx/CVE-2021-28091.json new file mode 100644 index 00000000000..b2cf8b026f8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 50d700adcdc25b7a712c77343ec3940b895b0e7b Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 10:10:12 -0700 Subject: [PATCH 169/845] Add CVE-2021-21329 for GHSA-fw57-f7mq-9q85 --- 2021/21xxx/CVE-2021-21329.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21329.json b/2021/21xxx/CVE-2021-21329.json index 64fb74b74b4..243031aa15b 100644 --- a/2021/21xxx/CVE-2021-21329.json +++ b/2021/21xxx/CVE-2021-21329.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21329", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Multi Factor Authentication Token Improperly Validated On User Login" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "core", + "version": { + "version_data": [ + { + "version_value": ">c57a4d186bfc586ad3edfe4dcba9f11efbf22f09, < cebb67bd16a8296121201805332365ffccb29638" + } + ] + } + } + ] + }, + "vendor_name": "ractf" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RATCF is an open-source framework for hosting Cyber-Security Capture the Flag events. In affected versions of RATCF users with multi factor authentication enabled are able to log in without a valid token. This is fixed in commit cebb67b." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/ractf/core/security/advisories/GHSA-fw57-f7mq-9q85", + "refsource": "CONFIRM", + "url": "https://github.com/ractf/core/security/advisories/GHSA-fw57-f7mq-9q85" + }, + { + "name": "https://github.com/ractf/core/commit/c57a4d186bfc586ad3edfe4dcba9f11efbf22f09#diff-60c444c47c061306f2dff5bf97c07810f40f949a8e94ecbb609b6b29364c8642R130-R152", + "refsource": "MISC", + "url": "https://github.com/ractf/core/commit/c57a4d186bfc586ad3edfe4dcba9f11efbf22f09#diff-60c444c47c061306f2dff5bf97c07810f40f949a8e94ecbb609b6b29364c8642R130-R152" + }, + { + "name": "https://github.com/ractf/core/commit/cebb67bd16a8296121201805332365ffccb29638", + "refsource": "MISC", + "url": "https://github.com/ractf/core/commit/cebb67bd16a8296121201805332365ffccb29638" + } + ] + }, + "source": { + "advisory": "GHSA-fw57-f7mq-9q85", + "discovery": "UNKNOWN" } } \ No newline at end of file From 54aa20dcb635a6484ac16e55ba9f2e91133e61a8 Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Mon, 8 Mar 2021 12:54:17 -0500 Subject: [PATCH 170/845] IBM20210308-125417 Added CVE-2020-4695, CVE-2020-4903, CVE-2020-5014 --- 2020/4xxx/CVE-2020-4695.json | 105 ++++++++++++++++++++++++++++----- 2020/4xxx/CVE-2020-4903.json | 111 ++++++++++++++++++++++++++++++----- 2020/5xxx/CVE-2020-5014.json | 111 ++++++++++++++++++++++++++++++----- 3 files changed, 282 insertions(+), 45 deletions(-) diff --git a/2020/4xxx/CVE-2020-4695.json b/2020/4xxx/CVE-2020-4695.json index 3377f43007f..1d650900a15 100644 --- a/2020/4xxx/CVE-2020-4695.json +++ b/2020/4xxx/CVE-2020-4695.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4695", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Obtain Information", + "lang" : "eng" + } + ] + } + ] + }, + "data_version" : "4.0", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "10.0.0.0" + }, + { + "version_value" : "10.0.1.0" + } + ] + }, + "product_name" : "API Connect" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "value" : "IBM API Connect V10 is impacted by insecure communications during database replication. As the data replication happens over insecure communication channels, an attacker can view unencrypted data leading to a loss of confidentiality.", + "lang" : "eng" + } + ] + }, + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "DATE_PUBLIC" : "2021-03-06T00:00:00", + "ID" : "CVE-2020-4695" + }, + "impact" : { + "cvssv3" : { + "BM" : { + "AC" : "H", + "UI" : "N", + "PR" : "N", + "I" : "N", + "AV" : "N", + "S" : "U", + "A" : "N", + "C" : "H", + "SCORE" : "5.900" + }, + "TM" : { + "RL" : "O", + "RC" : "C", + "E" : "U" + } + } + }, + "references" : { + "reference_data" : [ + { + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6426707 (API Connect)", + "name" : "https://www.ibm.com/support/pages/node/6426707", + "url" : "https://www.ibm.com/support/pages/node/6426707" + }, + { + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/186788", + "name" : "ibm-api-cve20204695-info-disc (186788)" + } + ] + }, + "data_type" : "CVE", + "data_format" : "MITRE" +} diff --git a/2020/4xxx/CVE-2020-4903.json b/2020/4xxx/CVE-2020-4903.json index feb1ba46dc9..b9974ea9a23 100644 --- a/2020/4xxx/CVE-2020-4903.json +++ b/2020/4xxx/CVE-2020-4903.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4903", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6426703 (API Connect)", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6426703", + "name" : "https://www.ibm.com/support/pages/node/6426703" + }, + { + "refsource" : "XF", + "title" : "X-Force Vulnerability Report", + "name" : "ibm-api-cve20204903-info-disc (191105)", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/191105" + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "AV" : "N", + "S" : "U", + "SCORE" : "4.800", + "C" : "L", + "A" : "N", + "AC" : "H", + "UI" : "N", + "PR" : "N", + "I" : "L" + }, + "TM" : { + "RL" : "O", + "E" : "U", + "RC" : "C" + } + } + }, + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-03-06T00:00:00", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2020-4903" + }, + "description" : { + "description_data" : [ + { + "value" : "IBM API Connect V10 and V2018 could allow an attacker who has intercepted a registration invitation link to impersonate the registered user or obtain sensitive information. IBM X-Force ID: 191105.", + "lang" : "eng" + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "2018.4.1.0" + }, + { + "version_value" : "2018.4.1.13" + }, + { + "version_value" : "10.0.0.0" + }, + { + "version_value" : "10.0.1.1" + } + ] + }, + "product_name" : "API Connect" + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + } +} diff --git a/2020/5xxx/CVE-2020-5014.json b/2020/5xxx/CVE-2020-5014.json index 71e6a4766d0..2872f343bf3 100644 --- a/2020/5xxx/CVE-2020-5014.json +++ b/2020/5xxx/CVE-2020-5014.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-5014", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_type" : "CVE", + "references" : { + "reference_data" : [ + { + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6426789 (DataPower Gateway)", + "name" : "https://www.ibm.com/support/pages/node/6426789", + "url" : "https://www.ibm.com/support/pages/node/6426789" + }, + { + "name" : "ibm-datapower-cve20205014-ssrf (193247)", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193247", + "refsource" : "XF", + "title" : "X-Force Vulnerability Report" + } + ] + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RC" : "C", + "E" : "U", + "RL" : "O" + }, + "BM" : { + "C" : "H", + "SCORE" : "6.700", + "A" : "H", + "AV" : "L", + "S" : "U", + "I" : "H", + "AC" : "L", + "UI" : "N", + "PR" : "H" + } + } + }, + "data_format" : "MITRE", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM DataPower Gateway V10 and V2018 could allow a local attacker with administrative privileges to execute arbitrary code on the system using a server-side requesr forgery attack. IBM X-Force ID: 193247." + } + ] + }, + "CVE_data_meta" : { + "ID" : "CVE-2020-5014", + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "DATE_PUBLIC" : "2021-03-07T00:00:00" + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Gain Access" + } + ] + } + ] + }, + "data_version" : "4.0", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "DataPower Gateway", + "version" : { + "version_data" : [ + { + "version_value" : "2018.4.1.0" + }, + { + "version_value" : "10.0.0.0" + }, + { + "version_value" : "10.0.1.1" + }, + { + "version_value" : "2018.4.1.14" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + } +} From 39d4d4608f4a8346c71f682e349b9ec4e93ec2f8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 18:00:39 +0000 Subject: [PATCH 171/845] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11987.json | 5 +++++ 2020/11xxx/CVE-2020-11988.json | 5 +++++ 2021/21xxx/CVE-2021-21324.json | 12 ++++++------ 2021/21xxx/CVE-2021-21325.json | 12 ++++++------ 2021/21xxx/CVE-2021-21326.json | 10 +++++----- 2021/21xxx/CVE-2021-21327.json | 11 ++++++++--- 2021/21xxx/CVE-2021-21972.json | 5 +++++ 7 files changed, 40 insertions(+), 20 deletions(-) diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json index 689eebf60e0..9e66f9b4ae3 100644 --- a/2020/11xxx/CVE-2020-11987.json +++ b/2020/11xxx/CVE-2020-11987.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[poi-dev] 20210304 [Bug 65166] New: Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", "url": "https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[poi-dev] 20210308 [Bug 65166] Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", + "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E" } ] }, diff --git a/2020/11xxx/CVE-2020-11988.json b/2020/11xxx/CVE-2020-11988.json index c1c3d09e718..5aa050e3dd8 100644 --- a/2020/11xxx/CVE-2020-11988.json +++ b/2020/11xxx/CVE-2020-11988.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[jmeter-dev] 20210305 [GitHub] [jmeter] sseide opened a new pull request #648: update xmlgraphics-commons to 2.6 (from 2.3)", "url": "https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[poi-dev] 20210308 [Bug 65166] Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", + "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21324.json b/2021/21xxx/CVE-2021-21324.json index 7cd2d36f1d1..a3696531513 100644 --- a/2021/21xxx/CVE-2021-21324.json +++ b/2021/21xxx/CVE-2021-21324.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts.\n\n" + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts." } ] }, @@ -69,11 +69,6 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" - }, { "name": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc", "refsource": "MISC", @@ -83,6 +78,11 @@ "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" } ] }, diff --git a/2021/21xxx/CVE-2021-21325.json b/2021/21xxx/CVE-2021-21325.json index 93e0e5e2ce8..b115eee310b 100644 --- a/2021/21xxx/CVE-2021-21325.json +++ b/2021/21xxx/CVE-2021-21325.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." } ] }, @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" - }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" } ] }, diff --git a/2021/21xxx/CVE-2021-21326.json b/2021/21xxx/CVE-2021-21326.json index 3c4d650201b..98de70ac239 100644 --- a/2021/21xxx/CVE-2021-21326.json +++ b/2021/21xxx/CVE-2021-21326.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" - }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" } ] }, diff --git a/2021/21xxx/CVE-2021-21327.json b/2021/21xxx/CVE-2021-21327.json index 6ec45951a13..22c7eee7905 100644 --- a/2021/21xxx/CVE-2021-21327.json +++ b/2021/21xxx/CVE-2021-21327.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a \u201cPOP chain\u201d. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." } ] }, @@ -69,15 +69,20 @@ }, "references": { "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp" }, { - "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", - "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + "name": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html", + "url": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21972.json b/2021/21xxx/CVE-2021-21972.json index 53bbc99cc5b..ac332f8e888 100644 --- a/2021/21xxx/CVE-2021-21972.json +++ b/2021/21xxx/CVE-2021-21972.json @@ -72,6 +72,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html", "url": "http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html" } ] }, From a5973bd8efe2abb6dfa744164e76b0aee2c75059 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 11:37:27 -0700 Subject: [PATCH 172/845] Add CVE-2021-21362 for GHSA-hq5j-6r98-9m8v --- 2021/21xxx/CVE-2021-21362.json | 92 +++++++++++++++++++++++++++++++--- 1 file changed, 86 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21362.json b/2021/21xxx/CVE-2021-21362.json index 7d2c8e943cf..303ed59cb9f 100644 --- a/2021/21xxx/CVE-2021-21362.json +++ b/2021/21xxx/CVE-2021-21362.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21362", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Bypassing readOnly policy by creating a temporary 'mc share upload' URL" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "minio", + "version": { + "version_data": [ + { + "version_value": "< RELEASE.2021-03-04T00-53-13Z" + } + ] + } + } + ] + }, + "vendor_name": "minio" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone is impacted who uses MinIO multi-users. This is fixed in version RELEASE.2021-03-04T00-53-13Z. As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/minio/minio/security/advisories/GHSA-hq5j-6r98-9m8v", + "refsource": "CONFIRM", + "url": "https://github.com/minio/minio/security/advisories/GHSA-hq5j-6r98-9m8v" + }, + { + "name": "https://github.com/minio/minio/pull/11682", + "refsource": "MISC", + "url": "https://github.com/minio/minio/pull/11682" + }, + { + "name": "https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482", + "refsource": "MISC", + "url": "https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482" + }, + { + "name": "https://github.com/minio/minio/releases/tag/RELEASE.2021-03-04T00-53-13Z", + "refsource": "MISC", + "url": "https://github.com/minio/minio/releases/tag/RELEASE.2021-03-04T00-53-13Z" + } + ] + }, + "source": { + "advisory": "GHSA-hq5j-6r98-9m8v", + "discovery": "UNKNOWN" } } \ No newline at end of file From abf07f3ecd683fc2c77ef800a01a116d6a988a33 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 12:00:13 -0700 Subject: [PATCH 173/845] Add CVE-2021-21354 for GHSA-jhgx-wmq8-jc24 --- 2021/21xxx/CVE-2021-21354.json | 102 +++++++++++++++++++++++++++++++-- 1 file changed, 96 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21354.json b/2021/21xxx/CVE-2021-21354.json index d7d07e431ce..1ffda37195d 100644 --- a/2021/21xxx/CVE-2021-21354.json +++ b/2021/21xxx/CVE-2021-21354.json @@ -1,18 +1,108 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21354", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Open redirect in pollbot" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PollBot", + "version": { + "version_data": [ + { + "version_value": "< 1.4.4" + } + ] + } + } + ] + }, + "vendor_name": "mozilla" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Pollbot is open source software which \"frees its human masters from the toilsome task of polling for the state of things during the Firefox release process.\" In Pollbot before version 1.4.4 there is an open redirection vulnerability in the path of \"https://pollbot.services.mozilla.com/\". An attacker can redirect anyone to malicious sites. To Reproduce type in this URL: \"https://pollbot.services.mozilla.com//evil.com/\". Affected versions will redirect to that website when you inject a payload like \"//evil.com/\". This is fixed in version 1.4.4." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "{\"CWE-601\":\"URL Redirection to Untrusted Site ('Open Redirect')\"}" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/mozilla/PollBot/security/advisories/GHSA-jhgx-wmq8-jc24", + "refsource": "CONFIRM", + "url": "https://github.com/mozilla/PollBot/security/advisories/GHSA-jhgx-wmq8-jc24" + }, + { + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1694684", + "refsource": "MISC", + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1694684" + }, + { + "name": "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html", + "refsource": "MISC", + "url": "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html" + }, + { + "name": "https://github.com/mozilla/PollBot/releases/tag/v1.4.4", + "refsource": "MISC", + "url": "https://github.com/mozilla/PollBot/releases/tag/v1.4.4" + }, + { + "name": "https://github.com/mozilla/PollBot/pull/333", + "refsource": "MISC", + "url": "https://github.com/mozilla/PollBot/pull/333" + }, + { + "name": "https://github.com/mozilla/PollBot/commit/6db74a4fcbff258c7cdf51a6ff0724fc10c485e5", + "refsource": "MISC", + "url": "https://github.com/mozilla/PollBot/commit/6db74a4fcbff258c7cdf51a6ff0724fc10c485e5" + } + ] + }, + "source": { + "advisory": "GHSA-jhgx-wmq8-jc24", + "discovery": "UNKNOWN" } } \ No newline at end of file From c7dc3c1c2d5617496fdcff549808c823bb0c2e05 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 19:00:52 +0000 Subject: [PATCH 174/845] "-Synchronized-Data." --- 2020/4xxx/CVE-2020-4903.json | 190 +++++++++++++++++----------------- 2020/5xxx/CVE-2020-5014.json | 192 +++++++++++++++++------------------ 2 files changed, 191 insertions(+), 191 deletions(-) diff --git a/2020/4xxx/CVE-2020-4903.json b/2020/4xxx/CVE-2020-4903.json index b9974ea9a23..db8fc12f0a8 100644 --- a/2020/4xxx/CVE-2020-4903.json +++ b/2020/4xxx/CVE-2020-4903.json @@ -1,99 +1,99 @@ { - "data_format" : "MITRE", - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6426703 (API Connect)", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6426703", - "name" : "https://www.ibm.com/support/pages/node/6426703" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-api-cve20204903-info-disc (191105)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/191105" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "AV" : "N", - "S" : "U", - "SCORE" : "4.800", - "C" : "L", - "A" : "N", - "AC" : "H", - "UI" : "N", - "PR" : "N", - "I" : "L" - }, - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - } - } - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-03-06T00:00:00", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4903" - }, - "description" : { - "description_data" : [ - { - "value" : "IBM API Connect V10 and V2018 could allow an attacker who has intercepted a registration invitation link to impersonate the registered user or obtain sensitive information. IBM X-Force ID: 191105.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "data_type": "CVE", + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "2018.4.1.0" - }, - { - "version_value" : "2018.4.1.13" - }, - { - "version_value" : "10.0.0.0" - }, - { - "version_value" : "10.0.1.1" - } - ] - }, - "product_name" : "API Connect" - } - ] - } + "title": "IBM Security Bulletin 6426703 (API Connect)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6426703", + "name": "https://www.ibm.com/support/pages/node/6426703" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-api-cve20204903-info-disc (191105)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191105" } - ] - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "S": "U", + "SCORE": "4.800", + "C": "L", + "A": "N", + "AC": "H", + "UI": "N", + "PR": "N", + "I": "L" + }, + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + } + } + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-03-06T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4903" + }, + "description": { + "description_data": [ + { + "value": "IBM API Connect V10 and V2018 could allow an attacker who has intercepted a registration invitation link to impersonate the registered user or obtain sensitive information. IBM X-Force ID: 191105.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2018.4.1.0" + }, + { + "version_value": "2018.4.1.13" + }, + { + "version_value": "10.0.0.0" + }, + { + "version_value": "10.0.1.1" + } + ] + }, + "product_name": "API Connect" + } + ] + } + } ] - } - ] - } -} + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5014.json b/2020/5xxx/CVE-2020-5014.json index 2872f343bf3..92b19594514 100644 --- a/2020/5xxx/CVE-2020-5014.json +++ b/2020/5xxx/CVE-2020-5014.json @@ -1,99 +1,99 @@ { - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6426789 (DataPower Gateway)", - "name" : "https://www.ibm.com/support/pages/node/6426789", - "url" : "https://www.ibm.com/support/pages/node/6426789" - }, - { - "name" : "ibm-datapower-cve20205014-ssrf (193247)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193247", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "C" : "H", - "SCORE" : "6.700", - "A" : "H", - "AV" : "L", - "S" : "U", - "I" : "H", - "AC" : "L", - "UI" : "N", - "PR" : "H" - } - } - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM DataPower Gateway V10 and V2018 could allow a local attacker with administrative privileges to execute arbitrary code on the system using a server-side requesr forgery attack. IBM X-Force ID: 193247." - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-5014", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2021-03-07T00:00:00" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Gain Access" - } - ] - } - ] - }, - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_type": "CVE", + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "DataPower Gateway", - "version" : { - "version_data" : [ - { - "version_value" : "2018.4.1.0" - }, - { - "version_value" : "10.0.0.0" - }, - { - "version_value" : "10.0.1.1" - }, - { - "version_value" : "2018.4.1.14" - } - ] - } - } - ] - } + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6426789 (DataPower Gateway)", + "name": "https://www.ibm.com/support/pages/node/6426789", + "url": "https://www.ibm.com/support/pages/node/6426789" + }, + { + "name": "ibm-datapower-cve20205014-ssrf (193247)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193247", + "refsource": "XF", + "title": "X-Force Vulnerability Report" } - ] - } - } -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "C": "H", + "SCORE": "6.700", + "A": "H", + "AV": "L", + "S": "U", + "I": "H", + "AC": "L", + "UI": "N", + "PR": "H" + } + } + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM DataPower Gateway V10 and V2018 could allow a local attacker with administrative privileges to execute arbitrary code on the system using a server-side requesr forgery attack. IBM X-Force ID: 193247." + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2020-5014", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-03-07T00:00:00" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Gain Access" + } + ] + } + ] + }, + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "DataPower Gateway", + "version": { + "version_data": [ + { + "version_value": "2018.4.1.0" + }, + { + "version_value": "10.0.0.0" + }, + { + "version_value": "10.0.1.1" + }, + { + "version_value": "2018.4.1.14" + } + ] + } + } + ] + } + } + ] + } + } +} \ No newline at end of file From 262a4b6f0d095442d6ccc42cc3dcc146b1415d2f Mon Sep 17 00:00:00 2001 From: DellEMCProductSecurity Date: Mon, 8 Mar 2021 14:30:19 -0500 Subject: [PATCH 175/845] Added 5 CVEs --- 2020/26xxx/CVE-2020-26196.json | 43 ++++++++++---------- 2021/21xxx/CVE-2021-21502.json | 43 ++++++++++---------- 2021/21xxx/CVE-2021-21503.json | 71 +++++++++++++++++++++++++++++----- 2021/21xxx/CVE-2021-21506.json | 71 +++++++++++++++++++++++++++++----- 2021/21xxx/CVE-2021-21510.json | 71 +++++++++++++++++++++++++++++----- 5 files changed, 228 insertions(+), 71 deletions(-) diff --git a/2020/26xxx/CVE-2020-26196.json b/2020/26xxx/CVE-2020-26196.json index fdacde337a5..51ba2c506e8 100644 --- a/2020/26xxx/CVE-2020-26196.json +++ b/2020/26xxx/CVE-2020-26196.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-08", - "ID": "CVE-2020-26196", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-08", + "ID": "CVE-2020-26196", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,60 +12,59 @@ "product": { "product_data": [ { - "product_name": "PowerScale OneFS", + "product_name": "PowerScale OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.1.2, 8.2.1, 8.2.2, 9.0.0" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell EMC PowerScale OneFS versions 8.1.0-9.1.0 contain a Backup/Restore Privilege implementation issue. A user with the BackupAdmin role may potentially exploit this vulnerability resulting in the ability to write data outside of the intended file system location." } ] - }, + }, "impact": { "cvss": { - "baseScore": 5.5, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "MISC", - "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities", - "name": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2021/21xxx/CVE-2021-21502.json b/2021/21xxx/CVE-2021-21502.json index c060a5840b2..d75a8b1ffa0 100644 --- a/2021/21xxx/CVE-2021-21502.json +++ b/2021/21xxx/CVE-2021-21502.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-08", - "ID": "CVE-2021-21502", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-08", + "ID": "CVE-2021-21502", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,60 +12,59 @@ "product": { "product_data": [ { - "product_name": "PowerScale OneFS", + "product_name": "PowerScale OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.1.2 / 8.2.2 / 9.1.0.x / Empire / Main" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell PowerScale OneFS versions 8.1.0 \u2013 9.1.0 contain a \"use of SSH key past account expiration\" vulnerability. A user on the network with the ISI_PRIV_AUTH_SSH RBAC privilege that has an expired account may potentially exploit this vulnerability, giving them access to the same things they had before account expiration. This may by a high privileged account and hence Dell recommends customers upgrade at the earliest opportunity." } ] - }, + }, "impact": { "cvss": { - "baseScore": 9.8, - "baseSeverity": "Critical", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "Other" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "MISC", - "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities", - "name": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2021/21xxx/CVE-2021-21503.json b/2021/21xxx/CVE-2021-21503.json index 411a3bffb89..31fbb69e049 100644 --- a/2021/21xxx/CVE-2021-21503.json +++ b/2021/21xxx/CVE-2021-21503.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21503", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-26", + "ID": "CVE-2021-21503", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PowerScale OneFS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.1.2, 8.2.2,9.1.0.x,EMPIRE (9.2.0), GOTHAM" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/000183717" } ] } diff --git a/2021/21xxx/CVE-2021-21506.json b/2021/21xxx/CVE-2021-21506.json index d0b337d3534..acc2e988cf9 100644 --- a/2021/21xxx/CVE-2021-21506.json +++ b/2021/21xxx/CVE-2021-21506.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21506", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-26", + "ID": "CVE-2021-21506", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PowerScale OneFS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.1.2, 8.2.2,9.1.0.x,EMPIRE (9.2.0), GOTHAM" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in its API handler. An un-authtenticated with ISI_PRIV_SYS_SUPPORT and ISI_PRIV_LOGIN_PAPI privileges could potentially exploit this vulnerability, leading to potential privileges escalation." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Other" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/000183717" } ] } diff --git a/2021/21xxx/CVE-2021-21510.json b/2021/21xxx/CVE-2021-21510.json index 8b96b9d2d42..87b0199d99b 100644 --- a/2021/21xxx/CVE-2021-21510.json +++ b/2021/21xxx/CVE-2021-21510.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21510", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-04", + "ID": "CVE-2021-21510", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Integrated Dell Remote Access Controller (iDRAC)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2.75.100.75" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a web-cache or trigger redirections. \t" + } + ] + }, + "impact": { + "cvss": { + "baseScore": 6.1, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability" } ] } From 50bffcc5d5cf7fb628b3fe80c9283e155f016b91 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 20:00:45 +0000 Subject: [PATCH 176/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29134.json | 2 +- 2021/28xxx/CVE-2021-28092.json | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+), 1 deletion(-) create mode 100644 2021/28xxx/CVE-2021-28092.json diff --git a/2020/29xxx/CVE-2020-29134.json b/2020/29xxx/CVE-2020-29134.json index 0c3daefaad1..cd4a8393ea2 100644 --- a/2020/29xxx/CVE-2020-29134.json +++ b/2020/29xxx/CVE-2020-29134.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "TOTVS Fluig Luke 1.7.0 allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201124 and Fluig Lake 1.7.0-200915." + "value": "TOTVS Fluig Luke 1.7.0 allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210209, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201222, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201201,Fluig Lake 1.7.0-201124, Fluig Lake 1.7.0-201117, Fluig Lake 1.7.0-201103, Fluig Lake 1.7.0-201027, Fluig Lake 1.7.0-201020, Fluig Lake 1.7.0-201013, Fluig Lake 1.7.0-201006, Fluig Lake 1.7.0-200915, Fluig Lake 1.7.0-200907, Fluig Lake 1.7.0-200901, Fluig Lake 1.7.0-200825, Fluig Lake 1.7.0-200818, Fluig Lake 1.7.0-200804, Fluig Lake 1.7.0-200616), Fluig 1.6.5-200915, Fluig 1.6.5-200128, Fluig 1.6.5-191029, and Fluig 1.6.4-181026." } ] }, diff --git a/2021/28xxx/CVE-2021-28092.json b/2021/28xxx/CVE-2021-28092.json new file mode 100644 index 00000000000..3ab5f8f82a5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28092.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28092", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 2b24c7fe63c5a8cc3e07d0c29e42614dea2bb3c5 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 13:16:00 -0700 Subject: [PATCH 177/845] Add CVE-2021-21335 for GHSA-ww8q-72rx-hc54 --- 2021/21xxx/CVE-2021-21335.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21335.json b/2021/21xxx/CVE-2021-21335.json index 6695258d5a5..10276784425 100644 --- a/2021/21xxx/CVE-2021-21335.json +++ b/2021/21xxx/CVE-2021-21335.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21335", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Basic Authentication can be bypassed using a malformed username" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "spnego-http-auth-nginx-module", + "version": { + "version_data": [ + { + "version_value": "< 1.1.1" + } + ] + } + } + ] + }, + "vendor_name": "stnoonan" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54", + "refsource": "CONFIRM", + "url": "https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54" + }, + { + "name": "https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570", + "refsource": "MISC", + "url": "https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570" + }, + { + "name": "https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1", + "refsource": "MISC", + "url": "https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1" + } + ] + }, + "source": { + "advisory": "GHSA-ww8q-72rx-hc54", + "discovery": "UNKNOWN" } } \ No newline at end of file From 40f14e2ea225456faa7f0304b104c3feec27a953 Mon Sep 17 00:00:00 2001 From: DellEMCProductSecurity Date: Mon, 8 Mar 2021 15:27:06 -0500 Subject: [PATCH 178/845] Updated URL in CVE-2021-21510 --- 2021/21xxx/CVE-2021-21510.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/21xxx/CVE-2021-21510.json b/2021/21xxx/CVE-2021-21510.json index 87b0199d99b..96fd02790ce 100644 --- a/2021/21xxx/CVE-2021-21510.json +++ b/2021/21xxx/CVE-2021-21510.json @@ -64,7 +64,7 @@ "reference_data": [ { "refsource": "CONFIRM", - "url": "dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability" + "url": "https://www.dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability" } ] } From 1c8bec9fd32ce448d2d733babd337cc02b30a705 Mon Sep 17 00:00:00 2001 From: Josh Bressers Date: Mon, 8 Mar 2021 14:32:51 -0600 Subject: [PATCH 179/845] Add CVE-2021-22134 --- 2021/22xxx/CVE-2021-22134.json | 60 +++++++++++++++++++++++++++++----- 1 file changed, 51 insertions(+), 9 deletions(-) diff --git a/2021/22xxx/CVE-2021-22134.json b/2021/22xxx/CVE-2021-22134.json index 089795e7bd3..c14d458b1aa 100644 --- a/2021/22xxx/CVE-2021-22134.json +++ b/2021/22xxx/CVE-2021-22134.json @@ -3,16 +3,58 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "bressers@elastic.co", "ID": "CVE-2021-22134", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Elastic", + "product": { + "product_data": [ + { + "product_name": "Elasticsearch", + "version": { + "version_data": [ + { + "version_value": "after 7.6.0 and before 7.11.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835" + } + ] }, "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "description_data": [ + { + "lang": "eng", + "value": "A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view." + } + ] } -} \ No newline at end of file +} From c1f51a4d318cc45cc5f0885c1abd81c6ca0145fc Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 13:37:34 -0700 Subject: [PATCH 180/845] Add CVE-2021-21336 for GHSA-p75f-g7gx-2r7p --- 2021/21xxx/CVE-2021-21336.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21336.json b/2021/21xxx/CVE-2021-21336.json index c3527dc1964..4b2605c3e3a 100644 --- a/2021/21xxx/CVE-2021-21336.json +++ b/2021/21xxx/CVE-2021-21336.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21336", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in Products.PluggableAuthService ZODBRoleManager" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Products.PluggableAuthService", + "version": { + "version_data": [ + { + "version_value": "< 2.6.0" + } + ] + } + } + ] + }, + "vendor_name": "zopefoundation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin. The problem has been fixed in version 2.6.0. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to 2.6.0 and re-run the buildout, or if you used pip simply do `pip install \"Products.PluggableAuthService>=2.6.0\"`." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p", + "refsource": "CONFIRM", + "url": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p" + }, + { + "name": "https://pypi.org/project/Products.PluggableAuthService/", + "refsource": "MISC", + "url": "https://pypi.org/project/Products.PluggableAuthService/" + }, + { + "name": "https://github.com/zopefoundation/Products.PluggableAuthService/commit/2dad81128250cb2e5d950cddc9d3c0314a80b4bb", + "refsource": "MISC", + "url": "https://github.com/zopefoundation/Products.PluggableAuthService/commit/2dad81128250cb2e5d950cddc9d3c0314a80b4bb" + } + ] + }, + "source": { + "advisory": "GHSA-p75f-g7gx-2r7p", + "discovery": "UNKNOWN" } } \ No newline at end of file From 1e69539bc0df657654e4d6c1922f58059903d3fa Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 21:00:44 +0000 Subject: [PATCH 181/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27574.json | 61 ++++++++++++++++++++++--- 2020/29xxx/CVE-2020-29134.json | 5 +++ 2020/35xxx/CVE-2020-35512.json | 41 +++++++++++++++-- 2021/21xxx/CVE-2021-21335.json | 2 +- 2021/22xxx/CVE-2021-22134.json | 82 +++++++++++++++++----------------- 2021/27xxx/CVE-2021-27581.json | 5 +++ 2021/28xxx/CVE-2021-28093.json | 18 ++++++++ 2021/28xxx/CVE-2021-28094.json | 18 ++++++++ 2021/28xxx/CVE-2021-28095.json | 18 ++++++++ 2021/28xxx/CVE-2021-28096.json | 18 ++++++++ 10 files changed, 218 insertions(+), 50 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28093.json create mode 100644 2021/28xxx/CVE-2021-28094.json create mode 100644 2021/28xxx/CVE-2021-28095.json create mode 100644 2021/28xxx/CVE-2021-28096.json diff --git a/2020/27xxx/CVE-2020-27574.json b/2020/27xxx/CVE-2020-27574.json index 35a16fd505a..a587897d049 100644 --- a/2020/27xxx/CVE-2020-27574.json +++ b/2020/27xxx/CVE-2020-27574.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27574", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27574", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site request forgery (CSRF). If an authenticated user visits a malicious page, unintended actions could be performed in the web application as the authenticated user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://maxum.com", + "refsource": "MISC", + "name": "http://maxum.com" + }, + { + "refsource": "MISC", + "name": "https://tvrbk.github.io/cve/2021/03/07/rumpus.html", + "url": "https://tvrbk.github.io/cve/2021/03/07/rumpus.html" } ] } diff --git a/2020/29xxx/CVE-2020-29134.json b/2020/29xxx/CVE-2020-29134.json index cd4a8393ea2..01b2fbb3df1 100644 --- a/2020/29xxx/CVE-2020-29134.json +++ b/2020/29xxx/CVE-2020-29134.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/49622", "url": "https://www.exploit-db.com/exploits/49622" + }, + { + "refsource": "MISC", + "name": "https://github.com/lucxssouza/CVE-2020-29134/blob/main/README.md", + "url": "https://github.com/lucxssouza/CVE-2020-29134/blob/main/README.md" } ] } diff --git a/2020/35xxx/CVE-2020-35512.json b/2020/35xxx/CVE-2020-35512.json index 57cc6c13d5d..2b17bc3186f 100644 --- a/2020/35xxx/CVE-2020-35512.json +++ b/2020/35xxx/CVE-2020-35512.json @@ -15,11 +15,31 @@ "product": { "product_data": [ { - "product_name": "dbus", + "product_name": "D-Bus Development branch", "version": { "version_data": [ { - "version_value": "dbus 1.10.32, dbus 1.12.20, dbus 1.13.18" + "version_value": "<= 1.13.16 (Fixed: >= 1.13.18)" + } + ] + } + }, + { + "product_name": "dbus-1.12.x stable branch", + "version": { + "version_data": [ + { + "version_value": "<= 1.12.18 (Fixed: >= 1.12.20)" + } + ] + } + }, + { + "product_name": "dbus-1.10.x and older branches (EOL)", + "version": { + "version_data": [ + { + "version_value": "<= 1.10.30 (Fixed: 1.10.32)" } ] } @@ -48,6 +68,21 @@ "refsource": "MISC", "name": "https://bugs.gentoo.org/755392", "url": "https://bugs.gentoo.org/755392" + }, + { + "refsource": "MISC", + "name": "https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128", + "url": "https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1909101", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909101" + }, + { + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2020-35512", + "url": "https://security-tracker.debian.org/tracker/CVE-2020-35512" } ] }, @@ -55,7 +90,7 @@ "description_data": [ { "lang": "eng", - "value": "A use-after-free flaw was found in D-Bus 1.12.20 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors" + "value": "A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors" } ] } diff --git a/2021/21xxx/CVE-2021-21335.json b/2021/21xxx/CVE-2021-21335.json index 10276784425..a7b330b3571 100644 --- a/2021/21xxx/CVE-2021-21335.json +++ b/2021/21xxx/CVE-2021-21335.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication." + "value": "In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication." } ] }, diff --git a/2021/22xxx/CVE-2021-22134.json b/2021/22xxx/CVE-2021-22134.json index c14d458b1aa..ecf6e45291d 100644 --- a/2021/22xxx/CVE-2021-22134.json +++ b/2021/22xxx/CVE-2021-22134.json @@ -3,58 +3,60 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "bressers@elastic.co", + "ASSIGNER": "security@elastic.co", "ID": "CVE-2021-22134", "STATE": "PUBLIC" }, "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Elastic", - "product": { - "product_data": [ + "vendor": { + "vendor_data": [ { - "product_name": "Elasticsearch", - "version": { - "version_data": [ - { - "version_value": "after 7.6.0 and before 7.11.0" - } - ] - } + "vendor_name": "Elastic", + "product": { + "product_data": [ + { + "product_name": "Elasticsearch", + "version": { + "version_data": [ + { + "version_value": "after 7.6.0 and before 7.11.0" + } + ] + } + } + ] + } } - ] - } - } - ] - } + ] + } }, "problemtype": { - "problemtype_data": [ - { - "description": [ + "problemtype_data": [ { - "lang": "eng", - "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] } - ] - } - ] + ] }, "references": { - "reference_data": [ - { - "url": "https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835" - } - ] + "reference_data": [ + { + "url": "https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835", + "refsource": "MISC", + "name": "https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835" + } + ] }, "description": { - "description_data": [ - { - "lang": "eng", - "value": "A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view." - } - ] + "description_data": [ + { + "lang": "eng", + "value": "A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view." + } + ] } -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27581.json b/2021/27xxx/CVE-2021-27581.json index 21829e36973..383709313bf 100644 --- a/2021/27xxx/CVE-2021-27581.json +++ b/2021/27xxx/CVE-2021-27581.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://gist.github.com/stasinopoulos/673ae3c31d703b4d67449f4d8888c686", "url": "https://gist.github.com/stasinopoulos/673ae3c31d703b4d67449f4d8888c686" + }, + { + "refsource": "MISC", + "name": "https://www.obrela.com/kentico-cms-critical-vulnerability/", + "url": "https://www.obrela.com/kentico-cms-critical-vulnerability/" } ] } diff --git a/2021/28xxx/CVE-2021-28093.json b/2021/28xxx/CVE-2021-28093.json new file mode 100644 index 00000000000..dcbfbc0836a --- /dev/null +++ b/2021/28xxx/CVE-2021-28093.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28093", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28094.json b/2021/28xxx/CVE-2021-28094.json new file mode 100644 index 00000000000..8cf36bd14ce --- /dev/null +++ b/2021/28xxx/CVE-2021-28094.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28094", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28095.json b/2021/28xxx/CVE-2021-28095.json new file mode 100644 index 00000000000..5fb0861220e --- /dev/null +++ b/2021/28xxx/CVE-2021-28095.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28095", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28096.json b/2021/28xxx/CVE-2021-28096.json new file mode 100644 index 00000000000..77f9352255a --- /dev/null +++ b/2021/28xxx/CVE-2021-28096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 65b659d6ebac592de8b42691e39fa2c77aecae0e Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 14:04:47 -0700 Subject: [PATCH 182/845] Add CVE-2021-21337 for GHSA-p44j-xrqg-4xrr --- 2021/21xxx/CVE-2021-21337.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21337.json b/2021/21xxx/CVE-2021-21337.json index b23d47c83c3..d8c7885bd00 100644 --- a/2021/21xxx/CVE-2021-21337.json +++ b/2021/21xxx/CVE-2021-21337.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21337", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "URL Redirection to Untrusted Site ('Open Redirect') in Products.PluggableAuthService" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Products.PluggableAuthService", + "version": { + "version_data": [ + { + "version_value": "< 2.6.1" + } + ] + } + } + ] + }, + "vendor_name": "zopefoundation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an open redirect vulnerability. A maliciously crafted link to the login form and login functionality could redirect the browser to a different website. The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install \"Products.PluggableAuthService>=2.6.1\"." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-601 URL Redirection to Untrusted Site ('Open Redirect')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr", + "refsource": "CONFIRM", + "url": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr" + }, + { + "name": "https://pypi.org/project/Products.PluggableAuthService/", + "refsource": "MISC", + "url": "https://pypi.org/project/Products.PluggableAuthService/" + }, + { + "name": "https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa", + "refsource": "MISC", + "url": "https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa" + } + ] + }, + "source": { + "advisory": "GHSA-p44j-xrqg-4xrr", + "discovery": "UNKNOWN" } } \ No newline at end of file From 10d787429a61c0c653f000c523630be7bfd7111a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Mar 2021 22:00:47 +0000 Subject: [PATCH 183/845] "-Synchronized-Data." --- 2020/25xxx/CVE-2020-25639.json | 10 ++++++ 2020/26xxx/CVE-2020-26196.json | 43 ++++++++++++------------ 2020/27xxx/CVE-2020-27575.json | 61 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27576.json | 61 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27838.json | 50 ++++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21337.json | 12 +++---- 2021/21xxx/CVE-2021-21502.json | 43 ++++++++++++------------ 2021/21xxx/CVE-2021-21503.json | 43 ++++++++++++------------ 2021/21xxx/CVE-2021-21506.json | 43 ++++++++++++------------ 2021/21xxx/CVE-2021-21510.json | 45 +++++++++++++------------ 2021/27xxx/CVE-2021-27803.json | 5 +++ 2021/28xxx/CVE-2021-28097.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28098.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3405.json | 10 ++++++ 14 files changed, 335 insertions(+), 127 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28097.json create mode 100644 2021/28xxx/CVE-2021-28098.json diff --git a/2020/25xxx/CVE-2020-25639.json b/2020/25xxx/CVE-2020-25639.json index 1297e1d6403..74b8765d8d0 100644 --- a/2020/25xxx/CVE-2020-25639.json +++ b/2020/25xxx/CVE-2020-25639.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1876995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876995" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-1db4ab0a3d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HE4CT3NL6OEBRRBUKHIX63GLNVOWCVRW/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-a2d3ad5dda", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUCBCKRHWP3UD2AVVYQJE7BIJEMCMXW5/" } ] }, diff --git a/2020/26xxx/CVE-2020-26196.json b/2020/26xxx/CVE-2020-26196.json index 51ba2c506e8..fdacde337a5 100644 --- a/2020/26xxx/CVE-2020-26196.json +++ b/2020/26xxx/CVE-2020-26196.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-08", - "ID": "CVE-2020-26196", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-08", + "ID": "CVE-2020-26196", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "PowerScale OneFS", + "product_name": "PowerScale OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.1.2, 8.2.1, 8.2.2, 9.0.0" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell EMC PowerScale OneFS versions 8.1.0-9.1.0 contain a Backup/Restore Privilege implementation issue. A user with the BackupAdmin role may potentially exploit this vulnerability resulting in the ability to write data outside of the intended file system location." } ] - }, + }, "impact": { "cvss": { - "baseScore": 5.5, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities", + "name": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2020/27xxx/CVE-2020-27575.json b/2020/27xxx/CVE-2020-27575.json index 43a1f53bc47..4040cb54f58 100644 --- a/2020/27xxx/CVE-2020-27575.json +++ b/2020/27xxx/CVE-2020-27575.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27575", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27575", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://maxum.com", + "refsource": "MISC", + "name": "http://maxum.com" + }, + { + "refsource": "MISC", + "name": "https://tvrbk.github.io/cve/2021/03/07/rumpus.html", + "url": "https://tvrbk.github.io/cve/2021/03/07/rumpus.html" } ] } diff --git a/2020/27xxx/CVE-2020-27576.json b/2020/27xxx/CVE-2020-27576.json index b9f62e91254..22d583fd1b4 100644 --- a/2020/27xxx/CVE-2020-27576.json +++ b/2020/27xxx/CVE-2020-27576.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27576", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27576", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://maxum.com", + "refsource": "MISC", + "name": "http://maxum.com" + }, + { + "refsource": "MISC", + "name": "https://tvrbk.github.io/cve/2021/03/07/rumpus.html", + "url": "https://tvrbk.github.io/cve/2021/03/07/rumpus.html" } ] } diff --git a/2020/27xxx/CVE-2020-27838.json b/2020/27xxx/CVE-2020-27838.json index f7f75a1e84e..15f772eab41 100644 --- a/2020/27xxx/CVE-2020-27838.json +++ b/2020/27xxx/CVE-2020-27838.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27838", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "keycloak", + "version": { + "version_data": [ + { + "version_value": "keycloak 13.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1906797", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906797" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality." } ] } diff --git a/2021/21xxx/CVE-2021-21337.json b/2021/21xxx/CVE-2021-21337.json index d8c7885bd00..0bd8d464555 100644 --- a/2021/21xxx/CVE-2021-21337.json +++ b/2021/21xxx/CVE-2021-21337.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an open redirect vulnerability. A maliciously crafted link to the login form and login functionality could redirect the browser to a different website. The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install \"Products.PluggableAuthService>=2.6.1\"." + "value": "Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an open redirect vulnerability. A maliciously crafted link to the login form and login functionality could redirect the browser to a different website. The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install \"Products.PluggableAuthService>=2.6.1\"." } ] }, @@ -69,16 +69,16 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr", - "refsource": "CONFIRM", - "url": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr" - }, { "name": "https://pypi.org/project/Products.PluggableAuthService/", "refsource": "MISC", "url": "https://pypi.org/project/Products.PluggableAuthService/" }, + { + "name": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr", + "refsource": "CONFIRM", + "url": "https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr" + }, { "name": "https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa", "refsource": "MISC", diff --git a/2021/21xxx/CVE-2021-21502.json b/2021/21xxx/CVE-2021-21502.json index d75a8b1ffa0..c060a5840b2 100644 --- a/2021/21xxx/CVE-2021-21502.json +++ b/2021/21xxx/CVE-2021-21502.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-08", - "ID": "CVE-2021-21502", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-08", + "ID": "CVE-2021-21502", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "PowerScale OneFS", + "product_name": "PowerScale OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.1.2 / 8.2.2 / 9.1.0.x / Empire / Main" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell PowerScale OneFS versions 8.1.0 \u2013 9.1.0 contain a \"use of SSH key past account expiration\" vulnerability. A user on the network with the ISI_PRIV_AUTH_SSH RBAC privilege that has an expired account may potentially exploit this vulnerability, giving them access to the same things they had before account expiration. This may by a high privileged account and hence Dell recommends customers upgrade at the earliest opportunity." } ] - }, + }, "impact": { "cvss": { - "baseScore": 9.8, - "baseSeverity": "Critical", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "Other" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities", + "name": "https://www.dell.com/support/kbdoc/en-us/000182873/dsa-2021-009-dell-powerscale-onefs-security-update-for-multiple-vulnerabilities" } ] } diff --git a/2021/21xxx/CVE-2021-21503.json b/2021/21xxx/CVE-2021-21503.json index 31fbb69e049..2b17a64828f 100644 --- a/2021/21xxx/CVE-2021-21503.json +++ b/2021/21xxx/CVE-2021-21503.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-26", - "ID": "CVE-2021-21503", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-26", + "ID": "CVE-2021-21503", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "PowerScale OneFS", + "product_name": "PowerScale OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.1.2, 8.2.2,9.1.0.x,EMPIRE (9.2.0), GOTHAM" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation." } ] - }, + }, "impact": { "cvss": { - "baseScore": 7.8, - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/000183717" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/000183717", + "name": "https://www.dell.com/support/kbdoc/000183717" } ] } diff --git a/2021/21xxx/CVE-2021-21506.json b/2021/21xxx/CVE-2021-21506.json index acc2e988cf9..3dff55ba03a 100644 --- a/2021/21xxx/CVE-2021-21506.json +++ b/2021/21xxx/CVE-2021-21506.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-02-26", - "ID": "CVE-2021-21506", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-02-26", + "ID": "CVE-2021-21506", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "PowerScale OneFS", + "product_name": "PowerScale OneFS", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "8.1.2, 8.2.2,9.1.0.x,EMPIRE (9.2.0), GOTHAM" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in its API handler. An un-authtenticated with ISI_PRIV_SYS_SUPPORT and ISI_PRIV_LOGIN_PAPI privileges could potentially exploit this vulnerability, leading to potential privileges escalation." } ] - }, + }, "impact": { "cvss": { - "baseScore": 8.8, - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "Other" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/000183717" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/000183717", + "name": "https://www.dell.com/support/kbdoc/000183717" } ] } diff --git a/2021/21xxx/CVE-2021-21510.json b/2021/21xxx/CVE-2021-21510.json index 96fd02790ce..cc83e96e06d 100644 --- a/2021/21xxx/CVE-2021-21510.json +++ b/2021/21xxx/CVE-2021-21510.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-03-04", - "ID": "CVE-2021-21510", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-04", + "ID": "CVE-2021-21510", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Integrated Dell Remote Access Controller (iDRAC)", + "product_name": "Integrated Dell Remote Access Controller (iDRAC)", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "2.75.100.75" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a web-cache or trigger redirections. \t" + "lang": "eng", + "value": "Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a web-cache or trigger redirections." } ] - }, + }, "impact": { "cvss": { - "baseScore": 6.1, - "baseSeverity": "Medium", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability", + "name": "https://www.dell.com/support/kbdoc/en-us/000183758/dsa-2021-041-dell-emc-idrac-8-security-update-for-a-host-header-injection-vulnerability" } ] } diff --git a/2021/27xxx/CVE-2021-27803.json b/2021/27xxx/CVE-2021-27803.json index 82c6e921253..1e9183a9a23 100644 --- a/2021/27xxx/CVE-2021-27803.json +++ b/2021/27xxx/CVE-2021-27803.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210302 [SECURITY] [DLA 2581-1] wpa security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00003.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-99cad2b81f", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/" } ] } diff --git a/2021/28xxx/CVE-2021-28097.json b/2021/28xxx/CVE-2021-28097.json new file mode 100644 index 00000000000..cf76b632275 --- /dev/null +++ b/2021/28xxx/CVE-2021-28097.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28097", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28098.json b/2021/28xxx/CVE-2021-28098.json new file mode 100644 index 00000000000..0a79a81d7c5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3405.json b/2021/3xxx/CVE-2021-3405.json index d1e2b7cba32..de2011c4708 100644 --- a/2021/3xxx/CVE-2021-3405.json +++ b/2021/3xxx/CVE-2021-3405.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://github.com/Matroska-Org/libebml/issues/74", "url": "https://github.com/Matroska-Org/libebml/issues/74" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-9a0fff8455", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-aa78f97893", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/" } ] }, From 4644dfe7881b18bf6967b996599f6ec4fcf35b52 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 00:00:41 +0000 Subject: [PATCH 184/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 864ab670256..ecbe2a57a74 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -425,6 +425,11 @@ "refsource": "MLIST", "name": "[iotdb-reviews] 20210308 [GitHub] [iotdb] jixuan1989 commented on pull request #2768: [IOTDB-1181] Upgrade jetty jar to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210308 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E" } ] } From d69ba6f409a1db6e4cd5f678ce01d23aa3a27c71 Mon Sep 17 00:00:00 2001 From: Neal Poole Date: Mon, 8 Mar 2021 19:22:48 -0500 Subject: [PATCH 185/845] Release CVE-2021-24033 for react-dev-utils --- 2021/24xxx/CVE-2021-24033.json | 89 +++++++++++++++++++++++++++------- 1 file changed, 72 insertions(+), 17 deletions(-) diff --git a/2021/24xxx/CVE-2021-24033.json b/2021/24xxx/CVE-2021-24033.json index 05e4ed97708..24dff57b9da 100644 --- a/2021/24xxx/CVE-2021-24033.json +++ b/2021/24xxx/CVE-2021-24033.json @@ -1,18 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24033", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2021-03-04", + "ID": "CVE-2021-24033", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "react-dev-utils", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "11.0.4 " + }, + { + "version_affected": "<", + "version_value": "11.0.4" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Neutralization of Special Elements used in an OS Command (CWE-78)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/facebook/create-react-app/pull/10644", + "url": "https://github.com/facebook/create-react-app/pull/10644" + }, + { + "refsource": "CONFIRM", + "name": "https://www.facebook.com/security/advisories/cve-2021-24033", + "url": "https://www.facebook.com/security/advisories/cve-2021-24033" + } + ] + } +} From 5a25316e0f60929486235a1c88c19ccb445fc11d Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 17:27:41 -0700 Subject: [PATCH 186/845] Add CVE-2021-21360 for GHSA-jff3-mwp3-f8cw --- 2021/21xxx/CVE-2021-21360.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21360.json b/2021/21xxx/CVE-2021-21360.json index c1cec427c2b..a6a49e8fa1d 100644 --- a/2021/21xxx/CVE-2021-21360.json +++ b/2021/21xxx/CVE-2021-21360.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21360", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Products.GenericSetup", + "version": { + "version_data": [ + { + "version_value": "< 2.1.1" + } + ] + } + } + ] + }, + "vendor_name": "zopefoundation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `\"Products.GenericSetup>=2.1.1\"`." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw", + "refsource": "CONFIRM", + "url": "https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw" + }, + { + "name": "https://pypi.org/project/Products.GenericSetup/", + "refsource": "MISC", + "url": "https://pypi.org/project/Products.GenericSetup/" + }, + { + "name": "https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57", + "refsource": "MISC", + "url": "https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57" + } + ] + }, + "source": { + "advisory": "GHSA-jff3-mwp3-f8cw", + "discovery": "UNKNOWN" } } \ No newline at end of file From 871787af5e84d86ab8e7eb31d99f002f98eec015 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Mon, 8 Mar 2021 17:36:49 -0700 Subject: [PATCH 187/845] Add CVE-2021-21361 for GHSA-jpcm-4485-69p7 --- 2021/21xxx/CVE-2021-21361.json | 92 +++++++++++++++++++++++++++++++--- 1 file changed, 86 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21361.json b/2021/21xxx/CVE-2021-21361.json index cf8d98a35a5..f8d7eb5a7ec 100644 --- a/2021/21xxx/CVE-2021-21361.json +++ b/2021/21xxx/CVE-2021-21361.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21361", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "security-research", + "version": { + "version_data": [ + { + "version_value": "< 3.0.0" + } + ] + } + } + ] + }, + "vendor_name": "JLLeitschuh" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532: Insertion of Sensitive Information into Log File" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7", + "refsource": "CONFIRM", + "url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7" + }, + { + "name": "https://github.com/bmuschko/gradle-vagrant-plugin/issues/19", + "refsource": "MISC", + "url": "https://github.com/bmuschko/gradle-vagrant-plugin/issues/19" + }, + { + "name": "https://github.com/bmuschko/gradle-vagrant-plugin/pull/20", + "refsource": "MISC", + "url": "https://github.com/bmuschko/gradle-vagrant-plugin/pull/20" + }, + { + "name": "https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44", + "refsource": "MISC", + "url": "https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44" + } + ] + }, + "source": { + "advisory": "GHSA-jpcm-4485-69p7", + "discovery": "UNKNOWN" } } \ No newline at end of file From 8d8a83deb1d0d33a6e8c9c7fefd50b81dcfd273b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 07:00:40 +0000 Subject: [PATCH 188/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29032.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/29xxx/CVE-2020-29032.json b/2020/29xxx/CVE-2020-29032.json index 470da2f6e3a..6664c46772b 100644 --- a/2020/29xxx/CVE-2020-29032.json +++ b/2020/29xxx/CVE-2020-29032.json @@ -81,6 +81,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2021-06", + "url": "https://www.tenable.com/security/research/tra-2021-06" + }, { "refsource": "MISC", "url": "https://www.secomea.com/support/cybersecurity-advisory/#3737", From 1313759d1a00f6ff2b707b43a7d7bb379043738a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 08:00:50 +0000 Subject: [PATCH 189/845] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36257.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36258.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36259.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36260.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36261.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36262.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36263.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36264.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36265.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36266.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36267.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36268.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36269.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36270.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36271.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36272.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36273.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36274.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36275.json | 18 ++++++++++++++++++ 2020/36xxx/CVE-2020-36276.json | 18 ++++++++++++++++++ 20 files changed, 360 insertions(+) create mode 100644 2020/36xxx/CVE-2020-36257.json create mode 100644 2020/36xxx/CVE-2020-36258.json create mode 100644 2020/36xxx/CVE-2020-36259.json create mode 100644 2020/36xxx/CVE-2020-36260.json create mode 100644 2020/36xxx/CVE-2020-36261.json create mode 100644 2020/36xxx/CVE-2020-36262.json create mode 100644 2020/36xxx/CVE-2020-36263.json create mode 100644 2020/36xxx/CVE-2020-36264.json create mode 100644 2020/36xxx/CVE-2020-36265.json create mode 100644 2020/36xxx/CVE-2020-36266.json create mode 100644 2020/36xxx/CVE-2020-36267.json create mode 100644 2020/36xxx/CVE-2020-36268.json create mode 100644 2020/36xxx/CVE-2020-36269.json create mode 100644 2020/36xxx/CVE-2020-36270.json create mode 100644 2020/36xxx/CVE-2020-36271.json create mode 100644 2020/36xxx/CVE-2020-36272.json create mode 100644 2020/36xxx/CVE-2020-36273.json create mode 100644 2020/36xxx/CVE-2020-36274.json create mode 100644 2020/36xxx/CVE-2020-36275.json create mode 100644 2020/36xxx/CVE-2020-36276.json diff --git a/2020/36xxx/CVE-2020-36257.json b/2020/36xxx/CVE-2020-36257.json new file mode 100644 index 00000000000..ec28a46aec2 --- /dev/null +++ b/2020/36xxx/CVE-2020-36257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36258.json b/2020/36xxx/CVE-2020-36258.json new file mode 100644 index 00000000000..9dd0ed2a256 --- /dev/null +++ b/2020/36xxx/CVE-2020-36258.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36258", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36259.json b/2020/36xxx/CVE-2020-36259.json new file mode 100644 index 00000000000..13662691d86 --- /dev/null +++ b/2020/36xxx/CVE-2020-36259.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36259", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36260.json b/2020/36xxx/CVE-2020-36260.json new file mode 100644 index 00000000000..5b3bbe544f5 --- /dev/null +++ b/2020/36xxx/CVE-2020-36260.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36260", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36261.json b/2020/36xxx/CVE-2020-36261.json new file mode 100644 index 00000000000..5514775fb63 --- /dev/null +++ b/2020/36xxx/CVE-2020-36261.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36261", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36262.json b/2020/36xxx/CVE-2020-36262.json new file mode 100644 index 00000000000..f7efdacacad --- /dev/null +++ b/2020/36xxx/CVE-2020-36262.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36262", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36263.json b/2020/36xxx/CVE-2020-36263.json new file mode 100644 index 00000000000..f4fb83f4885 --- /dev/null +++ b/2020/36xxx/CVE-2020-36263.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36263", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36264.json b/2020/36xxx/CVE-2020-36264.json new file mode 100644 index 00000000000..a08940e0d62 --- /dev/null +++ b/2020/36xxx/CVE-2020-36264.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36264", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36265.json b/2020/36xxx/CVE-2020-36265.json new file mode 100644 index 00000000000..3e950536b90 --- /dev/null +++ b/2020/36xxx/CVE-2020-36265.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36265", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36266.json b/2020/36xxx/CVE-2020-36266.json new file mode 100644 index 00000000000..164dcfb44f3 --- /dev/null +++ b/2020/36xxx/CVE-2020-36266.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36266", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36267.json b/2020/36xxx/CVE-2020-36267.json new file mode 100644 index 00000000000..49b5a585a8d --- /dev/null +++ b/2020/36xxx/CVE-2020-36267.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36267", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36268.json b/2020/36xxx/CVE-2020-36268.json new file mode 100644 index 00000000000..f517fc9f1ed --- /dev/null +++ b/2020/36xxx/CVE-2020-36268.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36268", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36269.json b/2020/36xxx/CVE-2020-36269.json new file mode 100644 index 00000000000..4a78fe0dfe5 --- /dev/null +++ b/2020/36xxx/CVE-2020-36269.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36269", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36270.json b/2020/36xxx/CVE-2020-36270.json new file mode 100644 index 00000000000..a03cc86346c --- /dev/null +++ b/2020/36xxx/CVE-2020-36270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36271.json b/2020/36xxx/CVE-2020-36271.json new file mode 100644 index 00000000000..7da8b1b04ea --- /dev/null +++ b/2020/36xxx/CVE-2020-36271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36272.json b/2020/36xxx/CVE-2020-36272.json new file mode 100644 index 00000000000..1e347fc4c8c --- /dev/null +++ b/2020/36xxx/CVE-2020-36272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36273.json b/2020/36xxx/CVE-2020-36273.json new file mode 100644 index 00000000000..89c1fbceb1d --- /dev/null +++ b/2020/36xxx/CVE-2020-36273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36274.json b/2020/36xxx/CVE-2020-36274.json new file mode 100644 index 00000000000..98e9986cfd9 --- /dev/null +++ b/2020/36xxx/CVE-2020-36274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36275.json b/2020/36xxx/CVE-2020-36275.json new file mode 100644 index 00000000000..100db21dc60 --- /dev/null +++ b/2020/36xxx/CVE-2020-36275.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36275", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36276.json b/2020/36xxx/CVE-2020-36276.json new file mode 100644 index 00000000000..6c5f9bfbfba --- /dev/null +++ b/2020/36xxx/CVE-2020-36276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a54f90607681f245a7d662e244a0fddd9f5e29f3 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Tue, 9 Mar 2021 10:35:26 +0100 Subject: [PATCH 190/845] Commit CVE-2018-13381 --- 2018/13xxx/CVE-2018-13381.json | 39 +++++++++++++++++++--------------- 1 file changed, 22 insertions(+), 17 deletions(-) diff --git a/2018/13xxx/CVE-2018-13381.json b/2018/13xxx/CVE-2018-13381.json index d8574d8462c..106db6e6082 100644 --- a/2018/13xxx/CVE-2018-13381.json +++ b/2018/13xxx/CVE-2018-13381.json @@ -15,17 +15,11 @@ "product": { "product_data": [ { - "product_name": "Fortinet FortiOS", + "product_name": "Fortinet FortiOS and FortiProxy", "version": { "version_data": [ { - "version_value": "FortiOS 6.0.0 to 6.0.4" - }, - { - "version_value": "5.6.0 to 5.6.7" - }, - { - "version_value": "5.4 and below." + "version_value": "FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.7, 5.4 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier." } ] } @@ -36,6 +30,22 @@ ] } }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "Low", + "baseScore": 5.2, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, "problemtype": { "problemtype_data": [ { @@ -50,20 +60,15 @@ }, "references": { "reference_data": [ - { - "refsource": "BID", - "name": "108440", - "url": "http://www.securityfocus.com/bid/108440" - }, { "refsource": "CONFIRM", "name": "https://fortiguard.com/advisory/FG-IR-18-387", "url": "https://fortiguard.com/advisory/FG-IR-18-387" }, { - "refsource": "MISC", - "name": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/", - "url": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/" + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-232", + "url": "https://fortiguard.com/advisory/FG-IR-20-232" } ] }, @@ -71,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows a non-authenticated attacker to perform a Denial-of-service attack via special craft message payloads." + "value": "A buffer overflow vulnerability in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.7, 5.4 and earlier versions and FortiProxy 2.0.0, 1.2.8 and earlier versions under SSL VPN web portal allows a non-authenticated attacker to perform a Denial-of-service attack via special craft message payloads." } ] } From 6b749e245579e7b6662e535a452d2d4f2fa76df5 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Tue, 9 Mar 2021 10:40:22 +0100 Subject: [PATCH 191/845] Commit CVE-2018-13383 --- 2018/13xxx/CVE-2018-13383.json | 38 ++++++++++++++++++++-------------- 1 file changed, 22 insertions(+), 16 deletions(-) diff --git a/2018/13xxx/CVE-2018-13383.json b/2018/13xxx/CVE-2018-13383.json index 6b854e7ca24..fdf64f9368a 100644 --- a/2018/13xxx/CVE-2018-13383.json +++ b/2018/13xxx/CVE-2018-13383.json @@ -15,11 +15,11 @@ "product": { "product_data": [ { - "product_name": "Fortinet FortiOS", + "product_name": "Fortinet FortiOS, and FortiProxy", "version": { "version_data": [ { - "version_value": "FortiOS all versions below 6.0.5" + "version_value": "FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier, FortiProxy 2.0.0, 1.2.8 and earlier" } ] } @@ -30,6 +30,22 @@ ] } }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "Low", + "baseScore": 4.2, + "baseSeverity": "Medium", + "confidentialityImpact": "None", + "integrityImpact": "None", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, "problemtype": { "problemtype_data": [ { @@ -50,19 +66,9 @@ "url": "https://fortiguard.com/advisory/FG-IR-18-388" }, { - "refsource": "BID", - "name": "108539", - "url": "http://www.securityfocus.com/bid/108539" - }, - { - "refsource": "MISC", - "name": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/", - "url": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/" - }, - { - "refsource": "MISC", - "name": "https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf", - "url": "https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf" + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-20-229", + "url": "https://fortiguard.com/advisory/FG-IR-20-229" } ] }, @@ -70,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "A heap buffer overflow in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.10, 5.4.0 to 5.4.12, 5.2.14 and below in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages." + "value": "A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages." } ] } From 25c04c0eaa516258cc537e9653fadc78cfa11e27 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Tue, 9 Mar 2021 09:43:24 +0000 Subject: [PATCH 192/845] Commit CVE-2018-13383 --- 2018/13xxx/CVE-2018-13383.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2018/13xxx/CVE-2018-13383.json b/2018/13xxx/CVE-2018-13383.json index fdf64f9368a..6908208456b 100644 --- a/2018/13xxx/CVE-2018-13383.json +++ b/2018/13xxx/CVE-2018-13383.json @@ -15,7 +15,7 @@ "product": { "product_data": [ { - "product_name": "Fortinet FortiOS, and FortiProxy", + "product_name": "Fortinet FortiOS and FortiProxy", "version": { "version_data": [ { @@ -80,4 +80,4 @@ } ] } -} \ No newline at end of file +} From c8a479cef5e3330e58ab992c681e6ef858427ce9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 10:00:40 +0000 Subject: [PATCH 193/845] "-Synchronized-Data." --- 2014/1xxx/CVE-2014-1520.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2014/1xxx/CVE-2014-1520.json b/2014/1xxx/CVE-2014-1520.json index 5ece69c3fcc..277976d1e9b 100644 --- a/2014/1xxx/CVE-2014-1520.json +++ b/2014/1xxx/CVE-2014-1520.json @@ -91,6 +91,11 @@ "name": "FEDORA-2014-5829", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html" + }, + { + "refsource": "FULLDISC", + "name": "20210308 Unholy CRAP: Moziila's executable installers", + "url": "http://seclists.org/fulldisclosure/2021/Mar/14" } ] } From 681da40e42c3e0a23e3a0a62c06f3ab07386e946 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 11:00:40 +0000 Subject: [PATCH 194/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 10f61800450..c47b0d1aa0e 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -214,6 +214,26 @@ "refsource": "MLIST", "name": "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on a change in pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", "url": "https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg closed pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg closed pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E" } ] } From 1b024d0289ca901c02b76f800191df6eb8b1e38c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 13:00:51 +0000 Subject: [PATCH 195/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2020/27xxx/CVE-2020-27223.json | 10 ++++++++++ 2 files changed, 15 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index cd9fd617f6d..b60a277e652 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -143,6 +143,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210308 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210309 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index c47b0d1aa0e..e0d08d47560 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -234,6 +234,16 @@ "refsource": "MLIST", "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on a change in pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E" } ] } From 1bff67b47a932d355d5b2ffdfcb5fb3096553140 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 14:00:39 +0000 Subject: [PATCH 196/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20272.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20273.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20274.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20275.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20276.json | 55 +++++++++++++++++++++++++++++++-- 2021/28xxx/CVE-2021-28006.json | 56 ++++++++++++++++++++++++++++++---- 6 files changed, 310 insertions(+), 21 deletions(-) diff --git a/2021/20xxx/CVE-2021-20272.json b/2021/20xxx/CVE-2021-20272.json index 8fdc791b8ec..4c62f6fec5f 100644 --- a/2021/20xxx/CVE-2021-20272.json +++ b/2021/20xxx/CVE-2021-20272.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20272", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "privoxy", + "version": { + "version_data": [ + { + "version_value": "privoxy 3.0.32" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-617" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936651", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936651" + }, + { + "refsource": "MISC", + "name": "https://www.privoxy.org/announce.txt", + "url": "https://www.privoxy.org/announce.txt" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in privoxy before 3.0.32. An assertion failure could be triggered with a crafted CGI request leading to server crash." } ] } diff --git a/2021/20xxx/CVE-2021-20273.json b/2021/20xxx/CVE-2021-20273.json index 97dfb547129..52f41330d3c 100644 --- a/2021/20xxx/CVE-2021-20273.json +++ b/2021/20xxx/CVE-2021-20273.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20273", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "privoxy", + "version": { + "version_data": [ + { + "version_value": "privoxy 3.0.32" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.privoxy.org/announce.txt", + "url": "https://www.privoxy.org/announce.txt" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in privoxy before 3.0.32. A crash can occur via a crafted CGI request if Privoxy is toggled off." } ] } diff --git a/2021/20xxx/CVE-2021-20274.json b/2021/20xxx/CVE-2021-20274.json index 24e09ee8202..574315b0fd4 100644 --- a/2021/20xxx/CVE-2021-20274.json +++ b/2021/20xxx/CVE-2021-20274.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20274", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "privoxy", + "version": { + "version_data": [ + { + "version_value": "privoxy 3.0.32" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.privoxy.org/announce.txt", + "url": "https://www.privoxy.org/announce.txt" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936662", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936662" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in privoxy before 3.0.32. A crash may occur due a NULL-pointer dereference when the socks server misbehaves." } ] } diff --git a/2021/20xxx/CVE-2021-20275.json b/2021/20xxx/CVE-2021-20275.json index cc24f7ea387..2840c35d202 100644 --- a/2021/20xxx/CVE-2021-20275.json +++ b/2021/20xxx/CVE-2021-20275.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20275", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "privoxy", + "version": { + "version_data": [ + { + "version_value": "privoxy 3.0.32" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.privoxy.org/announce.txt", + "url": "https://www.privoxy.org/announce.txt" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in privoxy before 3.0.32. A invalid read of size two may occur in chunked_body_is_complete() leading to denial of service." } ] } diff --git a/2021/20xxx/CVE-2021-20276.json b/2021/20xxx/CVE-2021-20276.json index a1ffde4dcba..e18f82c3f07 100644 --- a/2021/20xxx/CVE-2021-20276.json +++ b/2021/20xxx/CVE-2021-20276.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20276", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "privoxy", + "version": { + "version_data": [ + { + "version_value": "privoxy 3.0.32" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.privoxy.org/announce.txt", + "url": "https://www.privoxy.org/announce.txt" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in privoxy before 3.0.32. Invalid memory access with an invalid pattern passed to pcre_compile() may lead to denial of service." } ] } diff --git a/2021/28xxx/CVE-2021-28006.json b/2021/28xxx/CVE-2021-28006.json index ecfdc546106..32094833132 100644 --- a/2021/28xxx/CVE-2021-28006.json +++ b/2021/28xxx/CVE-2021-28006.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28006", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28006", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Web Based Quiz System 1.0 is affected by cross-site scripting (XSS) in admin.php through the options parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49605", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49605" } ] } From 92f137bfc884c7c1b70983a79f3b6f2536bddf3f Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Tue, 9 Mar 2021 15:02:24 +0100 Subject: [PATCH 197/845] Commit CVE-2019-17655 --- 2019/17xxx/CVE-2019-17655.json | 31 ++++++++++++++++++++++++++----- 1 file changed, 26 insertions(+), 5 deletions(-) diff --git a/2019/17xxx/CVE-2019-17655.json b/2019/17xxx/CVE-2019-17655.json index 89b4fdb0c19..ef0375e05be 100644 --- a/2019/17xxx/CVE-2019-17655.json +++ b/2019/17xxx/CVE-2019-17655.json @@ -11,15 +11,15 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", + "vendor_name": "Fortinet", "product": { "product_data": [ { - "product_name": "Fortinet FortiOS", + "product_name": "Fortinet FortiOS and FortiProxy", "version": { "version_data": [ { - "version_value": "FortiOS 6.2.2 and below" + "version_value": "FortiOS 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier" } ] } @@ -30,6 +30,22 @@ ] } }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 4.9, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, "problemtype": { "problemtype_data": [ { @@ -45,9 +61,14 @@ "references": { "reference_data": [ { - "refsource": "MISC", + "refsource": "CONFIRM", "name": "https://fortiguard.com/psirt/FG-IR-19-217", "url": "https://fortiguard.com/psirt/FG-IR-19-217" + }, + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/psirt/FG-IR-20-224", + "url": "https://fortiguard.com/psirt/FG-IR-20-224" } ] }, @@ -55,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 to 6.2.2, 6.0.9 and below may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system." + "value": "A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system." } ] } From 63d7a9fb073befcc752ecace22ae0ac72054be2a Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Tue, 9 Mar 2021 09:49:13 -0500 Subject: [PATCH 198/845] IBM20210309-94913 Added CVE-2021-20341 --- 2021/20xxx/CVE-2021-20341.json | 102 ++++++++++++++++++++++++++++----- 1 file changed, 87 insertions(+), 15 deletions(-) diff --git a/2021/20xxx/CVE-2021-20341.json b/2021/20xxx/CVE-2021-20341.json index a4c0805a76d..275db51ce8b 100644 --- a/2021/20xxx/CVE-2021-20341.json +++ b/2021/20xxx/CVE-2021-20341.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20341", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Obtain Information", + "lang" : "eng" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6426997 (Cloud Pak for Multicloud Management Monitoring)", + "name" : "https://www.ibm.com/support/pages/node/6426997", + "url" : "https://www.ibm.com/support/pages/node/6426997", + "refsource" : "CONFIRM" + }, + { + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194513", + "name" : "ibm-cpm-cve202120341-info-disc (194513)" + } + ] + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "2.2" + } + ] + }, + "product_name" : "Cloud Pak for Multicloud Management Monitoring" + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "ID" : "CVE-2021-20341", + "DATE_PUBLIC" : "2021-03-08T00:00:00" + }, + "impact" : { + "cvssv3" : { + "BM" : { + "S" : "U", + "PR" : "N", + "I" : "N", + "UI" : "N", + "AV" : "N", + "AC" : "L", + "A" : "N", + "SCORE" : "5.300", + "C" : "L" + }, + "TM" : { + "RL" : "O", + "RC" : "C", + "E" : "U" + } + } + }, + "description" : { + "description_data" : [ + { + "value" : "IBM Cloud Pak for Multicloud Management Monitoring 2.2 returns potentially sensitive information in headers which could lead to further attacks against the system. IBM X-Force ID: 194513.", + "lang" : "eng" + } + ] + } +} From 18ac401159aa7fac1ad2c2be27cad1b26cf34d7c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 15:00:41 +0000 Subject: [PATCH 199/845] "-Synchronized-Data." --- 2019/3xxx/CVE-2019-3823.json | 5 + 2020/13xxx/CVE-2020-13987.json | 5 + 2020/17xxx/CVE-2020-17437.json | 5 + 2020/28xxx/CVE-2020-28388.json | 5 + 2021/20xxx/CVE-2021-20341.json | 174 ++++++++++++++++----------------- 2021/21xxx/CVE-2021-21480.json | 75 +++++++++++++- 2021/21xxx/CVE-2021-21481.json | 83 +++++++++++++++- 2021/21xxx/CVE-2021-21484.json | 63 +++++++++++- 2021/21xxx/CVE-2021-21486.json | 115 +++++++++++++++++++++- 2021/21xxx/CVE-2021-21487.json | 63 +++++++++++- 2021/21xxx/CVE-2021-21488.json | 83 +++++++++++++++- 2021/21xxx/CVE-2021-21493.json | 63 +++++++++++- 2021/22xxx/CVE-2021-22643.json | 5 + 2021/22xxx/CVE-2021-22645.json | 5 + 2021/22xxx/CVE-2021-22647.json | 5 + 2021/22xxx/CVE-2021-22649.json | 5 + 2021/22xxx/CVE-2021-22651.json | 5 + 2021/25xxx/CVE-2021-25915.json | 55 ++++++++++- 2021/27xxx/CVE-2021-27584.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27585.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27586.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27587.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27588.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27589.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27590.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27591.json | 63 +++++++++++- 2021/27xxx/CVE-2021-27592.json | 63 +++++++++++- 27 files changed, 1248 insertions(+), 138 deletions(-) diff --git a/2019/3xxx/CVE-2019-3823.json b/2019/3xxx/CVE-2019-3823.json index 3e26b042a56..79f7f760016 100644 --- a/2019/3xxx/CVE-2019-3823.json +++ b/2019/3xxx/CVE-2019-3823.json @@ -116,6 +116,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:3701", "url": "https://access.redhat.com/errata/RHSA-2019:3701" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf" } ] } diff --git a/2020/13xxx/CVE-2020-13987.json b/2020/13xxx/CVE-2020-13987.json index 141543462df..b7f1bf2bf5b 100644 --- a/2020/13xxx/CVE-2020-13987.json +++ b/2020/13xxx/CVE-2020-13987.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf" } ] } diff --git a/2020/17xxx/CVE-2020-17437.json b/2020/17xxx/CVE-2020-17437.json index 1513b710d1e..b09c2c47076 100644 --- a/2020/17xxx/CVE-2020-17437.json +++ b/2020/17xxx/CVE-2020-17437.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28388.json b/2020/28xxx/CVE-2020-28388.json index e065ff56e62..b7538cd7bf0 100644 --- a/2020/28xxx/CVE-2020-28388.json +++ b/2020/28xxx/CVE-2020-28388.json @@ -66,6 +66,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" } ] } diff --git a/2021/20xxx/CVE-2021-20341.json b/2021/20xxx/CVE-2021-20341.json index 275db51ce8b..80248f19ae1 100644 --- a/2021/20xxx/CVE-2021-20341.json +++ b/2021/20xxx/CVE-2021-20341.json @@ -1,90 +1,90 @@ { - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6426997 (Cloud Pak for Multicloud Management Monitoring)", - "name" : "https://www.ibm.com/support/pages/node/6426997", - "url" : "https://www.ibm.com/support/pages/node/6426997", - "refsource" : "CONFIRM" - }, - { - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194513", - "name" : "ibm-cpm-cve202120341-info-disc (194513)" - } - ] - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "2.2" - } - ] - }, - "product_name" : "Cloud Pak for Multicloud Management Monitoring" - } - ] - } + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] } - ] - } - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2021-20341", - "DATE_PUBLIC" : "2021-03-08T00:00:00" - }, - "impact" : { - "cvssv3" : { - "BM" : { - "S" : "U", - "PR" : "N", - "I" : "N", - "UI" : "N", - "AV" : "N", - "AC" : "L", - "A" : "N", - "SCORE" : "5.300", - "C" : "L" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Cloud Pak for Multicloud Management Monitoring 2.2 returns potentially sensitive information in headers which could lead to further attacks against the system. IBM X-Force ID: 194513.", - "lang" : "eng" - } - ] - } -} + ] + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6426997 (Cloud Pak for Multicloud Management Monitoring)", + "name": "https://www.ibm.com/support/pages/node/6426997", + "url": "https://www.ibm.com/support/pages/node/6426997", + "refsource": "CONFIRM" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/194513", + "name": "ibm-cpm-cve202120341-info-disc (194513)" + } + ] + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2.2" + } + ] + }, + "product_name": "Cloud Pak for Multicloud Management Monitoring" + } + ] + } + } + ] + } + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2021-20341", + "DATE_PUBLIC": "2021-03-08T00:00:00" + }, + "impact": { + "cvssv3": { + "BM": { + "S": "U", + "PR": "N", + "I": "N", + "UI": "N", + "AV": "N", + "AC": "L", + "A": "N", + "SCORE": "5.300", + "C": "L" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "description": { + "description_data": [ + { + "value": "IBM Cloud Pak for Multicloud Management Monitoring 2.2 returns potentially sensitive information in headers which could lead to further attacks against the system. IBM X-Force ID: 194513.", + "lang": "eng" + } + ] + } +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21480.json b/2021/21xxx/CVE-2021-21480.json index df66474a2f6..6dffc251aef 100644 --- a/2021/21xxx/CVE-2021-21480.json +++ b/2021/21xxx/CVE-2021-21480.json @@ -4,14 +4,83 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21480", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Manufacturing Integration and Intelligence", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "15.1" + }, + { + "version_name": "<", + "version_value": "15.2" + }, + { + "version_name": "<", + "version_value": "15.3" + }, + { + "version_name": "<", + "version_value": "15.4" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP MII allows users to create dashboards and save them as JSP through the SSCE (Self Service Composition Environment). An attacker can intercept a request to the server, inject malicious JSP code in the request and forward to server. When this dashboard is opened by Users having at least SAP_XMII_Developer role, malicious content in the dashboard gets executed, leading to remote code execution in the server, which allows privilege escalation. The malicious JSP code can contain certain OS commands, through which an attacker can read sensitive files in the server, modify files or even delete contents in the server thus compromising the confidentiality, integrity and availability of the server hosting the SAP MII application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "9.9", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3022622", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3022622" } ] } diff --git a/2021/21xxx/CVE-2021-21481.json b/2021/21xxx/CVE-2021-21481.json index 775276a6821..e9dbc012bdc 100644 --- a/2021/21xxx/CVE-2021-21481.json +++ b/2021/21xxx/CVE-2021-21481.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21481", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP NetWeaver AS JAVA (MigrationService)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "7.10" + }, + { + "version_name": "<", + "version_value": "7.11" + }, + { + "version_name": "<", + "version_value": "7.30" + }, + { + "version_name": "<", + "version_value": "7.31" + }, + { + "version_name": "<", + "version_value": "7.40" + }, + { + "version_name": "<", + "version_value": "7.50" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administrative privileges. This could result in complete compromise of system confidentiality, integrity, and availability." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "9.6", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://launchpad.support.sap.com/#/notes/3022422", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3022422" + }, + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" } ] } diff --git a/2021/21xxx/CVE-2021-21484.json b/2021/21xxx/CVE-2021-21484.json index c32350ddfb0..fc5386b11c0 100644 --- a/2021/21xxx/CVE-2021-21484.json +++ b/2021/21xxx/CVE-2021-21484.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21484", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP HANA", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "2.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "7.7", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authentication Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3017378", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3017378" } ] } diff --git a/2021/21xxx/CVE-2021-21486.json b/2021/21xxx/CVE-2021-21486.json index c82fbdddbb1..5b00b5113b4 100644 --- a/2021/21xxx/CVE-2021-21486.json +++ b/2021/21xxx/CVE-2021-21486.json @@ -4,14 +4,123 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21486", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Enterprise Financial Services (Bank Customer Accounts)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "101" + }, + { + "version_name": "<", + "version_value": "102" + }, + { + "version_name": "<", + "version_value": "103" + }, + { + "version_name": "<", + "version_value": "104" + }, + { + "version_name": "<", + "version_value": "105" + }, + { + "version_name": "<", + "version_value": "600" + }, + { + "version_name": "<", + "version_value": "603" + }, + { + "version_name": "<", + "version_value": "604" + }, + { + "version_name": "<", + "version_value": "605" + }, + { + "version_name": "<", + "version_value": "606" + }, + { + "version_name": "<", + "version_value": "616" + }, + { + "version_name": "<", + "version_value": "617" + }, + { + "version_name": "<", + "version_value": "618" + }, + { + "version_name": "<", + "version_value": "800" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.8", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3007888", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3007888" } ] } diff --git a/2021/21xxx/CVE-2021-21487.json b/2021/21xxx/CVE-2021-21487.json index 9e5df1f1a9a..0e5f0b27dfb 100644 --- a/2021/21xxx/CVE-2021-21487.json +++ b/2021/21xxx/CVE-2021-21487.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21487", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Payment Engine", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "500" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Payment Engine version 500, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.8", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3023778", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3023778" } ] } diff --git a/2021/21xxx/CVE-2021-21488.json b/2021/21xxx/CVE-2021-21488.json index d242a76136e..7fa3f60d6aa 100644 --- a/2021/21xxx/CVE-2021-21488.json +++ b/2021/21xxx/CVE-2021-21488.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21488", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP NetWeaver Knowledge Management", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "7.01" + }, + { + "version_name": "<", + "version_value": "7.02" + }, + { + "version_name": "<", + "version_value": "7.30" + }, + { + "version_name": "<", + "version_value": "7.31" + }, + { + "version_name": "<", + "version_value": "7.40" + }, + { + "version_name": "<", + "version_value": "7.50" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker\u2019s code, therefore impacting Availability." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.5", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Deserialization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2983436", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2983436" } ] } diff --git a/2021/21xxx/CVE-2021-21493.json b/2021/21xxx/CVE-2021-21493.json index 1b8e8b07974..665b625a442 100644 --- a/2021/21xxx/CVE-2021-21493.json +++ b/2021/21xxx/CVE-2021-21493.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21493", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Graphics Interchange Format (.GIF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/22xxx/CVE-2021-22643.json b/2021/22xxx/CVE-2021-22643.json index 6cc3fdb55c1..015d1b8b0da 100644 --- a/2021/22xxx/CVE-2021-22643.json +++ b/2021/22xxx/CVE-2021-22643.json @@ -78,6 +78,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" } ] }, diff --git a/2021/22xxx/CVE-2021-22645.json b/2021/22xxx/CVE-2021-22645.json index 41f74bcc1f0..1162025f683 100644 --- a/2021/22xxx/CVE-2021-22645.json +++ b/2021/22xxx/CVE-2021-22645.json @@ -78,6 +78,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" } ] }, diff --git a/2021/22xxx/CVE-2021-22647.json b/2021/22xxx/CVE-2021-22647.json index 9457642e37d..275f0b7033c 100644 --- a/2021/22xxx/CVE-2021-22647.json +++ b/2021/22xxx/CVE-2021-22647.json @@ -78,6 +78,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" } ] }, diff --git a/2021/22xxx/CVE-2021-22649.json b/2021/22xxx/CVE-2021-22649.json index 97635454b53..78d26130380 100644 --- a/2021/22xxx/CVE-2021-22649.json +++ b/2021/22xxx/CVE-2021-22649.json @@ -78,6 +78,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" } ] }, diff --git a/2021/22xxx/CVE-2021-22651.json b/2021/22xxx/CVE-2021-22651.json index b37f538c50a..bd1b245be76 100644 --- a/2021/22xxx/CVE-2021-22651.json +++ b/2021/22xxx/CVE-2021-22651.json @@ -78,6 +78,11 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25915.json b/2021/25xxx/CVE-2021-25915.json index c9b11d001ac..2ff1e138bd2 100644 --- a/2021/25xxx/CVE-2021-25915.json +++ b/2021/25xxx/CVE-2021-25915.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-25915", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "changeset", + "version": { + "version_data": [ + { + "version_value": "0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.1.0, 0.2.0, 0.2.1, 0.2.3, 0.2.4, 0.2.5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25915", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25915" + }, + { + "refsource": "MISC", + "name": "https://github.com/eugeneware/changeset/commit/9e588844edbb9993b32e7366cc799262b4447f99", + "url": "https://github.com/eugeneware/changeset/commit/9e588844edbb9993b32e7366cc799262b4447f99" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'changeset' versions 0.0.1 through 0.2.5 allows an attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2021/27xxx/CVE-2021-27584.json b/2021/27xxx/CVE-2021-27584.json index 7e6e4e16850..3602c4667b6 100644 --- a/2021/27xxx/CVE-2021-27584.json +++ b/2021/27xxx/CVE-2021-27584.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27584", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated PhotoShop Document (.PSD) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27585.json b/2021/27xxx/CVE-2021-27585.json index 7af16dcf72b..b41952eec32 100644 --- a/2021/27xxx/CVE-2021-27585.json +++ b/2021/27xxx/CVE-2021-27585.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27585", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Computer Graphics Metafile (.CGM) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27586.json b/2021/27xxx/CVE-2021-27586.json index de643a6cf93..df96a274345 100644 --- a/2021/27xxx/CVE-2021-27586.json +++ b/2021/27xxx/CVE-2021-27586.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27586", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Interchange File Format (.IFF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27587.json b/2021/27xxx/CVE-2021-27587.json index f1375044997..a93e30e7313 100644 --- a/2021/27xxx/CVE-2021-27587.json +++ b/2021/27xxx/CVE-2021-27587.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27587", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Jupiter Tessellation (.JT) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27588.json b/2021/27xxx/CVE-2021-27588.json index 79c89048b9c..e5bcf468eab 100644 --- a/2021/27xxx/CVE-2021-27588.json +++ b/2021/27xxx/CVE-2021-27588.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27588", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated HPGL format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27589.json b/2021/27xxx/CVE-2021-27589.json index b2113e51e79..234ca60f909 100644 --- a/2021/27xxx/CVE-2021-27589.json +++ b/2021/27xxx/CVE-2021-27589.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27589", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Scalable Vector Graphics (.SVG) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27590.json b/2021/27xxx/CVE-2021-27590.json index 4f91b71af2f..9813e732af6 100644 --- a/2021/27xxx/CVE-2021-27590.json +++ b/2021/27xxx/CVE-2021-27590.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27590", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Tag Image File Format (.TIFF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27591.json b/2021/27xxx/CVE-2021-27591.json index 136beaf7258..9bfc03d9199 100644 --- a/2021/27xxx/CVE-2021-27591.json +++ b/2021/27xxx/CVE-2021-27591.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27591", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Portable Document Format (.PDF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027758", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027758" } ] } diff --git a/2021/27xxx/CVE-2021-27592.json b/2021/27xxx/CVE-2021-27592.json index c92f7754f0b..05316a8e048 100644 --- a/2021/27xxx/CVE-2021-27592.json +++ b/2021/27xxx/CVE-2021-27592.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27592", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP 3D Visual Enterprise Viewer", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When a user opens manipulated Universal 3D (.U3D) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/3027767", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/3027767" } ] } From 1b9e303ec02e2b1152ee1971291fd173c08038a3 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Tue, 9 Mar 2021 15:16:46 +0000 Subject: [PATCH 200/845] Add Oozie CVE-2020-35451 --- 2020/35xxx/CVE-2020-35451.json | 80 ++++++++++++++++++++++++++++++---- 1 file changed, 72 insertions(+), 8 deletions(-) diff --git a/2020/35xxx/CVE-2020-35451.json b/2020/35xxx/CVE-2020-35451.json index 89bbd846f44..fdc938e882b 100644 --- a/2020/35xxx/CVE-2020-35451.json +++ b/2020/35xxx/CVE-2020-35451.json @@ -1,18 +1,82 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-35451", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Oozie local privilege escalation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Oozie", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.2.1" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "The Apache Oozie PMC would like to thank Jonathan Leitschuh for reporting the issue" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation. " } ] - } -} \ No newline at end of file + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-377 Insecure Temporary File" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "Validate the contents of the sharelib after uploading." + } + ] +} From d9136b487441d58ac792faf5d0413b3bae550fae Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 16:00:43 +0000 Subject: [PATCH 201/845] "-Synchronized-Data." --- 2020/17xxx/CVE-2020-17380.json | 5 +++++ 2020/25xxx/CVE-2020-25085.json | 5 +++++ 2020/35xxx/CVE-2020-35451.json | 9 +++++---- 3 files changed, 15 insertions(+), 4 deletions(-) diff --git a/2020/17xxx/CVE-2020-17380.json b/2020/17xxx/CVE-2020-17380.json index a5d5c69a801..941afa0c99a 100644 --- a/2020/17xxx/CVE-2020-17380.json +++ b/2020/17xxx/CVE-2020-17380.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01175.html", "url": "https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01175.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210309 CVE-2021-3409 QEMU: sdhci: incomplete fix for CVE-2020-17380/CVE-2020-25085", + "url": "http://www.openwall.com/lists/oss-security/2021/03/09/1" } ] } diff --git a/2020/25xxx/CVE-2020-25085.json b/2020/25xxx/CVE-2020-25085.json index 0debeef38df..834d1b2e672 100644 --- a/2020/25xxx/CVE-2020-25085.json +++ b/2020/25xxx/CVE-2020-25085.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201129 [SECURITY] [DLA 2469-1] qemu security update", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00047.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210309 CVE-2021-3409 QEMU: sdhci: incomplete fix for CVE-2020-17380/CVE-2020-25085", + "url": "http://www.openwall.com/lists/oss-security/2021/03/09/1" } ] } diff --git a/2020/35xxx/CVE-2020-35451.json b/2020/35xxx/CVE-2020-35451.json index fdc938e882b..0c3a6f8f1d9 100644 --- a/2020/35xxx/CVE-2020-35451.json +++ b/2020/35xxx/CVE-2020-35451.json @@ -42,7 +42,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation. " + "value": "There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation." } ] }, @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E", + "name": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E" } ] }, @@ -79,4 +80,4 @@ "value": "Validate the contents of the sharelib after uploading." } ] -} +} \ No newline at end of file From 68e7a16a963532a9d4d051645ea645d89e50fba0 Mon Sep 17 00:00:00 2001 From: lenpsirt Date: Tue, 9 Mar 2021 11:09:29 -0500 Subject: [PATCH 202/845] 3/9 advisories populating cves for 3/9 advisories --- 2020/8xxx/CVE-2020-8356.json | 86 +++++++++++++++++++++++++++++++--- 2020/8xxx/CVE-2020-8357.json | 91 +++++++++++++++++++++++++++++++++--- 2021/3xxx/CVE-2021-3417.json | 86 +++++++++++++++++++++++++++++++--- 3 files changed, 245 insertions(+), 18 deletions(-) diff --git a/2020/8xxx/CVE-2020-8356.json b/2020/8xxx/CVE-2020-8356.json index 7d607a0128f..2e9bb189563 100644 --- a/2020/8xxx/CVE-2020-8356.json +++ b/2020/8xxx/CVE-2020-8356.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@lenovo.com", + "DATE_PUBLIC": "2021-03-09T14:25:00.000Z", "ID": "CVE-2020-8356", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "XClarity Orchestrator ", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.2.2" + } + ] + } + } + ] + }, + "vendor_name": "Lenovo" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319 Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://support.lenovo.com/us/en/product_security/LEN-49884" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to Lenovo XClarity Orchestrator (LXCO) version 1.2.2 or higher." + } + ], + "source": { + "advisory": "LEN-49884", + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8357.json b/2020/8xxx/CVE-2020-8357.json index 2ebff9026e3..72ae948905e 100644 --- a/2020/8xxx/CVE-2020-8357.json +++ b/2020/8xxx/CVE-2020-8357.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2020-8357", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PCManager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "3.0.200.2042" + } + ] + } + } + ] + }, + "vendor_name": "Lenovo" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Lenovo thanks She ZhenHua for reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A denial of service vulnerability was reported in Lenovo PCManager, prior to version 3.0.200.2042, that could allow configuration files to be written to non-standard locations." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-276 Incorrect Default Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://iknow.lenovo.com.cn/detail/dc_195029.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to Lenovo PCManager version 3.0.200.2042 (or later)." + } + ], + "source": { + "advisory": "LEN-51601", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3417.json b/2021/3xxx/CVE-2021-3417.json index 61a4c72a588..921f8c45295 100644 --- a/2021/3xxx/CVE-2021-3417.json +++ b/2021/3xxx/CVE-2021-3417.json @@ -1,18 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@lenovo.com", + "DATE_PUBLIC": "2021-03-09T14:25:00.000Z", "ID": "CVE-2021-3417", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "XClarity Orchestrator ", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.2.2" + } + ] + } + } + ] + }, + "vendor_name": "Lenovo" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An internal product security audit of LXCO, prior to version 1.2.2, discovered that credentials for Lenovo XClarity Administrator (LXCA), if added as a Resource Manager, are encoded then written to an internal LXCO log file each time a session is established with LXCA. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319 Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://support.lenovo.com/us/en/product_security/LEN-49884" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to Lenovo XClarity Orchestrator (LXCO) version 1.2.2 or higher." + } + ], + "source": { + "advisory": "LEN-49884", + "discovery": "INTERNAL" } } \ No newline at end of file From 59dad31288a883238054e188dc7411db1da97872 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 17:00:46 +0000 Subject: [PATCH 203/845] "-Synchronized-Data." --- 2019/17xxx/CVE-2019-17655.json | 2 +- 2020/35xxx/CVE-2020-35451.json | 5 +++++ 2020/8xxx/CVE-2020-8356.json | 7 ++++--- 2020/8xxx/CVE-2020-8357.json | 5 +++-- 2021/3xxx/CVE-2021-3417.json | 7 ++++--- 2021/3xxx/CVE-2021-3425.json | 18 ++++++++++++++++++ 6 files changed, 35 insertions(+), 9 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3425.json diff --git a/2019/17xxx/CVE-2019-17655.json b/2019/17xxx/CVE-2019-17655.json index ef0375e05be..aa71819b20c 100644 --- a/2019/17xxx/CVE-2019-17655.json +++ b/2019/17xxx/CVE-2019-17655.json @@ -76,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system." + "value": "A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system." } ] } diff --git a/2020/35xxx/CVE-2020-35451.json b/2020/35xxx/CVE-2020-35451.json index 0c3a6f8f1d9..e3b08ee7bf7 100644 --- a/2020/35xxx/CVE-2020-35451.json +++ b/2020/35xxx/CVE-2020-35451.json @@ -68,6 +68,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E", "name": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oozie-user] 20210309 CVE-2020-35451: Oozie local privilege escalation", + "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5@%3Cuser.oozie.apache.org%3E" } ] }, diff --git a/2020/8xxx/CVE-2020-8356.json b/2020/8xxx/CVE-2020-8356.json index 2e9bb189563..f1b8d769100 100644 --- a/2020/8xxx/CVE-2020-8356.json +++ b/2020/8xxx/CVE-2020-8356.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file." + "value": "An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file." } ] }, @@ -74,8 +74,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-49884" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-49884", + "name": "https://support.lenovo.com/us/en/product_security/LEN-49884" } ] }, diff --git a/2020/8xxx/CVE-2020-8357.json b/2020/8xxx/CVE-2020-8357.json index 72ae948905e..860ccbf64f6 100644 --- a/2020/8xxx/CVE-2020-8357.json +++ b/2020/8xxx/CVE-2020-8357.json @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://iknow.lenovo.com.cn/detail/dc_195029.html" + "refsource": "MISC", + "url": "https://iknow.lenovo.com.cn/detail/dc_195029.html", + "name": "https://iknow.lenovo.com.cn/detail/dc_195029.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3417.json b/2021/3xxx/CVE-2021-3417.json index 921f8c45295..a2eb3f33bc4 100644 --- a/2021/3xxx/CVE-2021-3417.json +++ b/2021/3xxx/CVE-2021-3417.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "An internal product security audit of LXCO, prior to version 1.2.2, discovered that credentials for Lenovo XClarity Administrator (LXCA), if added as a Resource Manager, are encoded then written to an internal LXCO log file each time a session is established with LXCA. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file." + "value": "An internal product security audit of LXCO, prior to version 1.2.2, discovered that credentials for Lenovo XClarity Administrator (LXCA), if added as a Resource Manager, are encoded then written to an internal LXCO log file each time a session is established with LXCA. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file." } ] }, @@ -74,8 +74,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-49884" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-49884", + "name": "https://support.lenovo.com/us/en/product_security/LEN-49884" } ] }, diff --git a/2021/3xxx/CVE-2021-3425.json b/2021/3xxx/CVE-2021-3425.json new file mode 100644 index 00000000000..71e764878f0 --- /dev/null +++ b/2021/3xxx/CVE-2021-3425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a6e7210e414f43dbc98aab8656868affd592d8d6 Mon Sep 17 00:00:00 2001 From: Amy Ressler Date: Tue, 9 Mar 2021 17:35:32 +0000 Subject: [PATCH 204/845] Descriptions for CVEs fixed in Chrome Release-0-M89 --- 2021/21xxx/CVE-2021-21159.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21160.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21161.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21162.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21163.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21164.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21165.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21166.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21167.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21168.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21169.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21170.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21171.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21172.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21173.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21174.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21175.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21176.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21177.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21178.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21179.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21180.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21181.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21182.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21183.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21184.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21185.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21186.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21187.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21188.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21189.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21190.json | 53 +++++++++++++++++++++++++++++++--- 32 files changed, 1568 insertions(+), 128 deletions(-) diff --git a/2021/21xxx/CVE-2021-21159.json b/2021/21xxx/CVE-2021-21159.json index 9ad83855cee..6adb564fa82 100644 --- a/2021/21xxx/CVE-2021-21159.json +++ b/2021/21xxx/CVE-2021-21159.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21159", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1171049" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21160.json b/2021/21xxx/CVE-2021-21160.json index 01b0ae2a8fd..db6f878b2eb 100644 --- a/2021/21xxx/CVE-2021-21160.json +++ b/2021/21xxx/CVE-2021-21160.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21160", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1170531" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Heap buffer overflow in WebAudio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21161.json b/2021/21xxx/CVE-2021-21161.json index 3e30bb52689..bc82061f71c 100644 --- a/2021/21xxx/CVE-2021-21161.json +++ b/2021/21xxx/CVE-2021-21161.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21161", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1173702" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21162.json b/2021/21xxx/CVE-2021-21162.json index fda400ae1e4..69f10c805ee 100644 --- a/2021/21xxx/CVE-2021-21162.json +++ b/2021/21xxx/CVE-2021-21162.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21162", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1172054" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in WebRTC in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21163.json b/2021/21xxx/CVE-2021-21163.json index 991a6a1fee8..10bfe237620 100644 --- a/2021/21xxx/CVE-2021-21163.json +++ b/2021/21xxx/CVE-2021-21163.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21163", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient data validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1111239" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21164.json b/2021/21xxx/CVE-2021-21164.json index d6835db808f..eecac4ecf3a 100644 --- a/2021/21xxx/CVE-2021-21164.json +++ b/2021/21xxx/CVE-2021-21164.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21164", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient data validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1164846" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient data validation in Chrome on iOS in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21165.json b/2021/21xxx/CVE-2021-21165.json index bf4e941e1e4..2bb92801d58 100644 --- a/2021/21xxx/CVE-2021-21165.json +++ b/2021/21xxx/CVE-2021-21165.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21165", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Object lifecycle issue" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1174582" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21166.json b/2021/21xxx/CVE-2021-21166.json index 266a1755968..e9a4871049e 100644 --- a/2021/21xxx/CVE-2021-21166.json +++ b/2021/21xxx/CVE-2021-21166.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21166", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Object lifecycle issue" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1177465" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21167.json b/2021/21xxx/CVE-2021-21167.json index 474c8ef8b79..e5db9e22c18 100644 --- a/2021/21xxx/CVE-2021-21167.json +++ b/2021/21xxx/CVE-2021-21167.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21167", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1161144" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in bookmarks in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21168.json b/2021/21xxx/CVE-2021-21168.json index e35e7db6c9b..930387ce831 100644 --- a/2021/21xxx/CVE-2021-21168.json +++ b/2021/21xxx/CVE-2021-21168.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21168", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1152226" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in appcache in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21169.json b/2021/21xxx/CVE-2021-21169.json index ea242803f61..9eec695f4ce 100644 --- a/2021/21xxx/CVE-2021-21169.json +++ b/2021/21xxx/CVE-2021-21169.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21169", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out of bounds memory access" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1166138" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Out of bounds memory access in V8 in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21170.json b/2021/21xxx/CVE-2021-21170.json index 20c94ecbcb3..969b16e472b 100644 --- a/2021/21xxx/CVE-2021-21170.json +++ b/2021/21xxx/CVE-2021-21170.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21170", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incorrect security UI" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1111646" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect security UI in Loader in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21171.json b/2021/21xxx/CVE-2021-21171.json index 59042167f8d..4ce39eee3b2 100644 --- a/2021/21xxx/CVE-2021-21171.json +++ b/2021/21xxx/CVE-2021-21171.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21171", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incorrect security UI" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1152894" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect security UI in TabStrip and Navigation in Google Chrome on Android prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21172.json b/2021/21xxx/CVE-2021-21172.json index 297f759bab7..6f75bd54c85 100644 --- a/2021/21xxx/CVE-2021-21172.json +++ b/2021/21xxx/CVE-2021-21172.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21172", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1150810" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 89.0.4389.72 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21173.json b/2021/21xxx/CVE-2021-21173.json index a5273355bf2..791842eb354 100644 --- a/2021/21xxx/CVE-2021-21173.json +++ b/2021/21xxx/CVE-2021-21173.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21173", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Side-channel information leakage" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1154250" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Side-channel information leakage in Network Internals in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21174.json b/2021/21xxx/CVE-2021-21174.json index 5be6c8514c5..9239b981549 100644 --- a/2021/21xxx/CVE-2021-21174.json +++ b/2021/21xxx/CVE-2021-21174.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21174", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inappropriate implementation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1158010" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inappropriate implementation in Referrer in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21175.json b/2021/21xxx/CVE-2021-21175.json index 5c71acfe879..47d6609ff95 100644 --- a/2021/21xxx/CVE-2021-21175.json +++ b/2021/21xxx/CVE-2021-21175.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21175", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inappropriate implementation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1146651" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inappropriate implementation in Site isolation in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21176.json b/2021/21xxx/CVE-2021-21176.json index 6cc13ba6575..90b7f23e2f5 100644 --- a/2021/21xxx/CVE-2021-21176.json +++ b/2021/21xxx/CVE-2021-21176.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21176", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inappropriate implementation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1170584" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inappropriate implementation in full screen mode in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21177.json b/2021/21xxx/CVE-2021-21177.json index e43f1bc278f..3b9eb60dbc8 100644 --- a/2021/21xxx/CVE-2021-21177.json +++ b/2021/21xxx/CVE-2021-21177.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21177", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1173879" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in Autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21178.json b/2021/21xxx/CVE-2021-21178.json index ea4f77b216d..1422e34695c 100644 --- a/2021/21xxx/CVE-2021-21178.json +++ b/2021/21xxx/CVE-2021-21178.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21178", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inappropriate implementation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1174186" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inappropriate implementation in Compositing in Google Chrome on Linux and Windows prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21179.json b/2021/21xxx/CVE-2021-21179.json index 548093c651a..7c899f86571 100644 --- a/2021/21xxx/CVE-2021-21179.json +++ b/2021/21xxx/CVE-2021-21179.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21179", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1174943" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in Network Internals in Google Chrome on Linux prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21180.json b/2021/21xxx/CVE-2021-21180.json index 40cbfb66bc8..32ad0d333b4 100644 --- a/2021/21xxx/CVE-2021-21180.json +++ b/2021/21xxx/CVE-2021-21180.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21180", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1175507" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21181.json b/2021/21xxx/CVE-2021-21181.json index d3959b602cc..e14bca4571a 100644 --- a/2021/21xxx/CVE-2021-21181.json +++ b/2021/21xxx/CVE-2021-21181.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21181", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Side-channel information leakage" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1182767" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21182.json b/2021/21xxx/CVE-2021-21182.json index 5bc4adbac31..c2f3fb1bc38 100644 --- a/2021/21xxx/CVE-2021-21182.json +++ b/2021/21xxx/CVE-2021-21182.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21182", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1049265" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in navigations in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21183.json b/2021/21xxx/CVE-2021-21183.json index f51de90a457..9ba649f9733 100644 --- a/2021/21xxx/CVE-2021-21183.json +++ b/2021/21xxx/CVE-2021-21183.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21183", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inappropriate implementation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1105875" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21184.json b/2021/21xxx/CVE-2021-21184.json index 75c166d9c3e..382cc8bb8bf 100644 --- a/2021/21xxx/CVE-2021-21184.json +++ b/2021/21xxx/CVE-2021-21184.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21184", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Inappropriate implementation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1131929" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21185.json b/2021/21xxx/CVE-2021-21185.json index 8897b886cf8..b8afb1d674d 100644 --- a/2021/21xxx/CVE-2021-21185.json +++ b/2021/21xxx/CVE-2021-21185.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21185", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1100748" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in extensions in Google Chrome prior to 89.0.4389.72 allowed an attacker who convinced a user to install a malicious extension to obtain sensitive information via a crafted Chrome Extension." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21186.json b/2021/21xxx/CVE-2021-21186.json index 9abcc506771..4e43107d072 100644 --- a/2021/21xxx/CVE-2021-21186.json +++ b/2021/21xxx/CVE-2021-21186.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21186", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1153445" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in QR scanning in Google Chrome on iOS prior to 89.0.4389.72 allowed an attacker who convinced the user to scan a QR code to bypass navigation restrictions via a crafted QR code." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21187.json b/2021/21xxx/CVE-2021-21187.json index 249a258afa1..0124c1b63e1 100644 --- a/2021/21xxx/CVE-2021-21187.json +++ b/2021/21xxx/CVE-2021-21187.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21187", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient data validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1155516" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient data validation in URL formatting in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21188.json b/2021/21xxx/CVE-2021-21188.json index 4f067525474..c12f4895314 100644 --- a/2021/21xxx/CVE-2021-21188.json +++ b/2021/21xxx/CVE-2021-21188.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21188", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1161739" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21189.json b/2021/21xxx/CVE-2021-21189.json index c835a999576..b8f422343fd 100644 --- a/2021/21xxx/CVE-2021-21189.json +++ b/2021/21xxx/CVE-2021-21189.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21189", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insufficient policy enforcement" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1165392" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient policy enforcement in payments in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21190.json b/2021/21xxx/CVE-2021-21190.json index a6c7f844460..d7571bebaf2 100644 --- a/2021/21xxx/CVE-2021-21190.json +++ b/2021/21xxx/CVE-2021-21190.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21190", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.72", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uninitialized Use" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1166091" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Uninitialized data in PDFium in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file." } ] } -} \ No newline at end of file +} From 3b7cd968968020e9087654ff03e5dca5ddad85c8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 18:00:45 +0000 Subject: [PATCH 205/845] "-Synchronized-Data." --- 2006/6xxx/CVE-2006-6576.json | 5 +++ 2014/1xxx/CVE-2014-1520.json | 5 +++ 2018/17xxx/CVE-2018-17254.json | 5 +++ 2020/25xxx/CVE-2020-25639.json | 2 +- 2020/27xxx/CVE-2020-27216.json | 5 +++ 2020/28xxx/CVE-2020-28150.json | 56 ++++++++++++++++++++++++++++++---- 2020/29xxx/CVE-2020-29134.json | 2 +- 2020/7xxx/CVE-2020-7200.json | 5 +++ 2021/20xxx/CVE-2021-20241.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20243.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20253.json | 50 ++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20262.json | 50 ++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20263.json | 55 +++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20268.json | 55 +++++++++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21159.json | 13 +++++--- 2021/21xxx/CVE-2021-21160.json | 13 +++++--- 2021/21xxx/CVE-2021-21161.json | 13 +++++--- 2021/21xxx/CVE-2021-21162.json | 13 +++++--- 2021/21xxx/CVE-2021-21163.json | 13 +++++--- 2021/21xxx/CVE-2021-21164.json | 13 +++++--- 2021/21xxx/CVE-2021-21165.json | 13 +++++--- 2021/21xxx/CVE-2021-21166.json | 13 +++++--- 2021/21xxx/CVE-2021-21167.json | 13 +++++--- 2021/21xxx/CVE-2021-21168.json | 13 +++++--- 2021/21xxx/CVE-2021-21169.json | 13 +++++--- 2021/21xxx/CVE-2021-21170.json | 13 +++++--- 2021/21xxx/CVE-2021-21171.json | 13 +++++--- 2021/21xxx/CVE-2021-21172.json | 13 +++++--- 2021/21xxx/CVE-2021-21173.json | 13 +++++--- 2021/21xxx/CVE-2021-21174.json | 13 +++++--- 2021/21xxx/CVE-2021-21175.json | 13 +++++--- 2021/21xxx/CVE-2021-21176.json | 13 +++++--- 2021/21xxx/CVE-2021-21177.json | 13 +++++--- 2021/21xxx/CVE-2021-21178.json | 13 +++++--- 2021/21xxx/CVE-2021-21179.json | 13 +++++--- 2021/21xxx/CVE-2021-21180.json | 13 +++++--- 2021/21xxx/CVE-2021-21181.json | 13 +++++--- 2021/21xxx/CVE-2021-21182.json | 13 +++++--- 2021/21xxx/CVE-2021-21183.json | 13 +++++--- 2021/21xxx/CVE-2021-21184.json | 13 +++++--- 2021/21xxx/CVE-2021-21185.json | 13 +++++--- 2021/21xxx/CVE-2021-21186.json | 13 +++++--- 2021/21xxx/CVE-2021-21187.json | 13 +++++--- 2021/21xxx/CVE-2021-21188.json | 13 +++++--- 2021/21xxx/CVE-2021-21189.json | 13 +++++--- 2021/21xxx/CVE-2021-21190.json | 13 +++++--- 2021/24xxx/CVE-2021-24091.json | 5 +++ 2021/3xxx/CVE-2021-3426.json | 18 +++++++++++ 48 files changed, 690 insertions(+), 154 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3426.json diff --git a/2006/6xxx/CVE-2006-6576.json b/2006/6xxx/CVE-2006-6576.json index 572c7604e2c..8a2f10864f0 100644 --- a/2006/6xxx/CVE-2006-6576.json +++ b/2006/6xxx/CVE-2006-6576.json @@ -81,6 +81,11 @@ "name": "16036", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/16036" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161711/Golden-FTP-Server-4.70-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/161711/Golden-FTP-Server-4.70-Buffer-Overflow.html" } ] } diff --git a/2014/1xxx/CVE-2014-1520.json b/2014/1xxx/CVE-2014-1520.json index 277976d1e9b..4631e7d3dd2 100644 --- a/2014/1xxx/CVE-2014-1520.json +++ b/2014/1xxx/CVE-2014-1520.json @@ -96,6 +96,11 @@ "refsource": "FULLDISC", "name": "20210308 Unholy CRAP: Moziila's executable installers", "url": "http://seclists.org/fulldisclosure/2021/Mar/14" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161696/Mozilla-Arbitrary-Code-Execution-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/161696/Mozilla-Arbitrary-Code-Execution-Privilege-Escalation.html" } ] } diff --git a/2018/17xxx/CVE-2018-17254.json b/2018/17xxx/CVE-2018-17254.json index 79a3e91a176..d596a87221c 100644 --- a/2018/17xxx/CVE-2018-17254.json +++ b/2018/17xxx/CVE-2018-17254.json @@ -56,6 +56,11 @@ "name": "45423", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45423/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html" } ] } diff --git a/2020/25xxx/CVE-2020-25639.json b/2020/25xxx/CVE-2020-25639.json index 74b8765d8d0..420ebeb3069 100644 --- a/2020/25xxx/CVE-2020-25639.json +++ b/2020/25xxx/CVE-2020-25639.json @@ -65,7 +65,7 @@ "description_data": [ { "lang": "eng", - "value": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system." + "value": "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system." } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index ecbe2a57a74..7bf2128e535 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -430,6 +430,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210308 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210309 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/28xxx/CVE-2020-28150.json b/2020/28xxx/CVE-2020-28150.json index 10f58684b29..5d5e837fba0 100644 --- a/2020/28xxx/CVE-2020-28150.json +++ b/2020/28xxx/CVE-2020-28150.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28150", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28150", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "I-Net Software Clear Reports 20.10.136 web application accepts a user-controlled input that specifies a link to an external site, and uses the user supplied data in a Redirect." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://c41nc.co.uk/?page_id=85", + "url": "https://c41nc.co.uk/?page_id=85" } ] } diff --git a/2020/29xxx/CVE-2020-29134.json b/2020/29xxx/CVE-2020-29134.json index 01b2fbb3df1..cd67b82c321 100644 --- a/2020/29xxx/CVE-2020-29134.json +++ b/2020/29xxx/CVE-2020-29134.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "TOTVS Fluig Luke 1.7.0 allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210209, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201222, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201201,Fluig Lake 1.7.0-201124, Fluig Lake 1.7.0-201117, Fluig Lake 1.7.0-201103, Fluig Lake 1.7.0-201027, Fluig Lake 1.7.0-201020, Fluig Lake 1.7.0-201013, Fluig Lake 1.7.0-201006, Fluig Lake 1.7.0-200915, Fluig Lake 1.7.0-200907, Fluig Lake 1.7.0-200901, Fluig Lake 1.7.0-200825, Fluig Lake 1.7.0-200818, Fluig Lake 1.7.0-200804, Fluig Lake 1.7.0-200616), Fluig 1.6.5-200915, Fluig 1.6.5-200128, Fluig 1.6.5-191029, and Fluig 1.6.4-181026." + "value": "TOTVS Fluig Platform allows directory traversal via a base64 encoded in paremeter \"file=../\" to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210209, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201222, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201201,Fluig Lake 1.7.0-201124, Fluig Lake 1.7.0-201117, Fluig Lake 1.7.0-201103, Fluig Lake 1.7.0-201027, Fluig Lake 1.7.0-201020, Fluig Lake 1.7.0-201013, Fluig Lake 1.7.0-201006, Fluig Lake 1.7.0-200915, Fluig Lake 1.7.0-200907, Fluig Lake 1.7.0-200901, Fluig Lake 1.7.0-200825, Fluig Lake 1.7.0-200818, Fluig Lake 1.7.0-200804, Fluig Lake 1.7.0-200616), Fluig 1.6.5-200915, Fluig 1.6.5-200128, Fluig 1.6.5-191029, and Fluig 1.6.4-181026." } ] }, diff --git a/2020/7xxx/CVE-2020-7200.json b/2020/7xxx/CVE-2020-7200.json index 22aa06f73b9..ea49b1dd7e8 100644 --- a/2020/7xxx/CVE-2020-7200.json +++ b/2020/7xxx/CVE-2020-7200.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04068en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04068en_us" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20241.json b/2021/20xxx/CVE-2021-20241.json index 49a3ba43e25..40c6f6c4205 100644 --- a/2021/20xxx/CVE-2021-20241.json +++ b/2021/20xxx/CVE-2021-20241.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20241", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ImageMagick", + "version": { + "version_data": [ + { + "version_value": "ImageMagick 6.9.11-62, ImageMagick 7.0.10-62" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928952", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928952" + }, + { + "refsource": "MISC", + "name": "https://github.com/ImageMagick/ImageMagick/pull/3177", + "url": "https://github.com/ImageMagick/ImageMagick/pull/3177" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20243.json b/2021/20xxx/CVE-2021-20243.json index c768f184aed..8b23ab92c16 100644 --- a/2021/20xxx/CVE-2021-20243.json +++ b/2021/20xxx/CVE-2021-20243.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20243", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ImageMagick", + "version": { + "version_data": [ + { + "version_value": "ImageMagick 7.0.10-62" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928958", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928958" + }, + { + "refsource": "MISC", + "name": "https://github.com/ImageMagick/ImageMagick/pull/3193", + "url": "https://github.com/ImageMagick/ImageMagick/pull/3193" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20253.json b/2021/20xxx/CVE-2021-20253.json index e501d8a8cc0..ac937a027b4 100644 --- a/2021/20xxx/CVE-2021-20253.json +++ b/2021/20xxx/CVE-2021-20253.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20253", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ansible-tower", + "version": { + "version_data": [ + { + "version_value": "ansible-tower 3.8.2, ansible-tower 3.7.5, ansible-tower 3.6.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928847", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928847" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ansible-tower. The default installation is vulnerable to Job Isolation escape allowing an attacker to elevate the privilege from a low privileged user to the awx user from outside the isolated environment. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20262.json b/2021/20xxx/CVE-2021-20262.json index ef6ba1091dd..cc157d7f7dc 100644 --- a/2021/20xxx/CVE-2021-20262.json +++ b/2021/20xxx/CVE-2021-20262.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20262", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "keycloak", + "version": { + "version_data": [ + { + "version_value": "Keycloak 12.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1933639", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933639" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user\u2019s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20263.json b/2021/20xxx/CVE-2021-20263.json index a665d125365..093b70c4b9c 100644 --- a/2021/20xxx/CVE-2021-20263.json +++ b/2021/20xxx/CVE-2021-20263.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20263", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "QEMU", + "version": { + "version_data": [ + { + "version_value": "qemu 5.2.50" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1933668", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933668" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/03/08/1", + "url": "https://www.openwall.com/lists/oss-security/2021/03/08/1" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest." } ] } diff --git a/2021/20xxx/CVE-2021-20268.json b/2021/20xxx/CVE-2021-20268.json index 24f49adc63f..1a7a753302b 100644 --- a/2021/20xxx/CVE-2021-20268.json +++ b/2021/20xxx/CVE-2021-20268.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20268", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "kernel 5.10.10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1923816", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923816" + }, + { + "refsource": "MISC", + "name": "https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444", + "url": "https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." } ] } diff --git a/2021/21xxx/CVE-2021-21159.json b/2021/21xxx/CVE-2021-21159.json index 6adb564fa82..ea0c51a4f87 100644 --- a/2021/21xxx/CVE-2021-21159.json +++ b/2021/21xxx/CVE-2021-21159.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21159", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1171049" + "url": "https://crbug.com/1171049", + "refsource": "MISC", + "name": "https://crbug.com/1171049" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21160.json b/2021/21xxx/CVE-2021-21160.json index db6f878b2eb..8583fdb457b 100644 --- a/2021/21xxx/CVE-2021-21160.json +++ b/2021/21xxx/CVE-2021-21160.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21160", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1170531" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1170531", + "refsource": "MISC", + "name": "https://crbug.com/1170531" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21161.json b/2021/21xxx/CVE-2021-21161.json index bc82061f71c..cd12fdd407c 100644 --- a/2021/21xxx/CVE-2021-21161.json +++ b/2021/21xxx/CVE-2021-21161.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21161", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1173702" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1173702", + "refsource": "MISC", + "name": "https://crbug.com/1173702" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21162.json b/2021/21xxx/CVE-2021-21162.json index 69f10c805ee..e918671edac 100644 --- a/2021/21xxx/CVE-2021-21162.json +++ b/2021/21xxx/CVE-2021-21162.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21162", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1172054" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1172054", + "refsource": "MISC", + "name": "https://crbug.com/1172054" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21163.json b/2021/21xxx/CVE-2021-21163.json index 10bfe237620..7e7d08cca3f 100644 --- a/2021/21xxx/CVE-2021-21163.json +++ b/2021/21xxx/CVE-2021-21163.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21163", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1111239" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1111239", + "refsource": "MISC", + "name": "https://crbug.com/1111239" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21164.json b/2021/21xxx/CVE-2021-21164.json index eecac4ecf3a..05ae797d9cd 100644 --- a/2021/21xxx/CVE-2021-21164.json +++ b/2021/21xxx/CVE-2021-21164.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21164", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1164846" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1164846", + "refsource": "MISC", + "name": "https://crbug.com/1164846" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21165.json b/2021/21xxx/CVE-2021-21165.json index 2bb92801d58..dc6d745a9a5 100644 --- a/2021/21xxx/CVE-2021-21165.json +++ b/2021/21xxx/CVE-2021-21165.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21165", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1174582" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1174582", + "refsource": "MISC", + "name": "https://crbug.com/1174582" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21166.json b/2021/21xxx/CVE-2021-21166.json index e9a4871049e..0c0a402f4c4 100644 --- a/2021/21xxx/CVE-2021-21166.json +++ b/2021/21xxx/CVE-2021-21166.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21166", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1177465" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1177465", + "refsource": "MISC", + "name": "https://crbug.com/1177465" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21167.json b/2021/21xxx/CVE-2021-21167.json index e5db9e22c18..9eae4b2247f 100644 --- a/2021/21xxx/CVE-2021-21167.json +++ b/2021/21xxx/CVE-2021-21167.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21167", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1161144" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1161144", + "refsource": "MISC", + "name": "https://crbug.com/1161144" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21168.json b/2021/21xxx/CVE-2021-21168.json index 930387ce831..e8b85c071ce 100644 --- a/2021/21xxx/CVE-2021-21168.json +++ b/2021/21xxx/CVE-2021-21168.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21168", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1152226" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1152226", + "refsource": "MISC", + "name": "https://crbug.com/1152226" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21169.json b/2021/21xxx/CVE-2021-21169.json index 9eec695f4ce..74d5e71ae08 100644 --- a/2021/21xxx/CVE-2021-21169.json +++ b/2021/21xxx/CVE-2021-21169.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21169", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1166138" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1166138", + "refsource": "MISC", + "name": "https://crbug.com/1166138" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21170.json b/2021/21xxx/CVE-2021-21170.json index 969b16e472b..d2fd5333cf3 100644 --- a/2021/21xxx/CVE-2021-21170.json +++ b/2021/21xxx/CVE-2021-21170.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21170", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1111646" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1111646", + "refsource": "MISC", + "name": "https://crbug.com/1111646" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21171.json b/2021/21xxx/CVE-2021-21171.json index 4ce39eee3b2..e6f3114a4c0 100644 --- a/2021/21xxx/CVE-2021-21171.json +++ b/2021/21xxx/CVE-2021-21171.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21171", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1152894" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1152894", + "refsource": "MISC", + "name": "https://crbug.com/1152894" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21172.json b/2021/21xxx/CVE-2021-21172.json index 6f75bd54c85..67acf9337f2 100644 --- a/2021/21xxx/CVE-2021-21172.json +++ b/2021/21xxx/CVE-2021-21172.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21172", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1150810" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1150810", + "refsource": "MISC", + "name": "https://crbug.com/1150810" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21173.json b/2021/21xxx/CVE-2021-21173.json index 791842eb354..0dfa95f203f 100644 --- a/2021/21xxx/CVE-2021-21173.json +++ b/2021/21xxx/CVE-2021-21173.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21173", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1154250" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1154250", + "refsource": "MISC", + "name": "https://crbug.com/1154250" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21174.json b/2021/21xxx/CVE-2021-21174.json index 9239b981549..c3a8b14785b 100644 --- a/2021/21xxx/CVE-2021-21174.json +++ b/2021/21xxx/CVE-2021-21174.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21174", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1158010" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1158010", + "refsource": "MISC", + "name": "https://crbug.com/1158010" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21175.json b/2021/21xxx/CVE-2021-21175.json index 47d6609ff95..488c14356d2 100644 --- a/2021/21xxx/CVE-2021-21175.json +++ b/2021/21xxx/CVE-2021-21175.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21175", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1146651" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1146651", + "refsource": "MISC", + "name": "https://crbug.com/1146651" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21176.json b/2021/21xxx/CVE-2021-21176.json index 90b7f23e2f5..57075dedb6a 100644 --- a/2021/21xxx/CVE-2021-21176.json +++ b/2021/21xxx/CVE-2021-21176.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21176", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1170584" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1170584", + "refsource": "MISC", + "name": "https://crbug.com/1170584" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21177.json b/2021/21xxx/CVE-2021-21177.json index 3b9eb60dbc8..1bc30fab5e4 100644 --- a/2021/21xxx/CVE-2021-21177.json +++ b/2021/21xxx/CVE-2021-21177.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21177", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1173879" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1173879", + "refsource": "MISC", + "name": "https://crbug.com/1173879" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21178.json b/2021/21xxx/CVE-2021-21178.json index 1422e34695c..b44b68eb806 100644 --- a/2021/21xxx/CVE-2021-21178.json +++ b/2021/21xxx/CVE-2021-21178.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21178", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1174186" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1174186", + "refsource": "MISC", + "name": "https://crbug.com/1174186" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21179.json b/2021/21xxx/CVE-2021-21179.json index 7c899f86571..208a6edccef 100644 --- a/2021/21xxx/CVE-2021-21179.json +++ b/2021/21xxx/CVE-2021-21179.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21179", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1174943" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1174943", + "refsource": "MISC", + "name": "https://crbug.com/1174943" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21180.json b/2021/21xxx/CVE-2021-21180.json index 32ad0d333b4..132d317c87d 100644 --- a/2021/21xxx/CVE-2021-21180.json +++ b/2021/21xxx/CVE-2021-21180.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21180", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1175507" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1175507", + "refsource": "MISC", + "name": "https://crbug.com/1175507" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21181.json b/2021/21xxx/CVE-2021-21181.json index e14bca4571a..51dfb7bc9da 100644 --- a/2021/21xxx/CVE-2021-21181.json +++ b/2021/21xxx/CVE-2021-21181.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21181", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1182767" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1182767", + "refsource": "MISC", + "name": "https://crbug.com/1182767" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21182.json b/2021/21xxx/CVE-2021-21182.json index c2f3fb1bc38..50a05a88951 100644 --- a/2021/21xxx/CVE-2021-21182.json +++ b/2021/21xxx/CVE-2021-21182.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21182", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1049265" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1049265", + "refsource": "MISC", + "name": "https://crbug.com/1049265" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21183.json b/2021/21xxx/CVE-2021-21183.json index 9ba649f9733..5fd2215ec7a 100644 --- a/2021/21xxx/CVE-2021-21183.json +++ b/2021/21xxx/CVE-2021-21183.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21183", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1105875" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1105875", + "refsource": "MISC", + "name": "https://crbug.com/1105875" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21184.json b/2021/21xxx/CVE-2021-21184.json index 382cc8bb8bf..c0a3d8125db 100644 --- a/2021/21xxx/CVE-2021-21184.json +++ b/2021/21xxx/CVE-2021-21184.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21184", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1131929" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1131929", + "refsource": "MISC", + "name": "https://crbug.com/1131929" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21185.json b/2021/21xxx/CVE-2021-21185.json index b8afb1d674d..5e902b3258a 100644 --- a/2021/21xxx/CVE-2021-21185.json +++ b/2021/21xxx/CVE-2021-21185.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21185", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1100748" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1100748", + "refsource": "MISC", + "name": "https://crbug.com/1100748" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21186.json b/2021/21xxx/CVE-2021-21186.json index 4e43107d072..bb2984b0ea7 100644 --- a/2021/21xxx/CVE-2021-21186.json +++ b/2021/21xxx/CVE-2021-21186.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21186", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1153445" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1153445", + "refsource": "MISC", + "name": "https://crbug.com/1153445" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21187.json b/2021/21xxx/CVE-2021-21187.json index 0124c1b63e1..3e2506842fb 100644 --- a/2021/21xxx/CVE-2021-21187.json +++ b/2021/21xxx/CVE-2021-21187.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21187", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1155516" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1155516", + "refsource": "MISC", + "name": "https://crbug.com/1155516" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21188.json b/2021/21xxx/CVE-2021-21188.json index c12f4895314..40690d5187c 100644 --- a/2021/21xxx/CVE-2021-21188.json +++ b/2021/21xxx/CVE-2021-21188.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21188", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1161739" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1161739", + "refsource": "MISC", + "name": "https://crbug.com/1161739" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21189.json b/2021/21xxx/CVE-2021-21189.json index b8f422343fd..c0cd0e35bfc 100644 --- a/2021/21xxx/CVE-2021-21189.json +++ b/2021/21xxx/CVE-2021-21189.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21189", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1165392" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1165392", + "refsource": "MISC", + "name": "https://crbug.com/1165392" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21190.json b/2021/21xxx/CVE-2021-21190.json index d7571bebaf2..09bbffd5e74 100644 --- a/2021/21xxx/CVE-2021-21190.json +++ b/2021/21xxx/CVE-2021-21190.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21190", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1166091" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html" + "url": "https://crbug.com/1166091", + "refsource": "MISC", + "name": "https://crbug.com/1166091" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24091.json b/2021/24xxx/CVE-2021-24091.json index f27ee5e5ea0..9b73bfdac79 100644 --- a/2021/24xxx/CVE-2021-24091.json +++ b/2021/24xxx/CVE-2021-24091.json @@ -213,6 +213,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24091", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24091" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161713/Microsoft-Windows-WindowsCodecsRaw-COlympusE300LoadRaw-Out-Of-Bounds-Write.html", + "url": "http://packetstormsecurity.com/files/161713/Microsoft-Windows-WindowsCodecsRaw-COlympusE300LoadRaw-Out-Of-Bounds-Write.html" } ] } diff --git a/2021/3xxx/CVE-2021-3426.json b/2021/3xxx/CVE-2021-3426.json new file mode 100644 index 00000000000..09db0ad364c --- /dev/null +++ b/2021/3xxx/CVE-2021-3426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 50c038ba1a8cec10843864e27dd0f6cf3cfccecd Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 9 Mar 2021 11:08:44 -0700 Subject: [PATCH 206/845] Add CVE-2021-21369 for GHSA-qgfj-mjpc-7w3q --- 2021/21xxx/CVE-2021-21369.json | 92 +++++++++++++++++++++++++++++++--- 1 file changed, 86 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21369.json b/2021/21xxx/CVE-2021-21369.json index 5e472b4cdc6..e470d67e84e 100644 --- a/2021/21xxx/CVE-2021-21369.json +++ b/2021/21xxx/CVE-2021-21369.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21369", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Potential DoS in Besu HTTP JSON-RPC API" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "besu", + "version": { + "version_data": [ + { + "version_value": "< 1.5.1" + } + ] + } + } + ] + }, + "vendor_name": "hyperledger" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hyperledger Besu is an open-source, MainNet compatible, Ethereum client written in Java. In Besu before version 1.5.1 there is a denial-of-service vulnerability involving the HTTP JSON-RPC API service. If username and password authentication is enabled for the HTTP JSON-RPC API service, then prior to making any requests to an API endpoint the requestor must use the login endpoint to obtain a JSON web token (JWT) using their credentials. A single user can readily overload the login endpoint with invalid requests (incorrect password). As the supplied password is checked for validity on the main vertx event loop and takes a relatively long time this can cause the processing of other valid requests to fail. A valid username is required for this vulnerability to be exposed. This has been fixed in version 1.5.1." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/hyperledger/besu/security/advisories/GHSA-qgfj-mjpc-7w3q", + "refsource": "CONFIRM", + "url": "https://github.com/hyperledger/besu/security/advisories/GHSA-qgfj-mjpc-7w3q" + }, + { + "name": "https://github.com/hyperledger/besu/blob/master/CHANGELOG.md#151", + "refsource": "MISC", + "url": "https://github.com/hyperledger/besu/blob/master/CHANGELOG.md#151" + }, + { + "name": "https://github.com/hyperledger/besu/pull/1144", + "refsource": "MISC", + "url": "https://github.com/hyperledger/besu/pull/1144" + }, + { + "name": "https://github.com/hyperledger/besu/commit/06e35a58c07a30c0fbdc0aae45a3e8b06b53c022", + "refsource": "MISC", + "url": "https://github.com/hyperledger/besu/commit/06e35a58c07a30c0fbdc0aae45a3e8b06b53c022" + } + ] + }, + "source": { + "advisory": "GHSA-qgfj-mjpc-7w3q", + "discovery": "UNKNOWN" } } \ No newline at end of file From 91c7cc74483e33c61f1a99ea5cd840dc02342273 Mon Sep 17 00:00:00 2001 From: Wayne Beaton Date: Tue, 9 Mar 2021 13:12:33 -0500 Subject: [PATCH 207/845] CVE-2020-27225 Signed-off-by: Wayne Beaton --- 2020/27xxx/CVE-2020-27225.json | 54 +++++++++++++++++++++++++++++++--- 1 file changed, 50 insertions(+), 4 deletions(-) diff --git a/2020/27xxx/CVE-2020-27225.json b/2020/27xxx/CVE-2020-27225.json index 8725a365dc8..43b62b0bf9a 100644 --- a/2020/27xxx/CVE-2020-27225.json +++ b/2020/27xxx/CVE-2020-27225.json @@ -4,15 +4,61 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27225", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@eclipse.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Eclipse Foundation", + "product": { + "product_data": [ + { + "product_name": "Eclipse Platform", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "4.18" + } + + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In versions 4.18 and earlier of the Eclipse Platform, the Help Subsystem does not authenticate active help requests to the local help web server, allowing an unauthenticated local attacker to issue active help commands to the associated Eclipse Platform process or Eclipse Rich Client Platform process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306: Missing Authentication for Critical Function" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=569855", + "refsource": "CONFIRM", + "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=569855" } ] } -} \ No newline at end of file +} From fc33020a04143e67d91dae4c6a5fd3204ea1bbe3 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Tue, 9 Mar 2021 20:27:53 +0200 Subject: [PATCH 208/845] Adds CVE-2021-23352 --- 2021/23xxx/CVE-2021-23352.json | 84 ++++++++++++++++++++++++++++++++-- 1 file changed, 80 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23352.json b/2021/23xxx/CVE-2021-23352.json index bb021231212..d6a680c9427 100644 --- a/2021/23xxx/CVE-2021-23352.json +++ b/2021/23xxx/CVE-2021-23352.json @@ -3,16 +3,92 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-09T18:27:51.463518Z", "ID": "CVE-2021-23352", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Command Injection" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "madge", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.0.1" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-MADGE-1082875" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/pahen/madge/blob/master/lib/graph.js%23L27" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects the package madge before 4.0.1.\n It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.\r\n\r\n\r\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Alessio Della Libera (d3lla)" + } + ] } \ No newline at end of file From f9fc1d021756100040599e0e51d9f8420b109592 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Tue, 9 Mar 2021 20:28:16 +0200 Subject: [PATCH 209/845] Adds CVE-2021-23353 --- 2021/23xxx/CVE-2021-23353.json | 100 +++++++++++++++++++++++++++++++-- 1 file changed, 96 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23353.json b/2021/23xxx/CVE-2021-23353.json index 9b5d408d4f1..fd0056325e7 100644 --- a/2021/23xxx/CVE-2021-23353.json +++ b/2021/23xxx/CVE-2021-23353.json @@ -3,16 +3,108 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-09T18:28:14.491454Z", "ID": "CVE-2021-23353", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Regular Expression Denial of Service (ReDoS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "jspdf", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2.3.1" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Regular Expression Denial of Service (ReDoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-JSPDF-1073626" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288" + }, + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/MrRio/jsPDF/pull/3091" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects the package jspdf before 2.3.1.\n ReDoS is possible via the addImage function.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:R", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Yeting Li" + } + ] } \ No newline at end of file From ac741c64b3ae0af591c82767a17d0cfbbdb56b99 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 9 Mar 2021 11:32:23 -0700 Subject: [PATCH 210/845] Add CVE-2021-21295 for GHSA-wm47-8v5p-wjpj --- 2021/21xxx/CVE-2021-21295.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index bec46c333e5..29e0e49417c 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21295", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Possible request smuggling in HTTP/2 due missing validation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "io.netty:netty-codec-http2", + "version": { + "version_data": [ + { + "version_value": "< 4.1.60.Final" + } + ] + } + } + ] + }, + "vendor_name": "netty" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj", + "refsource": "CONFIRM", + "url": "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj" + }, + { + "name": "https://github.com/Netflix/zuul/pull/980", + "refsource": "MISC", + "url": "https://github.com/Netflix/zuul/pull/980" + }, + { + "name": "https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4", + "refsource": "MISC", + "url": "https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4" + } + ] + }, + "source": { + "advisory": "GHSA-wm47-8v5p-wjpj", + "discovery": "UNKNOWN" } } \ No newline at end of file From 3acc3969aa9098b94f300c3e3ec93ed06131665c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 19:00:46 +0000 Subject: [PATCH 211/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35451.json | 5 ++++ 2021/20xxx/CVE-2021-20244.json | 55 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20245.json | 55 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20246.json | 50 +++++++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21369.json | 2 +- 5 files changed, 157 insertions(+), 10 deletions(-) diff --git a/2020/35xxx/CVE-2020-35451.json b/2020/35xxx/CVE-2020-35451.json index e3b08ee7bf7..6cceb28b305 100644 --- a/2020/35xxx/CVE-2020-35451.json +++ b/2020/35xxx/CVE-2020-35451.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[oozie-user] 20210309 CVE-2020-35451: Oozie local privilege escalation", "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5@%3Cuser.oozie.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210309 CVE-2020-35451: Oozie local privilege escalation", + "url": "http://www.openwall.com/lists/oss-security/2021/03/09/2" } ] }, diff --git a/2021/20xxx/CVE-2021-20244.json b/2021/20xxx/CVE-2021-20244.json index f87f174a4b6..a5a69c0dbbc 100644 --- a/2021/20xxx/CVE-2021-20244.json +++ b/2021/20xxx/CVE-2021-20244.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20244", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ImageMagick", + "version": { + "version_data": [ + { + "version_value": "ImageMagick 7.0.10-62" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928959", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928959" + }, + { + "refsource": "MISC", + "name": "https://github.com/ImageMagick/ImageMagick/pull/3194", + "url": "https://github.com/ImageMagick/ImageMagick/pull/3194" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20245.json b/2021/20xxx/CVE-2021-20245.json index 173c088ec23..cacf8f55627 100644 --- a/2021/20xxx/CVE-2021-20245.json +++ b/2021/20xxx/CVE-2021-20245.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20245", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ImageMagick", + "version": { + "version_data": [ + { + "version_value": "ImageMagick 6.9.11-62, ImageMagick 7.0.10-62" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943" + }, + { + "refsource": "MISC", + "name": "https://github.com/ImageMagick/ImageMagick/issues/3176", + "url": "https://github.com/ImageMagick/ImageMagick/issues/3176" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20246.json b/2021/20xxx/CVE-2021-20246.json index 5d6051a87f7..5043e06f11c 100644 --- a/2021/20xxx/CVE-2021-20246.json +++ b/2021/20xxx/CVE-2021-20246.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20246", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ImageMagick", + "version": { + "version_data": [ + { + "version_value": "ImageMagick 6.9.11-62, ImageMagick 7.0.10-62" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928941", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928941" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/21xxx/CVE-2021-21369.json b/2021/21xxx/CVE-2021-21369.json index e470d67e84e..1ccf8cce8c6 100644 --- a/2021/21xxx/CVE-2021-21369.json +++ b/2021/21xxx/CVE-2021-21369.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Hyperledger Besu is an open-source, MainNet compatible, Ethereum client written in Java. In Besu before version 1.5.1 there is a denial-of-service vulnerability involving the HTTP JSON-RPC API service. If username and password authentication is enabled for the HTTP JSON-RPC API service, then prior to making any requests to an API endpoint the requestor must use the login endpoint to obtain a JSON web token (JWT) using their credentials. A single user can readily overload the login endpoint with invalid requests (incorrect password). As the supplied password is checked for validity on the main vertx event loop and takes a relatively long time this can cause the processing of other valid requests to fail. A valid username is required for this vulnerability to be exposed. This has been fixed in version 1.5.1." + "value": "Hyperledger Besu is an open-source, MainNet compatible, Ethereum client written in Java. In Besu before version 1.5.1 there is a denial-of-service vulnerability involving the HTTP JSON-RPC API service. If username and password authentication is enabled for the HTTP JSON-RPC API service, then prior to making any requests to an API endpoint the requestor must use the login endpoint to obtain a JSON web token (JWT) using their credentials. A single user can readily overload the login endpoint with invalid requests (incorrect password). As the supplied password is checked for validity on the main vertx event loop and takes a relatively long time this can cause the processing of other valid requests to fail. A valid username is required for this vulnerability to be exposed. This has been fixed in version 1.5.1." } ] }, From afdd02b15000b6f1ad146728389a66e253cfa35a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 19:01:01 +0000 Subject: [PATCH 212/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21295.json | 2 +- 2021/23xxx/CVE-2021-23352.json | 17 +++++++++------- 2021/23xxx/CVE-2021-23353.json | 37 ++++++++++++++++++++-------------- 2021/28xxx/CVE-2021-28099.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28100.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28101.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28102.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28103.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28104.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28105.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28106.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28107.json | 18 +++++++++++++++++ 2021/28xxx/CVE-2021-28108.json | 18 +++++++++++++++++ 13 files changed, 213 insertions(+), 23 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28099.json create mode 100644 2021/28xxx/CVE-2021-28100.json create mode 100644 2021/28xxx/CVE-2021-28101.json create mode 100644 2021/28xxx/CVE-2021-28102.json create mode 100644 2021/28xxx/CVE-2021-28103.json create mode 100644 2021/28xxx/CVE-2021-28104.json create mode 100644 2021/28xxx/CVE-2021-28105.json create mode 100644 2021/28xxx/CVE-2021-28106.json create mode 100644 2021/28xxx/CVE-2021-28107.json create mode 100644 2021/28xxx/CVE-2021-28108.json diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index 29e0e49417c..aa3ae257bf2 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`." + "value": "Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`." } ] }, diff --git a/2021/23xxx/CVE-2021-23352.json b/2021/23xxx/CVE-2021-23352.json index d6a680c9427..0535641408a 100644 --- a/2021/23xxx/CVE-2021-23352.json +++ b/2021/23xxx/CVE-2021-23352.json @@ -48,16 +48,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-MADGE-1082875" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-MADGE-1082875", + "name": "https://snyk.io/vuln/SNYK-JS-MADGE-1082875" }, { - "refsource": "CONFIRM", - "url": "https://github.com/pahen/madge/blob/master/lib/graph.js%23L27" + "refsource": "MISC", + "url": "https://github.com/pahen/madge/blob/master/lib/graph.js%23L27", + "name": "https://github.com/pahen/madge/blob/master/lib/graph.js%23L27" }, { - "refsource": "CONFIRM", - "url": "https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332" + "refsource": "MISC", + "url": "https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332", + "name": "https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332" } ] }, @@ -65,7 +68,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects the package madge before 4.0.1.\n It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.\r\n\r\n\r\n" + "value": "This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function." } ] }, diff --git a/2021/23xxx/CVE-2021-23353.json b/2021/23xxx/CVE-2021-23353.json index fd0056325e7..81bb47164ac 100644 --- a/2021/23xxx/CVE-2021-23353.json +++ b/2021/23xxx/CVE-2021-23353.json @@ -48,32 +48,39 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-JSPDF-1073626" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-JSPDF-1073626", + "name": "https://snyk.io/vuln/SNYK-JS-JSPDF-1073626" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288" }, { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289", + "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289" }, { - "refsource": "CONFIRM", - "url": "https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e" + "refsource": "MISC", + "url": "https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e", + "name": "https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e" }, { - "refsource": "CONFIRM", - "url": "https://github.com/MrRio/jsPDF/pull/3091" + "refsource": "MISC", + "url": "https://github.com/MrRio/jsPDF/pull/3091", + "name": "https://github.com/MrRio/jsPDF/pull/3091" } ] }, @@ -81,7 +88,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects the package jspdf before 2.3.1.\n ReDoS is possible via the addImage function.\n" + "value": "This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function." } ] }, diff --git a/2021/28xxx/CVE-2021-28099.json b/2021/28xxx/CVE-2021-28099.json new file mode 100644 index 00000000000..d4e35ada7a6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28099.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28099", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28100.json b/2021/28xxx/CVE-2021-28100.json new file mode 100644 index 00000000000..eaf9da69129 --- /dev/null +++ b/2021/28xxx/CVE-2021-28100.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28100", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28101.json b/2021/28xxx/CVE-2021-28101.json new file mode 100644 index 00000000000..2efb60d90f7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28101.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28101", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28102.json b/2021/28xxx/CVE-2021-28102.json new file mode 100644 index 00000000000..9ff11075f34 --- /dev/null +++ b/2021/28xxx/CVE-2021-28102.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28102", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28103.json b/2021/28xxx/CVE-2021-28103.json new file mode 100644 index 00000000000..c8b730c8fef --- /dev/null +++ b/2021/28xxx/CVE-2021-28103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28104.json b/2021/28xxx/CVE-2021-28104.json new file mode 100644 index 00000000000..fb36518b5ce --- /dev/null +++ b/2021/28xxx/CVE-2021-28104.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28104", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28105.json b/2021/28xxx/CVE-2021-28105.json new file mode 100644 index 00000000000..999437e22f5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28105.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28105", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28106.json b/2021/28xxx/CVE-2021-28106.json new file mode 100644 index 00000000000..cff72e763e1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28106.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28106", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28107.json b/2021/28xxx/CVE-2021-28107.json new file mode 100644 index 00000000000..cf4fb2bd987 --- /dev/null +++ b/2021/28xxx/CVE-2021-28107.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28107", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28108.json b/2021/28xxx/CVE-2021-28108.json new file mode 100644 index 00000000000..67b2b08953c --- /dev/null +++ b/2021/28xxx/CVE-2021-28108.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28108", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a439318c15cd8485553ee5d5b060b744974e15f7 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Tue, 9 Mar 2021 12:32:16 -0700 Subject: [PATCH 213/845] Add CVE-2021-21300 for GHSA-8prw-h3cq-mghm --- 2021/21xxx/CVE-2021-21300.json | 136 +++++++++++++++++++++++++++++++-- 1 file changed, 130 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21300.json b/2021/21xxx/CVE-2021-21300.json index 77fb7413c97..aa2dfae3192 100644 --- a/2021/21xxx/CVE-2021-21300.json +++ b/2021/21xxx/CVE-2021-21300.json @@ -1,18 +1,142 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21300", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "malicious repositories can execute remote code while cloning" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "git", + "version": { + "version_data": [ + { + "version_value": ">= 2.14.2, < 2.17.62.17.6" + }, + { + "version_value": ">= 2.18.0, < 2.18.5" + }, + { + "version_value": ">= 2.19.0, < 2.19.6" + }, + { + "version_value": ">= 2.20.0, < 2.20.5" + }, + { + "version_value": ">= 2.21.0, < 2.21.4" + }, + { + "version_value": ">= 2.22.0, < 2.22.5" + }, + { + "version_value": ">= 2.23.0, < 2.23.4" + }, + { + "version_value": ">= 2.24.0, < 2.24.4" + }, + { + "version_value": ">= 2.25.0, < 2.25.5" + }, + { + "version_value": ">= 2.26.0, < 2.26.3" + }, + { + "version_value": ">= 2.27.0, < 2.27.1" + }, + { + "version_value": ">= 2.28.0, < 2.28.1" + }, + { + "version_value": ">= 2.29.0, < 2.29.3" + }, + { + "version_value": ">= 2.30.0, < 2.30.1" + } + ] + } + } + ] + }, + "vendor_name": "git" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6. \n\n\n\n\n" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-59 Improper Link Resolution Before File Access ('Link Following')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm", + "refsource": "CONFIRM", + "url": "https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm" + }, + { + "name": "https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/", + "refsource": "MISC", + "url": "https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/" + }, + { + "name": "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks", + "refsource": "MISC", + "url": "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks" + }, + { + "name": "https://git-scm.com/docs/gitattributes#_filter", + "refsource": "MISC", + "url": "https://git-scm.com/docs/gitattributes#_filter" + }, + { + "name": "https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592", + "refsource": "MISC", + "url": "https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592" + } + ] + }, + "source": { + "advisory": "GHSA-8prw-h3cq-mghm", + "discovery": "UNKNOWN" } } \ No newline at end of file From cbff0f24a6e21a6d7eb07cffa4efbf3ff22f4adf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 20:00:52 +0000 Subject: [PATCH 214/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 5 +++ 2020/28xxx/CVE-2020-28952.json | 66 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35521.json | 50 ++++++++++++++++++++++++-- 2020/35xxx/CVE-2020-35522.json | 50 ++++++++++++++++++++++++-- 2020/35xxx/CVE-2020-35523.json | 60 +++++++++++++++++++++++++++++-- 2020/35xxx/CVE-2020-35524.json | 60 +++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20255.json | 60 +++++++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21300.json | 2 +- 2021/28xxx/CVE-2021-28109.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28110.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3411.json | 55 ++++++++++++++++++++++++++-- 11 files changed, 419 insertions(+), 25 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28109.json create mode 100644 2021/28xxx/CVE-2021-28110.json diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index e0d08d47560..04756e0c68d 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -244,6 +244,11 @@ "refsource": "MLIST", "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on a change in pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", "url": "https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] arshadmohammad commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2020/28xxx/CVE-2020-28952.json b/2020/28xxx/CVE-2020-28952.json index 3537309b053..8962124bb78 100644 --- a/2020/28xxx/CVE-2020-28952.json +++ b/2020/28xxx/CVE-2020-28952.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28952", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28952", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on Athom Homey and Homey Pro devices before 5.0.0. ZigBee hub devices should generate a unique Standard Network Key that is then exchanged with all enrolled devices so that all inter-device communication is encrypted. However, the cited Athom products use another widely known key that is designed for testing purposes: \"01030507090b0d0f00020406080a0c0d\" (the decimal equivalent of 1 3 5 7 9 11 13 15 0 2 4 6 8 10 12 13), which is human generated and static across all issued devices." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://developer.athom.com/firmware", + "refsource": "MISC", + "name": "https://developer.athom.com/firmware" + }, + { + "url": "https://homey.app/en-us/", + "refsource": "MISC", + "name": "https://homey.app/en-us/" + }, + { + "refsource": "MISC", + "name": "https://yougottahackthat.com/blog/1260/athom-homey-security-static-and-well-known-keys-cve-2020-28952", + "url": "https://yougottahackthat.com/blog/1260/athom-homey-security-static-and-well-known-keys-cve-2020-28952" } ] } diff --git a/2020/35xxx/CVE-2020-35521.json b/2020/35xxx/CVE-2020-35521.json index 5b04d64f77e..c9570c793a8 100644 --- a/2020/35xxx/CVE-2020-35521.json +++ b/2020/35xxx/CVE-2020-35521.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35521", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "libtiff", + "version": { + "version_data": [ + { + "version_value": "libtiff 4.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932034", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932034" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service." } ] } diff --git a/2020/35xxx/CVE-2020-35522.json b/2020/35xxx/CVE-2020-35522.json index 2f007a6518a..abbbdb64ec9 100644 --- a/2020/35xxx/CVE-2020-35522.json +++ b/2020/35xxx/CVE-2020-35522.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35522", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "libtiff", + "version": { + "version_data": [ + { + "version_value": "libtiff 4.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932037", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932037" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In LibTIFF, there is a memory malloc failure in tif_pixarlog.c. A crafted TIFF document can lead to an abort, resulting in a remote denial of service attack." } ] } diff --git a/2020/35xxx/CVE-2020-35523.json b/2020/35xxx/CVE-2020-35523.json index 80cf8725213..643976ac219 100644 --- a/2020/35xxx/CVE-2020-35523.json +++ b/2020/35xxx/CVE-2020-35523.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35523", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "libtiff", + "version": { + "version_data": [ + { + "version_value": "libtiff 4.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2", + "url": "https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/160", + "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/160" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932040", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932040" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." } ] } diff --git a/2020/35xxx/CVE-2020-35524.json b/2020/35xxx/CVE-2020-35524.json index 18232194a67..489885c57d4 100644 --- a/2020/35xxx/CVE-2020-35524.json +++ b/2020/35xxx/CVE-2020-35524.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-35524", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "libtiff", + "version": { + "version_data": [ + { + "version_value": "libtiff 4.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22", + "url": "https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/159", + "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/159" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932044", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932044" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." } ] } diff --git a/2021/20xxx/CVE-2021-20255.json b/2021/20xxx/CVE-2021-20255.json index 295e0b2f8c6..174cffc79c7 100644 --- a/2021/20xxx/CVE-2021-20255.json +++ b/2021/20xxx/CVE-2021-20255.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20255", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "QEMU", + "version": { + "version_data": [ + { + "version_value": "all versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-835" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1930646", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930646" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/02/25/1", + "url": "https://www.openwall.com/lists/oss-security/2021/02/25/1" + }, + { + "refsource": "MISC", + "name": "https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Feepro100_stackoverflow1", + "url": "https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Feepro100_stackoverflow1" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/21xxx/CVE-2021-21300.json b/2021/21xxx/CVE-2021-21300.json index aa2dfae3192..9b21e08edd7 100644 --- a/2021/21xxx/CVE-2021-21300.json +++ b/2021/21xxx/CVE-2021-21300.json @@ -74,7 +74,7 @@ "description_data": [ { "lang": "eng", - "value": "Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6. \n\n\n\n\n" + "value": "Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6." } ] }, diff --git a/2021/28xxx/CVE-2021-28109.json b/2021/28xxx/CVE-2021-28109.json new file mode 100644 index 00000000000..b4a562adca6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28109.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28109", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28110.json b/2021/28xxx/CVE-2021-28110.json new file mode 100644 index 00000000000..185353238c6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28110.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28110", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3411.json b/2021/3xxx/CVE-2021-3411.json index 676c22f64ba..4eebb217a0b 100644 --- a/2021/3xxx/CVE-2021-3411.json +++ b/2021/3xxx/CVE-2021-3411.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3411", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Linux kernel", + "version": { + "version_data": [ + { + "version_value": "Linux kernel 5.10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928236", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928236" + }, + { + "refsource": "MISC", + "name": "http://blog.pi3.com.pl/?p=831", + "url": "http://blog.pi3.com.pl/?p=831" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } From a754597afd6054ed922e5f0e7d0ff310297d147c Mon Sep 17 00:00:00 2001 From: Denny Page Date: Tue, 9 Mar 2021 12:29:34 -0800 Subject: [PATCH 215/845] Add TIBCO-2021-060 --- 2021/23xxx/CVE-2021-23273.json | 243 ++++++++++++++++++++++++++++++--- 1 file changed, 226 insertions(+), 17 deletions(-) diff --git a/2021/23xxx/CVE-2021-23273.json b/2021/23xxx/CVE-2021-23273.json index a88c0554182..ce667bfb2ad 100644 --- a/2021/23xxx/CVE-2021-23273.json +++ b/2021/23xxx/CVE-2021-23273.json @@ -1,18 +1,227 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-23273", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2021-03-09T17:00:00Z", + "ID": "CVE-2021-23273", + "STATE": "PUBLIC", + "TITLE": "TIBCO Spotfire Cross Site Scripting Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "TIBCO Spotfire Analyst", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.3.3" + }, + { + "version_affected": "=", + "version_value": "10.10.0" + }, + { + "version_affected": "=", + "version_value": "10.10.1" + }, + { + "version_affected": "=", + "version_value": "10.10.2" + }, + { + "version_affected": "=", + "version_value": "10.7.0" + }, + { + "version_affected": "=", + "version_value": "10.8.0" + }, + { + "version_affected": "=", + "version_value": "10.9.0" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Desktop", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.3.3" + }, + { + "version_affected": "=", + "version_value": "10.10.0" + }, + { + "version_affected": "=", + "version_value": "10.10.1" + }, + { + "version_affected": "=", + "version_value": "10.10.2" + }, + { + "version_affected": "=", + "version_value": "10.7.0" + }, + { + "version_affected": "=", + "version_value": "10.8.0" + }, + { + "version_affected": "=", + "version_value": "10.9.0" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Server", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.3.11" + }, + { + "version_affected": "=", + "version_value": "10.10.0" + }, + { + "version_affected": "=", + "version_value": "10.10.1" + }, + { + "version_affected": "=", + "version_value": "10.10.2" + }, + { + "version_affected": "=", + "version_value": "10.10.3" + }, + { + "version_affected": "=", + "version_value": "10.7.0" + }, + { + "version_affected": "=", + "version_value": "10.8.0" + }, + { + "version_affected": "=", + "version_value": "10.8.1" + }, + { + "version_affected": "=", + "version_value": "10.9.0" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0.\n" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.tibco.com/services/support/advisories", + "refsource": "CONFIRM", + "url": "http://www.tibco.com/services/support/advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher" + } + ], + "source": { + "discovery": "INTERNAL" + } +} From 80eb71e0e604d2f6c65587ea2d99a9477e9d2ef5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 21:00:54 +0000 Subject: [PATCH 216/845] "-Synchronized-Data." --- 2019/19xxx/CVE-2019-19318.json | 5 + 2019/19xxx/CVE-2019-19813.json | 5 + 2019/19xxx/CVE-2019-19816.json | 5 + 2020/27xxx/CVE-2020-27825.json | 5 + 2020/28xxx/CVE-2020-28374.json | 5 + 2020/29xxx/CVE-2020-29568.json | 5 + 2020/29xxx/CVE-2020-29569.json | 5 + 2020/29xxx/CVE-2020-29660.json | 5 + 2020/29xxx/CVE-2020-29661.json | 5 + 2020/36xxx/CVE-2020-36158.json | 5 + 2020/5xxx/CVE-2020-5258.json | 5 + 2021/20xxx/CVE-2021-20272.json | 5 + 2021/20xxx/CVE-2021-20273.json | 5 + 2021/20xxx/CVE-2021-20275.json | 5 + 2021/20xxx/CVE-2021-20276.json | 5 + 2021/23xxx/CVE-2021-23273.json | 452 ++++++++++++++++----------------- 2021/26xxx/CVE-2021-26930.json | 5 + 2021/26xxx/CVE-2021-26931.json | 5 + 2021/26xxx/CVE-2021-26932.json | 5 + 2021/27xxx/CVE-2021-27363.json | 5 + 2021/27xxx/CVE-2021-27364.json | 5 + 2021/27xxx/CVE-2021-27365.json | 5 + 2021/28xxx/CVE-2021-28038.json | 5 + 2021/28xxx/CVE-2021-28111.json | 18 ++ 2021/28xxx/CVE-2021-28112.json | 18 ++ 2021/3xxx/CVE-2021-3178.json | 5 + 2021/3xxx/CVE-2021-3347.json | 5 + 27 files changed, 382 insertions(+), 226 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28111.json create mode 100644 2021/28xxx/CVE-2021-28112.json diff --git a/2019/19xxx/CVE-2019-19318.json b/2019/19xxx/CVE-2019-19318.json index 22b33b7c130..91792ac4697 100644 --- a/2019/19xxx/CVE-2019-19318.json +++ b/2019/19xxx/CVE-2019-19318.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-4414-1", "url": "https://usn.ubuntu.com/4414-1/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2019/19xxx/CVE-2019-19813.json b/2019/19xxx/CVE-2019-19813.json index ac92bb2c88a..49e6abe210d 100644 --- a/2019/19xxx/CVE-2019-19813.json +++ b/2019/19xxx/CVE-2019-19813.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2019/19xxx/CVE-2019-19816.json b/2019/19xxx/CVE-2019-19816.json index 0fc559fd382..2e8cfd13a0a 100644 --- a/2019/19xxx/CVE-2019-19816.json +++ b/2019/19xxx/CVE-2019-19816.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2020/27xxx/CVE-2020-27825.json b/2020/27xxx/CVE-2020-27825.json index fb79fd98aed..03c0fbd43ce 100644 --- a/2020/27xxx/CVE-2020-27825.json +++ b/2020/27xxx/CVE-2020-27825.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] }, diff --git a/2020/28xxx/CVE-2020-28374.json b/2020/28xxx/CVE-2020-28374.json index 522c9119486..6baa45d1898 100644 --- a/2020/28xxx/CVE-2020-28374.json +++ b/2020/28xxx/CVE-2020-28374.json @@ -121,6 +121,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0002/", "url": "https://security.netapp.com/advisory/ntap-20210219-0002/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2020/29xxx/CVE-2020-29568.json b/2020/29xxx/CVE-2020-29568.json index 4e2ff85dbef..7963f029078 100644 --- a/2020/29xxx/CVE-2020-29568.json +++ b/2020/29xxx/CVE-2020-29568.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2020/29xxx/CVE-2020-29569.json b/2020/29xxx/CVE-2020-29569.json index 81fdef2a89b..da143876d95 100644 --- a/2020/29xxx/CVE-2020-29569.json +++ b/2020/29xxx/CVE-2020-29569.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2020/29xxx/CVE-2020-29660.json b/2020/29xxx/CVE-2020-29660.json index bc4b31887e3..625f1faf604 100644 --- a/2020/29xxx/CVE-2020-29660.json +++ b/2020/29xxx/CVE-2020-29660.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2020/29xxx/CVE-2020-29661.json b/2020/29xxx/CVE-2020-29661.json index 92dee558fa8..678f86dc36a 100644 --- a/2020/29xxx/CVE-2020-29661.json +++ b/2020/29xxx/CVE-2020-29661.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2020/36xxx/CVE-2020-36158.json b/2020/36xxx/CVE-2020-36158.json index 4a284480061..151e022d840 100644 --- a/2020/36xxx/CVE-2020-36158.json +++ b/2020/36xxx/CVE-2020-36158.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5258.json b/2020/5xxx/CVE-2020-5258.json index 9b840affcfd..9ce70fee718 100644 --- a/2020/5xxx/CVE-2020-5258.json +++ b/2020/5xxx/CVE-2020-5258.json @@ -100,6 +100,11 @@ "name": "https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d", "refsource": "MISC", "url": "https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d" + }, + { + "refsource": "MLIST", + "name": "[qpid-users] 20210309 Addressing CVE-2020-5258 in Qpid Broker-J", + "url": "https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E" } ] }, diff --git a/2021/20xxx/CVE-2021-20272.json b/2021/20xxx/CVE-2021-20272.json index 4c62f6fec5f..e003edb8413 100644 --- a/2021/20xxx/CVE-2021-20272.json +++ b/2021/20xxx/CVE-2021-20272.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://www.privoxy.org/announce.txt", "url": "https://www.privoxy.org/announce.txt" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20273.json b/2021/20xxx/CVE-2021-20273.json index 52f41330d3c..bba8fa33874 100644 --- a/2021/20xxx/CVE-2021-20273.json +++ b/2021/20xxx/CVE-2021-20273.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20275.json b/2021/20xxx/CVE-2021-20275.json index 2840c35d202..66f159c1041 100644 --- a/2021/20xxx/CVE-2021-20275.json +++ b/2021/20xxx/CVE-2021-20275.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20276.json b/2021/20xxx/CVE-2021-20276.json index e18f82c3f07..6f3cdf0ea6a 100644 --- a/2021/20xxx/CVE-2021-20276.json +++ b/2021/20xxx/CVE-2021-20276.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23273.json b/2021/23xxx/CVE-2021-23273.json index ce667bfb2ad..ad28650dc4b 100644 --- a/2021/23xxx/CVE-2021-23273.json +++ b/2021/23xxx/CVE-2021-23273.json @@ -1,227 +1,227 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@tibco.com", - "DATE_PUBLIC": "2021-03-09T17:00:00Z", - "ID": "CVE-2021-23273", - "STATE": "PUBLIC", - "TITLE": "TIBCO Spotfire Cross Site Scripting Vulnerability" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "TIBCO Spotfire Analyst", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "10.3.3" - }, - { - "version_affected": "=", - "version_value": "10.10.0" - }, - { - "version_affected": "=", - "version_value": "10.10.1" - }, - { - "version_affected": "=", - "version_value": "10.10.2" - }, - { - "version_affected": "=", - "version_value": "10.7.0" - }, - { - "version_affected": "=", - "version_value": "10.8.0" - }, - { - "version_affected": "=", - "version_value": "10.9.0" - }, - { - "version_affected": "=", - "version_value": "11.0.0" - }, - { - "version_affected": "=", - "version_value": "11.1.0" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "11.1.0" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Desktop", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "10.3.3" - }, - { - "version_affected": "=", - "version_value": "10.10.0" - }, - { - "version_affected": "=", - "version_value": "10.10.1" - }, - { - "version_affected": "=", - "version_value": "10.10.2" - }, - { - "version_affected": "=", - "version_value": "10.7.0" - }, - { - "version_affected": "=", - "version_value": "10.8.0" - }, - { - "version_affected": "=", - "version_value": "10.9.0" - }, - { - "version_affected": "=", - "version_value": "11.0.0" - }, - { - "version_affected": "=", - "version_value": "11.1.0" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Server", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "10.3.11" - }, - { - "version_affected": "=", - "version_value": "10.10.0" - }, - { - "version_affected": "=", - "version_value": "10.10.1" - }, - { - "version_affected": "=", - "version_value": "10.10.2" - }, - { - "version_affected": "=", - "version_value": "10.10.3" - }, - { - "version_affected": "=", - "version_value": "10.7.0" - }, - { - "version_affected": "=", - "version_value": "10.8.0" - }, - { - "version_affected": "=", - "version_value": "10.8.1" - }, - { - "version_affected": "=", - "version_value": "10.9.0" - }, - { - "version_affected": "=", - "version_value": "11.0.0" - }, - { - "version_affected": "=", - "version_value": "11.1.0" - } - ] - } - } - ] - }, - "vendor_name": "TIBCO Software Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0.\n" - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system." - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "http://www.tibco.com/services/support/advisories", - "refsource": "CONFIRM", - "url": "http://www.tibco.com/services/support/advisories" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher" - } - ], - "source": { - "discovery": "INTERNAL" - } -} + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2021-03-09T17:00:00Z", + "ID": "CVE-2021-23273", + "STATE": "PUBLIC", + "TITLE": "TIBCO Spotfire Cross Site Scripting Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "TIBCO Spotfire Analyst", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.3.3" + }, + { + "version_affected": "=", + "version_value": "10.10.0" + }, + { + "version_affected": "=", + "version_value": "10.10.1" + }, + { + "version_affected": "=", + "version_value": "10.10.2" + }, + { + "version_affected": "=", + "version_value": "10.7.0" + }, + { + "version_affected": "=", + "version_value": "10.8.0" + }, + { + "version_affected": "=", + "version_value": "10.9.0" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Desktop", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.3.3" + }, + { + "version_affected": "=", + "version_value": "10.10.0" + }, + { + "version_affected": "=", + "version_value": "10.10.1" + }, + { + "version_affected": "=", + "version_value": "10.10.2" + }, + { + "version_affected": "=", + "version_value": "10.7.0" + }, + { + "version_affected": "=", + "version_value": "10.8.0" + }, + { + "version_affected": "=", + "version_value": "10.9.0" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Server", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "10.3.11" + }, + { + "version_affected": "=", + "version_value": "10.10.0" + }, + { + "version_affected": "=", + "version_value": "10.10.1" + }, + { + "version_affected": "=", + "version_value": "10.10.2" + }, + { + "version_affected": "=", + "version_value": "10.10.3" + }, + { + "version_affected": "=", + "version_value": "10.7.0" + }, + { + "version_affected": "=", + "version_value": "10.8.0" + }, + { + "version_affected": "=", + "version_value": "10.8.1" + }, + { + "version_affected": "=", + "version_value": "10.9.0" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.tibco.com/services/support/advisories", + "refsource": "CONFIRM", + "url": "http://www.tibco.com/services/support/advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher" + } + ], + "source": { + "discovery": "INTERNAL" + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26930.json b/2021/26xxx/CVE-2021-26930.json index 316ed0ff466..e31d8146b54 100644 --- a/2021/26xxx/CVE-2021-26930.json +++ b/2021/26xxx/CVE-2021-26930.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-7143aca8cb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/26xxx/CVE-2021-26931.json b/2021/26xxx/CVE-2021-26931.json index 24e43794d70..8374a1c7f20 100644 --- a/2021/26xxx/CVE-2021-26931.json +++ b/2021/26xxx/CVE-2021-26931.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-7143aca8cb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/26xxx/CVE-2021-26932.json b/2021/26xxx/CVE-2021-26932.json index 64a065c3c79..ba74abc3982 100644 --- a/2021/26xxx/CVE-2021-26932.json +++ b/2021/26xxx/CVE-2021-26932.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-7143aca8cb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/27xxx/CVE-2021-27363.json b/2021/27xxx/CVE-2021-27363.json index c7b9b4cb99b..cd36d716205 100644 --- a/2021/27xxx/CVE-2021-27363.json +++ b/2021/27xxx/CVE-2021-27363.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/27xxx/CVE-2021-27364.json b/2021/27xxx/CVE-2021-27364.json index 0011a0c0561..aeb40a6ea16 100644 --- a/2021/27xxx/CVE-2021-27364.json +++ b/2021/27xxx/CVE-2021-27364.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1182717", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182717" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/27xxx/CVE-2021-27365.json b/2021/27xxx/CVE-2021-27365.json index 7457e524d51..27526b4281a 100644 --- a/2021/27xxx/CVE-2021-27365.json +++ b/2021/27xxx/CVE-2021-27365.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/28xxx/CVE-2021-28038.json b/2021/28xxx/CVE-2021-28038.json index a4c1335cb22..49a9ff05895 100644 --- a/2021/28xxx/CVE-2021-28038.json +++ b/2021/28xxx/CVE-2021-28038.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210305 Xen Security Advisory 367 v2 (CVE-2021-28038) - Linux: netback fails to honor grant mapping errors", "url": "http://www.openwall.com/lists/oss-security/2021/03/05/1" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/28xxx/CVE-2021-28111.json b/2021/28xxx/CVE-2021-28111.json new file mode 100644 index 00000000000..cd65d832028 --- /dev/null +++ b/2021/28xxx/CVE-2021-28111.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28111", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28112.json b/2021/28xxx/CVE-2021-28112.json new file mode 100644 index 00000000000..55d15ceeb4b --- /dev/null +++ b/2021/28xxx/CVE-2021-28112.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28112", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3178.json b/2021/3xxx/CVE-2021-3178.json index ebfdb8d87ee..cbbb85f92bc 100644 --- a/2021/3xxx/CVE-2021-3178.json +++ b/2021/3xxx/CVE-2021-3178.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-3bcc7198c8", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } diff --git a/2021/3xxx/CVE-2021-3347.json b/2021/3xxx/CVE-2021-3347.json index 217d776e76a..3a504fcdc62 100644 --- a/2021/3xxx/CVE-2021-3347.json +++ b/2021/3xxx/CVE-2021-3347.json @@ -141,6 +141,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210304-0005/", "url": "https://security.netapp.com/advisory/ntap-20210304-0005/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" } ] } From a4a537fb5dd0d944ebced69ab220e77d9fb89e77 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 22:00:43 +0000 Subject: [PATCH 217/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20272.json | 5 ----- 2021/20xxx/CVE-2021-20273.json | 5 ----- 2021/20xxx/CVE-2021-20275.json | 5 ----- 2021/20xxx/CVE-2021-20276.json | 5 ----- 4 files changed, 20 deletions(-) diff --git a/2021/20xxx/CVE-2021-20272.json b/2021/20xxx/CVE-2021-20272.json index e003edb8413..4c62f6fec5f 100644 --- a/2021/20xxx/CVE-2021-20272.json +++ b/2021/20xxx/CVE-2021-20272.json @@ -53,11 +53,6 @@ "refsource": "MISC", "name": "https://www.privoxy.org/announce.txt", "url": "https://www.privoxy.org/announce.txt" - }, - { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", - "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20273.json b/2021/20xxx/CVE-2021-20273.json index bba8fa33874..52f41330d3c 100644 --- a/2021/20xxx/CVE-2021-20273.json +++ b/2021/20xxx/CVE-2021-20273.json @@ -53,11 +53,6 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658" - }, - { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", - "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20275.json b/2021/20xxx/CVE-2021-20275.json index 66f159c1041..2840c35d202 100644 --- a/2021/20xxx/CVE-2021-20275.json +++ b/2021/20xxx/CVE-2021-20275.json @@ -53,11 +53,6 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666" - }, - { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", - "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20276.json b/2021/20xxx/CVE-2021-20276.json index 6f3cdf0ea6a..e18f82c3f07 100644 --- a/2021/20xxx/CVE-2021-20276.json +++ b/2021/20xxx/CVE-2021-20276.json @@ -53,11 +53,6 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668" - }, - { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", - "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, From 6c3c74ddfae2ff37d7e2f1811aa8dac26f739421 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 22:01:00 +0000 Subject: [PATCH 218/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20272.json | 5 +++++ 2021/20xxx/CVE-2021-20273.json | 5 +++++ 2021/20xxx/CVE-2021-20275.json | 5 +++++ 2021/20xxx/CVE-2021-20276.json | 5 +++++ 4 files changed, 20 insertions(+) diff --git a/2021/20xxx/CVE-2021-20272.json b/2021/20xxx/CVE-2021-20272.json index 4c62f6fec5f..e003edb8413 100644 --- a/2021/20xxx/CVE-2021-20272.json +++ b/2021/20xxx/CVE-2021-20272.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://www.privoxy.org/announce.txt", "url": "https://www.privoxy.org/announce.txt" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20273.json b/2021/20xxx/CVE-2021-20273.json index 52f41330d3c..bba8fa33874 100644 --- a/2021/20xxx/CVE-2021-20273.json +++ b/2021/20xxx/CVE-2021-20273.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936658" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20275.json b/2021/20xxx/CVE-2021-20275.json index 2840c35d202..66f159c1041 100644 --- a/2021/20xxx/CVE-2021-20275.json +++ b/2021/20xxx/CVE-2021-20275.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936666" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20276.json b/2021/20xxx/CVE-2021-20276.json index e18f82c3f07..6f3cdf0ea6a 100644 --- a/2021/20xxx/CVE-2021-20276.json +++ b/2021/20xxx/CVE-2021-20276.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936668" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2587-1] privoxy security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00009.html" } ] }, From 0ebaffa08c653d40415e71a1296f79a3ae39ce12 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 22:01:15 +0000 Subject: [PATCH 219/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23273.json | 5 ++ 2021/28xxx/CVE-2021-28113.json | 18 +++++++ 2021/28xxx/CVE-2021-28114.json | 18 +++++++ 2021/28xxx/CVE-2021-28115.json | 62 ++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28116.json | 86 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28117.json | 18 +++++++ 6 files changed, 207 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28113.json create mode 100644 2021/28xxx/CVE-2021-28114.json create mode 100644 2021/28xxx/CVE-2021-28115.json create mode 100644 2021/28xxx/CVE-2021-28116.json create mode 100644 2021/28xxx/CVE-2021-28117.json diff --git a/2021/23xxx/CVE-2021-23273.json b/2021/23xxx/CVE-2021-23273.json index ad28650dc4b..879653bd901 100644 --- a/2021/23xxx/CVE-2021-23273.json +++ b/2021/23xxx/CVE-2021-23273.json @@ -212,6 +212,11 @@ "name": "http://www.tibco.com/services/support/advisories", "refsource": "CONFIRM", "url": "http://www.tibco.com/services/support/advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire", + "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire" } ] }, diff --git a/2021/28xxx/CVE-2021-28113.json b/2021/28xxx/CVE-2021-28113.json new file mode 100644 index 00000000000..a01aa0d14d8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28113.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28113", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28114.json b/2021/28xxx/CVE-2021-28114.json new file mode 100644 index 00000000000..edecae3268f --- /dev/null +++ b/2021/28xxx/CVE-2021-28114.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28114", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28115.json b/2021/28xxx/CVE-2021-28115.json new file mode 100644 index 00000000000..0a667b11f1b --- /dev/null +++ b/2021/28xxx/CVE-2021-28115.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28115", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The OUGC Feedback plugin before 1.8.23 for MyBB allows XSS via the comment field of feedback during an edit operation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Sama34/OUGC-Feedback/pull/31/commits/ceef7c06359e5dcbaffe90a40884265c5754068c", + "refsource": "MISC", + "name": "https://github.com/Sama34/OUGC-Feedback/pull/31/commits/ceef7c06359e5dcbaffe90a40884265c5754068c" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28116.json b/2021/28xxx/CVE-2021-28116.json new file mode 100644 index 00000000000..d6c25c5f84b --- /dev/null +++ b/2021/28xxx/CVE-2021-28116.json @@ -0,0 +1,86 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28116", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.squid-cache.org/Versions/", + "refsource": "MISC", + "name": "http://www.squid-cache.org/Versions/" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-157/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-157/" + }, + { + "url": "https://github.com/squid-cache/squid/security/advisories/GHSA-rgf3-9v3p-qp82", + "refsource": "MISC", + "name": "https://github.com/squid-cache/squid/security/advisories/GHSA-rgf3-9v3p-qp82" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:H/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28117.json b/2021/28xxx/CVE-2021-28117.json new file mode 100644 index 00000000000..326b9f853e3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28117.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28117", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a30c352244752863b30f4a4489fc6986fe61e8e0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Mar 2021 23:00:41 +0000 Subject: [PATCH 220/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28118.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28119.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28120.json | 18 ++++++++++ 3 files changed, 98 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28118.json create mode 100644 2021/28xxx/CVE-2021-28119.json create mode 100644 2021/28xxx/CVE-2021-28120.json diff --git a/2021/28xxx/CVE-2021-28118.json b/2021/28xxx/CVE-2021-28118.json new file mode 100644 index 00000000000..fd71d15d92a --- /dev/null +++ b/2021/28xxx/CVE-2021-28118.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28118", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28119.json b/2021/28xxx/CVE-2021-28119.json new file mode 100644 index 00000000000..e4eb5a604d1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28119.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28119", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Twinkle Tray (aka twinkle-tray) through 1.13.3 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/xanderfrangos/twinkle-tray/issues/142", + "refsource": "MISC", + "name": "https://github.com/xanderfrangos/twinkle-tray/issues/142" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28120.json b/2021/28xxx/CVE-2021-28120.json new file mode 100644 index 00000000000..62acc4671d5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28120.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28120", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 1425d54845ed3b7d1bf8ef0d3c472092ea7afbb8 Mon Sep 17 00:00:00 2001 From: MSRC Date: Tue, 9 Mar 2021 15:43:49 -0800 Subject: [PATCH 221/845] March 2021 Patch Tuesday --- 2021/1xxx/CVE-2021-1640.json | 285 +++++++++++++++++-- 2021/1xxx/CVE-2021-1729.json | 222 +++++++++++++-- 2021/24xxx/CVE-2021-24089.json | 74 +++-- 2021/24xxx/CVE-2021-24090.json | 184 ++++++++++-- 2021/24xxx/CVE-2021-24095.json | 222 +++++++++++++-- 2021/24xxx/CVE-2021-24104.json | 94 +++++-- 2021/24xxx/CVE-2021-24107.json | 285 +++++++++++++++++-- 2021/24xxx/CVE-2021-24108.json | 118 ++++++-- 2021/24xxx/CVE-2021-24110.json | 74 +++-- 2021/26xxx/CVE-2021-26411.json | 491 +++++++++++++++++++++++++++++++-- 2021/26xxx/CVE-2021-26412.json | 194 +++++++------ 2021/26xxx/CVE-2021-26854.json | 194 +++++++------ 2021/26xxx/CVE-2021-26855.json | 254 ++++++++++------- 2021/26xxx/CVE-2021-26857.json | 274 ++++++++++-------- 2021/26xxx/CVE-2021-26858.json | 254 ++++++++++------- 2021/26xxx/CVE-2021-26859.json | 84 ++++-- 2021/26xxx/CVE-2021-26860.json | 213 ++++++++++++-- 2021/26xxx/CVE-2021-26861.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26862.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26863.json | 222 +++++++++++++-- 2021/26xxx/CVE-2021-26864.json | 225 +++++++++++++-- 2021/26xxx/CVE-2021-26865.json | 225 +++++++++++++-- 2021/26xxx/CVE-2021-26866.json | 240 ++++++++++++++-- 2021/26xxx/CVE-2021-26867.json | 124 +++++++-- 2021/26xxx/CVE-2021-26868.json | 261 ++++++++++++++++-- 2021/26xxx/CVE-2021-26869.json | 273 ++++++++++++++++-- 2021/26xxx/CVE-2021-26870.json | 222 +++++++++++++-- 2021/26xxx/CVE-2021-26871.json | 191 +++++++++++-- 2021/26xxx/CVE-2021-26872.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26873.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26874.json | 213 ++++++++++++-- 2021/26xxx/CVE-2021-26875.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26876.json | 222 +++++++++++++-- 2021/26xxx/CVE-2021-26877.json | 143 ++++++++-- 2021/26xxx/CVE-2021-26878.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26879.json | 171 ++++++++++-- 2021/26xxx/CVE-2021-26880.json | 234 ++++++++++++++-- 2021/26xxx/CVE-2021-26881.json | 273 ++++++++++++++++-- 2021/26xxx/CVE-2021-26882.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26884.json | 261 ++++++++++++++++-- 2021/26xxx/CVE-2021-26885.json | 191 +++++++++++-- 2021/26xxx/CVE-2021-26886.json | 261 ++++++++++++++++-- 2021/26xxx/CVE-2021-26887.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26889.json | 222 +++++++++++++-- 2021/26xxx/CVE-2021-26890.json | 213 ++++++++++++-- 2021/26xxx/CVE-2021-26891.json | 225 +++++++++++++-- 2021/26xxx/CVE-2021-26892.json | 234 ++++++++++++++-- 2021/26xxx/CVE-2021-26893.json | 143 ++++++++-- 2021/26xxx/CVE-2021-26894.json | 143 ++++++++-- 2021/26xxx/CVE-2021-26895.json | 143 ++++++++-- 2021/26xxx/CVE-2021-26896.json | 143 ++++++++-- 2021/26xxx/CVE-2021-26897.json | 143 ++++++++-- 2021/26xxx/CVE-2021-26898.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26899.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26900.json | 184 ++++++++++-- 2021/26xxx/CVE-2021-26901.json | 285 +++++++++++++++++-- 2021/26xxx/CVE-2021-26902.json | 74 +++-- 2021/27xxx/CVE-2021-27047.json | 74 +++-- 2021/27xxx/CVE-2021-27048.json | 74 +++-- 2021/27xxx/CVE-2021-27049.json | 74 +++-- 2021/27xxx/CVE-2021-27050.json | 74 +++-- 2021/27xxx/CVE-2021-27051.json | 74 +++-- 2021/27xxx/CVE-2021-27052.json | 84 ++++-- 2021/27xxx/CVE-2021-27053.json | 145 ++++++++-- 2021/27xxx/CVE-2021-27054.json | 169 ++++++++++-- 2021/27xxx/CVE-2021-27055.json | 122 ++++++-- 2021/27xxx/CVE-2021-27056.json | 125 +++++++-- 2021/27xxx/CVE-2021-27057.json | 169 ++++++++++-- 2021/27xxx/CVE-2021-27058.json | 84 ++++-- 2021/27xxx/CVE-2021-27059.json | 92 ++++-- 2021/27xxx/CVE-2021-27060.json | 74 +++-- 2021/27xxx/CVE-2021-27061.json | 74 +++-- 2021/27xxx/CVE-2021-27062.json | 74 +++-- 2021/27xxx/CVE-2021-27063.json | 143 ++++++++-- 2021/27xxx/CVE-2021-27065.json | 254 ++++++++++------- 2021/27xxx/CVE-2021-27066.json | 74 +++-- 2021/27xxx/CVE-2021-27070.json | 144 ++++++++-- 2021/27xxx/CVE-2021-27074.json | 74 +++-- 2021/27xxx/CVE-2021-27075.json | 104 +++++-- 2021/27xxx/CVE-2021-27076.json | 104 +++++-- 2021/27xxx/CVE-2021-27077.json | 285 +++++++++++++++++-- 2021/27xxx/CVE-2021-27078.json | 194 +++++++------ 2021/27xxx/CVE-2021-27080.json | 74 +++-- 2021/27xxx/CVE-2021-27081.json | 74 +++-- 2021/27xxx/CVE-2021-27082.json | 74 +++-- 2021/27xxx/CVE-2021-27083.json | 74 +++-- 2021/27xxx/CVE-2021-27084.json | 74 +++-- 2021/27xxx/CVE-2021-27085.json | 182 ++++++++++-- 88 files changed, 13988 insertions(+), 1992 deletions(-) diff --git a/2021/1xxx/CVE-2021-1640.json b/2021/1xxx/CVE-2021-1640.json index 4a8a51c8459..cddcd09cac3 100644 --- a/2021/1xxx/CVE-2021-1640.json +++ b/2021/1xxx/CVE-2021-1640.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-1640", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1640", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640" + } + ] + } +} diff --git a/2021/1xxx/CVE-2021-1729.json b/2021/1xxx/CVE-2021-1729.json index eb5ed469b1f..c78dcb39f7c 100644 --- a/2021/1xxx/CVE-2021-1729.json +++ b/2021/1xxx/CVE-2021-1729.json @@ -1,18 +1,208 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-1729", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1729", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Update Stack Setup Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24089.json b/2021/24xxx/CVE-2021-24089.json index f4a6ed1f3c6..a20d80fbc71 100644 --- a/2021/24xxx/CVE-2021-24089.json +++ b/2021/24xxx/CVE-2021-24089.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24089", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24089", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24089" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24090.json b/2021/24xxx/CVE-2021-24090.json index 66bd7ed44d9..89567d92a88 100644 --- a/2021/24xxx/CVE-2021-24090.json +++ b/2021/24xxx/CVE-2021-24090.json @@ -1,18 +1,170 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24090", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24090", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Error Reporting Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24095.json b/2021/24xxx/CVE-2021-24095.json index eab74403744..dacbdc31fb4 100644 --- a/2021/24xxx/CVE-2021-24095.json +++ b/2021/24xxx/CVE-2021-24095.json @@ -1,18 +1,208 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24095", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24095", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "DirectX Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24104.json b/2021/24xxx/CVE-2021-24104.json index 116c26cb9f1..ec337d68053 100644 --- a/2021/24xxx/CVE-2021-24104.json +++ b/2021/24xxx/CVE-2021-24104.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24104", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24104", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Foundation", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Spoofing Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24104" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24107.json b/2021/24xxx/CVE-2021-24107.json index bf29953a740..65d08c06fd7 100644 --- a/2021/24xxx/CVE-2021-24107.json +++ b/2021/24xxx/CVE-2021-24107.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24107", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24107", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Information Disclosure Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24108.json b/2021/24xxx/CVE-2021-24108.json index fddf5f15d5e..1f74eb6b5ef 100644 --- a/2021/24xxx/CVE-2021-24108.json +++ b/2021/24xxx/CVE-2021-24108.json @@ -1,18 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24108", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24108", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27057, CVE-2021-27059." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24108" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24110.json b/2021/24xxx/CVE-2021-24110.json index b46c5a81506..4ae71b54cfd 100644 --- a/2021/24xxx/CVE-2021-24110.json +++ b/2021/24xxx/CVE-2021-24110.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24110", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24110", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24110" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26411.json b/2021/26xxx/CVE-2021-26411.json index 2e8c5ded01d..5c0fae1ddd1 100644 --- a/2021/26xxx/CVE-2021-26411.json +++ b/2021/26xxx/CVE-2021-26411.json @@ -1,18 +1,477 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26411", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26411", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Internet Explorer 9", + "version": { + "version_data": [ + { + "version_value": "Windows Server 2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "Windows Server 2008 for x64-based Systems Service Pack 2" + } + ] + } + }, + { + "product_name": "Internet Explorer 11", + "version": { + "version_data": [ + { + "version_value": "Windows 10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1803 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1809 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "Windows Server 2019" + }, + { + "version_value": "Windows 10 for 32-bit Systems" + }, + { + "version_value": "Windows 10 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1607 for x64-based Systems" + }, + { + "version_value": "Windows 7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "Windows 7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "Windows 8.1 for 32-bit systems" + }, + { + "version_value": "Windows 8.1 for x64-based systems" + }, + { + "version_value": "Windows RT 8.1" + }, + { + "version_value": "Windows Server 2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "Windows Server 2012 R2" + }, + { + "version_value": "Windows Server 2016" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows Server 2012", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows Server 2019", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows Server 2016", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Internet Explorer Memory Corruption Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26411" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26412.json b/2021/26xxx/CVE-2021-26412.json index cac5e81202e..4f95353c453 100644 --- a/2021/26xxx/CVE-2021-26412.json +++ b/2021/26xxx/CVE-2021-26412.json @@ -1,102 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26412", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26412", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "Cumulative Update 23" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26854.json b/2021/26xxx/CVE-2021-26854.json index 4abaa3b27cf..801847427b6 100644 --- a/2021/26xxx/CVE-2021-26854.json +++ b/2021/26xxx/CVE-2021-26854.json @@ -1,102 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26854", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26854", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26855.json b/2021/26xxx/CVE-2021-26855.json index e48881925d7..44b9890488b 100644 --- a/2021/26xxx/CVE-2021-26855.json +++ b/2021/26xxx/CVE-2021-26855.json @@ -1,102 +1,160 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26855", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26855", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26857.json b/2021/26xxx/CVE-2021-26857.json index 948b7dfaaf1..82c91e109a8 100644 --- a/2021/26xxx/CVE-2021-26857.json +++ b/2021/26xxx/CVE-2021-26857.json @@ -1,112 +1,170 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26857", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server", - "version": { - "version_data": [ - { - "version_value": "2010 Service Pack 3" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26857", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server", + "version": { + "version_data": [ + { + "version_value": "2010 Service Pack 3" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26858.json b/2021/26xxx/CVE-2021-26858.json index 185fdbf8d3d..e2b54fa56af 100644 --- a/2021/26xxx/CVE-2021-26858.json +++ b/2021/26xxx/CVE-2021-26858.json @@ -1,102 +1,160 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26858", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26858", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "Cumulative Update 23" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26859.json b/2021/26xxx/CVE-2021-26859.json index 13e8ce452b9..70ae8c3f0e7 100644 --- a/2021/26xxx/CVE-2021-26859.json +++ b/2021/26xxx/CVE-2021-26859.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26859", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26859", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Power BI Report Server version 15.0.1103.234", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Power BI Report Server version 15.0.1104.300", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Power BI Information Disclosure Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26859" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26860.json b/2021/26xxx/CVE-2021-26860.json index dcd2ba791a4..e73adbcd239 100644 --- a/2021/26xxx/CVE-2021-26860.json +++ b/2021/26xxx/CVE-2021-26860.json @@ -1,18 +1,199 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26860", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26860", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows App-V Overlay Filter Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26861.json b/2021/26xxx/CVE-2021-26861.json index d4a04d5f5a1..ae17affef9e 100644 --- a/2021/26xxx/CVE-2021-26861.json +++ b/2021/26xxx/CVE-2021-26861.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26861", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26861", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Graphics Component Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26862.json b/2021/26xxx/CVE-2021-26862.json index 4c3c7c8b9c3..e7533148ed5 100644 --- a/2021/26xxx/CVE-2021-26862.json +++ b/2021/26xxx/CVE-2021-26862.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26862", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26862", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Installer Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26863.json b/2021/26xxx/CVE-2021-26863.json index c421f80e78e..605d462ca73 100644 --- a/2021/26xxx/CVE-2021-26863.json +++ b/2021/26xxx/CVE-2021-26863.json @@ -1,18 +1,208 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26863", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26863", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26875, CVE-2021-26900, CVE-2021-27077." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26864.json b/2021/26xxx/CVE-2021-26864.json index 35a61514b0d..b2b7eb67f59 100644 --- a/2021/26xxx/CVE-2021-26864.json +++ b/2021/26xxx/CVE-2021-26864.json @@ -1,18 +1,211 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26864", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26864", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Virtual Registry Provider Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26865.json b/2021/26xxx/CVE-2021-26865.json index 98205ad4af6..3c3f522b2b8 100644 --- a/2021/26xxx/CVE-2021-26865.json +++ b/2021/26xxx/CVE-2021-26865.json @@ -1,18 +1,211 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26865", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26865", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26891." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26865" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26866.json b/2021/26xxx/CVE-2021-26866.json index a3ce1cce1d5..06e2182b61d 100644 --- a/2021/26xxx/CVE-2021-26866.json +++ b/2021/26xxx/CVE-2021-26866.json @@ -1,18 +1,226 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26866", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26866", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Update Service Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26867.json b/2021/26xxx/CVE-2021-26867.json index 713e9a300d6..6480ac76242 100644 --- a/2021/26xxx/CVE-2021-26867.json +++ b/2021/26xxx/CVE-2021-26867.json @@ -1,18 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26867", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26867", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Hyper-V Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26868.json b/2021/26xxx/CVE-2021-26868.json index bfd01918ead..a60a25acf65 100644 --- a/2021/26xxx/CVE-2021-26868.json +++ b/2021/26xxx/CVE-2021-26868.json @@ -1,18 +1,247 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26868", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26868", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Graphics Component Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26868" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26869.json b/2021/26xxx/CVE-2021-26869.json index a40f3c4f38b..0c1f4928551 100644 --- a/2021/26xxx/CVE-2021-26869.json +++ b/2021/26xxx/CVE-2021-26869.json @@ -1,18 +1,259 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26869", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26869", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows ActiveX Installer Service Information Disclosure Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26869" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26870.json b/2021/26xxx/CVE-2021-26870.json index 142d695f8c4..4292b84896b 100644 --- a/2021/26xxx/CVE-2021-26870.json +++ b/2021/26xxx/CVE-2021-26870.json @@ -1,18 +1,208 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26870", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26870", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Projected File System Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26870" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26871.json b/2021/26xxx/CVE-2021-26871.json index 462cd07b462..fb76ee7d391 100644 --- a/2021/26xxx/CVE-2021-26871.json +++ b/2021/26xxx/CVE-2021-26871.json @@ -1,18 +1,177 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26871", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26871", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26885." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26871" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26872.json b/2021/26xxx/CVE-2021-26872.json index d5381760a2d..ac2e9d4985c 100644 --- a/2021/26xxx/CVE-2021-26872.json +++ b/2021/26xxx/CVE-2021-26872.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26872", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26872", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26898, CVE-2021-26901." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26872" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26873.json b/2021/26xxx/CVE-2021-26873.json index f70ba3ef126..b05351d60c0 100644 --- a/2021/26xxx/CVE-2021-26873.json +++ b/2021/26xxx/CVE-2021-26873.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26873", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26873", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows User Profile Service Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26874.json b/2021/26xxx/CVE-2021-26874.json index 4823c563aa4..5513d77f177 100644 --- a/2021/26xxx/CVE-2021-26874.json +++ b/2021/26xxx/CVE-2021-26874.json @@ -1,18 +1,199 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26874", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26874", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Overlay Filter Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26874" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26875.json b/2021/26xxx/CVE-2021-26875.json index 7b299849904..000e75b085e 100644 --- a/2021/26xxx/CVE-2021-26875.json +++ b/2021/26xxx/CVE-2021-26875.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26875", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26875", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26900, CVE-2021-27077." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26875" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26876.json b/2021/26xxx/CVE-2021-26876.json index 4ed2c034577..72e62f80a4b 100644 --- a/2021/26xxx/CVE-2021-26876.json +++ b/2021/26xxx/CVE-2021-26876.json @@ -1,18 +1,208 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26876", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26876", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "OpenType Font Parsing Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26876" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26877.json b/2021/26xxx/CVE-2021-26877.json index 4f9a8078600..26f40175dd4 100644 --- a/2021/26xxx/CVE-2021-26877.json +++ b/2021/26xxx/CVE-2021-26877.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26877", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26877", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26893, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26877" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26878.json b/2021/26xxx/CVE-2021-26878.json index 58a7c3970f0..7738ffbefdc 100644 --- a/2021/26xxx/CVE-2021-26878.json +++ b/2021/26xxx/CVE-2021-26878.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26878", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26878", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26878" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26879.json b/2021/26xxx/CVE-2021-26879.json index da0fb9fdecb..a5c1b5d511d 100644 --- a/2021/26xxx/CVE-2021-26879.json +++ b/2021/26xxx/CVE-2021-26879.json @@ -1,18 +1,157 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26879", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26879", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for x64-based systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows NAT Denial of Service Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26879" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26880.json b/2021/26xxx/CVE-2021-26880.json index 5637f40db52..4c2f98ec2d9 100644 --- a/2021/26xxx/CVE-2021-26880.json +++ b/2021/26xxx/CVE-2021-26880.json @@ -1,18 +1,220 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26880", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26880", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Storage Spaces Controller Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26880" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26881.json b/2021/26xxx/CVE-2021-26881.json index 1a1d98897f0..e92670e75a5 100644 --- a/2021/26xxx/CVE-2021-26881.json +++ b/2021/26xxx/CVE-2021-26881.json @@ -1,18 +1,259 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26881", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26881", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Windows Media Foundation Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26881" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26882.json b/2021/26xxx/CVE-2021-26882.json index 94fec5092b6..b67c44a9087 100644 --- a/2021/26xxx/CVE-2021-26882.json +++ b/2021/26xxx/CVE-2021-26882.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26882", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26882", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Remote Access API Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26882" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26884.json b/2021/26xxx/CVE-2021-26884.json index d5f4e8f00aa..4173f529d32 100644 --- a/2021/26xxx/CVE-2021-26884.json +++ b/2021/26xxx/CVE-2021-26884.json @@ -1,18 +1,247 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26884", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26884", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Media Photo Codec Information Disclosure Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26884" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26885.json b/2021/26xxx/CVE-2021-26885.json index 56556d533dc..c5cff4b21e7 100644 --- a/2021/26xxx/CVE-2021-26885.json +++ b/2021/26xxx/CVE-2021-26885.json @@ -1,18 +1,177 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26885", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26885", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26871." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26885" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26886.json b/2021/26xxx/CVE-2021-26886.json index 25974235d45..d8e1c4efdde 100644 --- a/2021/26xxx/CVE-2021-26886.json +++ b/2021/26xxx/CVE-2021-26886.json @@ -1,18 +1,247 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26886", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26886", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "User Profile Service Denial of Service Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26887.json b/2021/26xxx/CVE-2021-26887.json index 428e06fac68..820e3fbd76d 100644 --- a/2021/26xxx/CVE-2021-26887.json +++ b/2021/26xxx/CVE-2021-26887.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26887", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26887", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26887" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26889.json b/2021/26xxx/CVE-2021-26889.json index a81955b5c8e..b00cbd58fff 100644 --- a/2021/26xxx/CVE-2021-26889.json +++ b/2021/26xxx/CVE-2021-26889.json @@ -1,18 +1,208 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26889", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26889", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Update Stack Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26890.json b/2021/26xxx/CVE-2021-26890.json index 0c3249f2063..4556d9322da 100644 --- a/2021/26xxx/CVE-2021-26890.json +++ b/2021/26xxx/CVE-2021-26890.json @@ -1,18 +1,199 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26890", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26890", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Application Virtualization Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26890" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26891.json b/2021/26xxx/CVE-2021-26891.json index 47e1b70bbdd..6ba6e81ed9d 100644 --- a/2021/26xxx/CVE-2021-26891.json +++ b/2021/26xxx/CVE-2021-26891.json @@ -1,18 +1,211 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26891", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26891", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26865." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26892.json b/2021/26xxx/CVE-2021-26892.json index 8a434b780c9..6118e03dc7a 100644 --- a/2021/26xxx/CVE-2021-26892.json +++ b/2021/26xxx/CVE-2021-26892.json @@ -1,18 +1,220 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26892", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26892", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26893.json b/2021/26xxx/CVE-2021-26893.json index 938e434f282..66b769ecea1 100644 --- a/2021/26xxx/CVE-2021-26893.json +++ b/2021/26xxx/CVE-2021-26893.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26893", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26893", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26893" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26894.json b/2021/26xxx/CVE-2021-26894.json index 1a4883d026c..c2476bc81e1 100644 --- a/2021/26xxx/CVE-2021-26894.json +++ b/2021/26xxx/CVE-2021-26894.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26894", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26894", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26895, CVE-2021-26897." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26894" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26895.json b/2021/26xxx/CVE-2021-26895.json index df05655384e..9fd488ca99f 100644 --- a/2021/26xxx/CVE-2021-26895.json +++ b/2021/26xxx/CVE-2021-26895.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26895", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26895", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26897." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26895" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26896.json b/2021/26xxx/CVE-2021-26896.json index 4aa1d8681eb..7a02baf94ea 100644 --- a/2021/26xxx/CVE-2021-26896.json +++ b/2021/26xxx/CVE-2021-26896.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26896", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26896", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-27063." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26896" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26897.json b/2021/26xxx/CVE-2021-26897.json index f84fd0d2b7c..9b9f5a68855 100644 --- a/2021/26xxx/CVE-2021-26897.json +++ b/2021/26xxx/CVE-2021-26897.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26897", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26897", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26895." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26897" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26898.json b/2021/26xxx/CVE-2021-26898.json index f20cd2ed5b5..0c78d7fb57e 100644 --- a/2021/26xxx/CVE-2021-26898.json +++ b/2021/26xxx/CVE-2021-26898.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26898", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26898", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26898" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26899.json b/2021/26xxx/CVE-2021-26899.json index ae8e1f424e8..60115fa85e8 100644 --- a/2021/26xxx/CVE-2021-26899.json +++ b/2021/26xxx/CVE-2021-26899.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26899", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26899", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows UPnP Device Host Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26899" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26900.json b/2021/26xxx/CVE-2021-26900.json index 22aa5a98d6e..79a8e4d8504 100644 --- a/2021/26xxx/CVE-2021-26900.json +++ b/2021/26xxx/CVE-2021-26900.json @@ -1,18 +1,170 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26900", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26900", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-27077." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26901.json b/2021/26xxx/CVE-2021-26901.json index 344a0bb8129..85a31cdb116 100644 --- a/2021/26xxx/CVE-2021-26901.json +++ b/2021/26xxx/CVE-2021-26901.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26901", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26901", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901" + } + ] + } +} diff --git a/2021/26xxx/CVE-2021-26902.json b/2021/26xxx/CVE-2021-26902.json index cfa33e6366b..ead7799e96d 100644 --- a/2021/26xxx/CVE-2021-26902.json +++ b/2021/26xxx/CVE-2021-26902.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-26902", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26902", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26902" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27047.json b/2021/27xxx/CVE-2021-27047.json index 6d530b54ccc..4b60cff3a37 100644 --- a/2021/27xxx/CVE-2021-27047.json +++ b/2021/27xxx/CVE-2021-27047.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27047", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27047", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27047" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27048.json b/2021/27xxx/CVE-2021-27048.json index 05328293805..d5015158fc3 100644 --- a/2021/27xxx/CVE-2021-27048.json +++ b/2021/27xxx/CVE-2021-27048.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27048", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27048", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27048" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27049.json b/2021/27xxx/CVE-2021-27049.json index 0708ad9e1e4..9e5658e3219 100644 --- a/2021/27xxx/CVE-2021-27049.json +++ b/2021/27xxx/CVE-2021-27049.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27049", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27049", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27049" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27050.json b/2021/27xxx/CVE-2021-27050.json index 4352e69397b..e9c51c3e4f8 100644 --- a/2021/27xxx/CVE-2021-27050.json +++ b/2021/27xxx/CVE-2021-27050.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27050", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27050", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27050" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27051.json b/2021/27xxx/CVE-2021-27051.json index 63ed7dfccb3..e424ed1a068 100644 --- a/2021/27xxx/CVE-2021-27051.json +++ b/2021/27xxx/CVE-2021-27051.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27051", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27051", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27061, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27051" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27052.json b/2021/27xxx/CVE-2021-27052.json index 9bef9a5f244..9e3a29f2ac2 100644 --- a/2021/27xxx/CVE-2021-27052.json +++ b/2021/27xxx/CVE-2021-27052.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27052", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27052", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Server Information Disclosure Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27052" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27053.json b/2021/27xxx/CVE-2021-27053.json index 6e2242f0a06..ef2d4898d9c 100644 --- a/2021/27xxx/CVE-2021-27053.json +++ b/2021/27xxx/CVE-2021-27053.json @@ -1,18 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27053", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27053", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + } + ] + } + }, + { + "product_name": "Microsoft Office Online Server", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Excel", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Web Apps", + "version": { + "version_data": [ + { + "version_value": "Server 2013 Service Pack 1" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27054." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27054.json b/2021/27xxx/CVE-2021-27054.json index 60e54c24130..32a0a58ae39 100644 --- a/2021/27xxx/CVE-2021-27054.json +++ b/2021/27xxx/CVE-2021-27054.json @@ -1,18 +1,155 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27054", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27054", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office Web Apps", + "version": { + "version_data": [ + { + "version_value": "Server 2013 Service Pack 1" + } + ] + } + }, + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + }, + { + "version_value": "2019 for Mac" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Online Server", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Excel", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27053." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27055.json b/2021/27xxx/CVE-2021-27055.json index 5ea06c2367e..a1346fc76db 100644 --- a/2021/27xxx/CVE-2021-27055.json +++ b/2021/27xxx/CVE-2021-27055.json @@ -1,18 +1,108 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27055", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27055", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Visio", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Visio Security Feature Bypass Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27055" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27056.json b/2021/27xxx/CVE-2021-27056.json index 564c3c9df2a..36b1ee246ef 100644 --- a/2021/27xxx/CVE-2021-27056.json +++ b/2021/27xxx/CVE-2021-27056.json @@ -1,18 +1,111 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27056", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27056", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft PowerPoint", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft PowerPoint Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27056" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27057.json b/2021/27xxx/CVE-2021-27057.json index b8a9e295112..7635df20c54 100644 --- a/2021/27xxx/CVE-2021-27057.json +++ b/2021/27xxx/CVE-2021-27057.json @@ -1,18 +1,155 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27057", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27057", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + }, + { + "version_value": "2019 for Mac" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Online Server", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Excel", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Web Apps", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27057" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27058.json b/2021/27xxx/CVE-2021-27058.json index ee437964ec3..22e038a0b89 100644 --- a/2021/27xxx/CVE-2021-27058.json +++ b/2021/27xxx/CVE-2021-27058.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27058", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27058", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office ClickToRun Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27058" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27059.json b/2021/27xxx/CVE-2021-27059.json index a568518c848..ff4d9c95e2c 100644 --- a/2021/27xxx/CVE-2021-27059.json +++ b/2021/27xxx/CVE-2021-27059.json @@ -1,18 +1,78 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27059", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27059", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27057." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27059" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27060.json b/2021/27xxx/CVE-2021-27060.json index 91cbb63fc3f..48157b5b569 100644 --- a/2021/27xxx/CVE-2021-27060.json +++ b/2021/27xxx/CVE-2021-27060.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27060", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27060", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Visual Studio Code", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Visual Studio Code Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27060" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27061.json b/2021/27xxx/CVE-2021-27061.json index 0375d7f8800..e53083a67f9 100644 --- a/2021/27xxx/CVE-2021-27061.json +++ b/2021/27xxx/CVE-2021-27061.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27061", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27061", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27062." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27061" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27062.json b/2021/27xxx/CVE-2021-27062.json index 8e9b26c374b..2919a79cbb3 100644 --- a/2021/27xxx/CVE-2021-27062.json +++ b/2021/27xxx/CVE-2021-27062.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27062", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27062", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27062" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27063.json b/2021/27xxx/CVE-2021-27063.json index 07a07e27c8c..1a15f0048da 100644 --- a/2021/27xxx/CVE-2021-27063.json +++ b/2021/27xxx/CVE-2021-27063.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27063", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27063", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-26896." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27063" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27065.json b/2021/27xxx/CVE-2021-27065.json index 86b8770111d..0e48fc48a9d 100644 --- a/2021/27xxx/CVE-2021-27065.json +++ b/2021/27xxx/CVE-2021-27065.json @@ -1,102 +1,160 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27065", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27065", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "Cumulative Update 23" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27066.json b/2021/27xxx/CVE-2021-27066.json index 1c6f93de7fd..e689f50f103 100644 --- a/2021/27xxx/CVE-2021-27066.json +++ b/2021/27xxx/CVE-2021-27066.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27066", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27066", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Admin Center", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Admin Center Security Feature Bypass Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27066" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27070.json b/2021/27xxx/CVE-2021-27070.json index 07e39150643..52cbbd02dbb 100644 --- a/2021/27xxx/CVE-2021-27070.json +++ b/2021/27xxx/CVE-2021-27070.json @@ -1,18 +1,130 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27070", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27070", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27074.json b/2021/27xxx/CVE-2021-27074.json index c24056e095b..41ca9537070 100644 --- a/2021/27xxx/CVE-2021-27074.json +++ b/2021/27xxx/CVE-2021-27074.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27074", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27074", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Azure Sphere", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27080." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27074" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27075.json b/2021/27xxx/CVE-2021-27075.json index 59753f57d5d..8af11c2816b 100644 --- a/2021/27xxx/CVE-2021-27075.json +++ b/2021/27xxx/CVE-2021-27075.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27075", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27075", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Azure Service Fabric", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Azure Spring Cloud", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Azure Container Instance", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Azure Kubernetes Service", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Azure Virtual Machine Information Disclosure Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27075" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27076.json b/2021/27xxx/CVE-2021-27076.json index 118b9b8f59d..e3ae24cb432 100644 --- a/2021/27xxx/CVE-2021-27076.json +++ b/2021/27xxx/CVE-2021-27076.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27076", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27076", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + }, + { + "product_name": "Microsoft Business Productivity Servers", + "version": { + "version_data": [ + { + "version_value": "2010 Service Pack 2" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Foundation", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27076" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27077.json b/2021/27xxx/CVE-2021-27077.json index 3902fb0a781..066ab809083 100644 --- a/2021/27xxx/CVE-2021-27077.json +++ b/2021/27xxx/CVE-2021-27077.json @@ -1,18 +1,271 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27077", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27077", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27078.json b/2021/27xxx/CVE-2021-27078.json index 0ef388118d5..d20a2f9c2d1 100644 --- a/2021/27xxx/CVE-2021-27078.json +++ b/2021/27xxx/CVE-2021-27078.json @@ -1,102 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27078", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27078", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ { - "lang": "eng", - "value": "Remote Code Execution" + "version_value": "" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078", - "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" - } - ] + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27080.json b/2021/27xxx/CVE-2021-27080.json index af0700a1818..6d47c6a8515 100644 --- a/2021/27xxx/CVE-2021-27080.json +++ b/2021/27xxx/CVE-2021-27080.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27080", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27080", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Azure Sphere", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27074." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27080" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27081.json b/2021/27xxx/CVE-2021-27081.json index cd3b9ba3702..5d36570605c 100644 --- a/2021/27xxx/CVE-2021-27081.json +++ b/2021/27xxx/CVE-2021-27081.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27081", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27081", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Visual Studio Code ESLint extension", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Visual Studio Code ESLint Extension Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27081" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27082.json b/2021/27xxx/CVE-2021-27082.json index dcf9d1f6f20..67a40fe0ffb 100644 --- a/2021/27xxx/CVE-2021-27082.json +++ b/2021/27xxx/CVE-2021-27082.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27082", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27082", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Quantum Development Kit for Visual Studio Code", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Quantum Development Kit for Visual Studio Code Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27082" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27083.json b/2021/27xxx/CVE-2021-27083.json index 1ca9e9bd1ca..e1c7b5db172 100644 --- a/2021/27xxx/CVE-2021-27083.json +++ b/2021/27xxx/CVE-2021-27083.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27083", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27083", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Visual Studio Code Remote - Containers Extension", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27083" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27084.json b/2021/27xxx/CVE-2021-27084.json index b04b808d3f0..8e647a18d3a 100644 --- a/2021/27xxx/CVE-2021-27084.json +++ b/2021/27xxx/CVE-2021-27084.json @@ -1,18 +1,60 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27084", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27084", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Visual Studio Code - Java Extension Pack", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27084" + } + ] + } +} diff --git a/2021/27xxx/CVE-2021-27085.json b/2021/27xxx/CVE-2021-27085.json index b3c5d50ec83..2692a73c326 100644 --- a/2021/27xxx/CVE-2021-27085.json +++ b/2021/27xxx/CVE-2021-27085.json @@ -1,18 +1,168 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27085", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27085", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Internet Explorer 11", + "version": { + "version_data": [ + { + "version_value": "Windows 10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1803 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1809 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "Windows Server 2019" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Internet Explorer Remote Code Execution Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27085" + } + ] + } +} From 168c3da9aa5e43da070a296819b0185b4e5c4c64 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 01:00:42 +0000 Subject: [PATCH 222/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21300.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/21xxx/CVE-2021-21300.json b/2021/21xxx/CVE-2021-21300.json index 9b21e08edd7..d5eb9417727 100644 --- a/2021/21xxx/CVE-2021-21300.json +++ b/2021/21xxx/CVE-2021-21300.json @@ -132,6 +132,11 @@ "name": "https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592", "refsource": "MISC", "url": "https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210309 git: malicious repositories can execute remote code while cloning", + "url": "http://www.openwall.com/lists/oss-security/2021/03/09/3" } ] }, From df8c1753be7df9665c841054773b1fc29c9af26f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 02:00:40 +0000 Subject: [PATCH 223/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29074.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/29xxx/CVE-2020-29074.json b/2020/29xxx/CVE-2020-29074.json index 948a773fc54..e035afb8c20 100644 --- a/2020/29xxx/CVE-2020-29074.json +++ b/2020/29xxx/CVE-2020-29074.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2490-1] x11vnc security update", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00018.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-c5b679877e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MHVXHZE3YIP4RTWGQ24IDBSW44XPRDOC/" } ] } From 129666b67cb7aac1eabed02b09574e4de52ae1cf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 03:00:40 +0000 Subject: [PATCH 224/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29074.json | 5 +++ 2020/29xxx/CVE-2020-29238.json | 66 ++++++++++++++++++++++++++++++---- 2 files changed, 65 insertions(+), 6 deletions(-) diff --git a/2020/29xxx/CVE-2020-29074.json b/2020/29xxx/CVE-2020-29074.json index e035afb8c20..aae10124a3e 100644 --- a/2020/29xxx/CVE-2020-29074.json +++ b/2020/29xxx/CVE-2020-29074.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-c5b679877e", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MHVXHZE3YIP4RTWGQ24IDBSW44XPRDOC/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-93911302d6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H2FLWSVH32O6JXLRQBYDQLP7XRSTLUPQ/" } ] } diff --git a/2020/29xxx/CVE-2020-29238.json b/2020/29xxx/CVE-2020-29238.json index 0d3042ebc26..667670d4224 100644 --- a/2020/29xxx/CVE-2020-29238.json +++ b/2020/29xxx/CVE-2020-29238.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29238", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29238", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An integer buffer overflow in the Nginx webserver of ExpressVPN Router version 1 allows remote attackers to obtain sensitive information when the server running as reverse proxy via specially crafted request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://expressvpn.com", + "refsource": "MISC", + "name": "http://expressvpn.com" + }, + { + "refsource": "MISC", + "name": "https://bugcrowd.com/disclosures/4e8d5325-8e49-4ea3-962a-a088bbb73a3f/expressvpn-router-integer-buffer-overflow-server-info-disclosure-when-router-s-nginx-server-used-as-reverse-proxy-server", + "url": "https://bugcrowd.com/disclosures/4e8d5325-8e49-4ea3-962a-a088bbb73a3f/expressvpn-router-integer-buffer-overflow-server-info-disclosure-when-router-s-nginx-server-used-as-reverse-proxy-server" + }, + { + "refsource": "MISC", + "name": "http://ja1sharma.com/blog/2021/CVE-2020-29238/", + "url": "http://ja1sharma.com/blog/2021/CVE-2020-29238/" } ] } From 5d512f0a434cbc4dd166b66d7969c64cad84ed46 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 05:00:44 +0000 Subject: [PATCH 225/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28121.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28122.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28123.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28124.json | 18 +++++++++++ 2021/3xxx/CVE-2021-3310.json | 56 ++++++++++++++++++++++++++++++---- 5 files changed, 122 insertions(+), 6 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28121.json create mode 100644 2021/28xxx/CVE-2021-28122.json create mode 100644 2021/28xxx/CVE-2021-28123.json create mode 100644 2021/28xxx/CVE-2021-28124.json diff --git a/2021/28xxx/CVE-2021-28121.json b/2021/28xxx/CVE-2021-28121.json new file mode 100644 index 00000000000..004b9f2fdd8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28121.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28121", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28122.json b/2021/28xxx/CVE-2021-28122.json new file mode 100644 index 00000000000..108ac5207d6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28123.json b/2021/28xxx/CVE-2021-28123.json new file mode 100644 index 00000000000..05a953cb4ec --- /dev/null +++ b/2021/28xxx/CVE-2021-28123.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28123", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28124.json b/2021/28xxx/CVE-2021-28124.json new file mode 100644 index 00000000000..391f0d27204 --- /dev/null +++ b/2021/28xxx/CVE-2021-28124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3310.json b/2021/3xxx/CVE-2021-3310.json index c505f9ca680..2205dc272f0 100644 --- a/2021/3xxx/CVE-2021-3310.json +++ b/2021/3xxx/CVE-2021-3310.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3310", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3310", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Western Digital My Cloud OS 5 devices before 5.10.122 mishandle Symbolic Link Following on SMB and AFP shares. This can lead to code execution and information disclosure (by reading local files)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122", + "url": "https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122" } ] } From 56498df958f626712f3d19825939c0e79c29bc78 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Wed, 10 Mar 2021 07:54:54 +0000 Subject: [PATCH 226/845] Add Velocity CVE-2020-13936 CVE-2020-13959 Signed-off-by: Mark J. Cox --- 2020/13xxx/CVE-2020-13936.json | 81 ++++++++++++++++++++++++++++++---- 2020/13xxx/CVE-2020-13959.json | 81 ++++++++++++++++++++++++++++++---- 2 files changed, 146 insertions(+), 16 deletions(-) diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json index eeab95e0aeb..6d655e77d42 100644 --- a/2020/13xxx/CVE-2020-13936.json +++ b/2020/13xxx/CVE-2020-13936.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-13936", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Velocity Sandbox Bypass" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Velocity Engine", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Apache Velocity Engine", + "version_value": "2.2" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was discovered by Alvaro Munoz pwntester@github.com of Github Security Labs and was originally reported as GHSL-2020-048." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2." } ] - } -} \ No newline at end of file + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Velocity Sandbox Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "Applications using Apache Velocity that allow untrusted users to upload templates should upgrade to version 2.3. This version adds additional default restrictions on what methods/properties can be accessed in a template." + } + ] +} diff --git a/2020/13xxx/CVE-2020-13959.json b/2020/13xxx/CVE-2020-13959.json index 3ea6cf65f99..b4481d6684d 100644 --- a/2020/13xxx/CVE-2020-13959.json +++ b/2020/13xxx/CVE-2020-13959.json @@ -1,18 +1,83 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-13959", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Velocity Tools XSS Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Velocity Tools", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Apache Velocity Tools", + "version_value": "3.1" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was reported and a patch was submitted by Jackson Henry, member of Sakura Samurai." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. \nXSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks." } ] - } -} \ No newline at end of file + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "Applications based on Apache Velocity Tools should upgrade to version 3.1. This version escapes the reflected text on the default error page, preventing potential javascript execution." + } + ] +} From dc975e009b181a6eddc088d06750a5e1fc67471b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 08:00:52 +0000 Subject: [PATCH 227/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 04756e0c68d..024042c6d39 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -249,6 +249,31 @@ "refsource": "MLIST", "name": "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] arshadmohammad commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", "url": "https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-commits] 20210310 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20210310 [GitHub] [zookeeper] asfgit closed pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-issues] 20210310 [jira] [Resolved] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-commits] 20210310 [zookeeper] branch branch-3.7.0 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-commits] 20210310 [zookeeper] branch master updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E" } ] } From d290943cdf1402c0d93c139930d430c3ed26c699 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 09:00:42 +0000 Subject: [PATCH 228/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13936.json | 19 +++++++++++++++---- 2020/13xxx/CVE-2020-13959.json | 19 +++++++++++++++---- 2 files changed, 30 insertions(+), 8 deletions(-) diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json index 6d655e77d42..1c7ffe5edab 100644 --- a/2020/13xxx/CVE-2020-13936.json +++ b/2020/13xxx/CVE-2020-13936.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2." + "value": "An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2." } ] }, @@ -66,8 +66,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E", + "name": "https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[velocity-user] 20210310 CVE-2020-13936: Velocity Sandbox Bypass", + "url": "https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a@%3Cuser.velocity.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[velocity-commits] 20210310 [velocity-site] 01/01: CVE announcement", + "url": "https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E" } ] }, @@ -80,4 +91,4 @@ "value": "Applications using Apache Velocity that allow untrusted users to upload templates should upgrade to version 2.3. This version adds additional default restrictions on what methods/properties can be accessed in a template." } ] -} +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13959.json b/2020/13xxx/CVE-2020-13959.json index b4481d6684d..cb86077e065 100644 --- a/2020/13xxx/CVE-2020-13959.json +++ b/2020/13xxx/CVE-2020-13959.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. \nXSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks." + "value": "The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks." } ] }, @@ -66,8 +66,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E", + "name": "https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[velocity-user] 20210310 CVE-2020-13959: Velocity Tools XSS Vulnerability", + "url": "https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3@%3Cuser.velocity.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[velocity-commits] 20210310 [velocity-site] 01/01: CVE announcement", + "url": "https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E" } ] }, @@ -80,4 +91,4 @@ "value": "Applications based on Apache Velocity Tools should upgrade to version 3.1. This version escapes the reflected text on the default error page, preventing potential javascript execution." } ] -} +} \ No newline at end of file From 1d042043870be7b4eaa844d1df34fe1987622715 Mon Sep 17 00:00:00 2001 From: Ikuya Fukumoto Date: Wed, 10 Mar 2021 18:12:35 +0900 Subject: [PATCH 229/845] JPCERT/CC 2021-03-10-18-11 --- 2021/20xxx/CVE-2021-20667.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20668.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20669.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20670.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20671.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20672.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20673.json | 50 ++++++++++++++++++++++++++++++++-- 7 files changed, 329 insertions(+), 21 deletions(-) diff --git a/2021/20xxx/CVE-2021-20667.json b/2021/20xxx/CVE-2021-20667.json index 730608a042a..a56ea114ee1 100644 --- a/2021/20xxx/CVE-2021-20667.json +++ b/2021/20xxx/CVE-2021-20667.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20667", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_value": "versions v4.2.2 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability due to inadequate CSP (Content Security Policy) configuration in GROWI versions v4.2.2 and earlier allows remote authenticated attackers to inject an arbitrary script via a specially crafted content." } ] } diff --git a/2021/20xxx/CVE-2021-20668.json b/2021/20xxx/CVE-2021-20668.json index 076eab56551..223e5f12a4b 100644 --- a/2021/20xxx/CVE-2021-20668.json +++ b/2021/20xxx/CVE-2021-20668.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20668", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_value": "versions v4.2.2 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read an arbitrary path via a specially crafted URL." } ] } diff --git a/2021/20xxx/CVE-2021-20669.json b/2021/20xxx/CVE-2021-20669.json index 317c9229618..aeb87508082 100644 --- a/2021/20xxx/CVE-2021-20669.json +++ b/2021/20xxx/CVE-2021-20669.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20669", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_value": "versions v4.2.2 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read and/or delete an arbitrary path via a specially crafted URL." } ] } diff --git a/2021/20xxx/CVE-2021-20670.json b/2021/20xxx/CVE-2021-20670.json index cdf64b062e4..4b06bf19cd9 100644 --- a/2021/20xxx/CVE-2021-20670.json +++ b/2021/20xxx/CVE-2021-20670.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20670", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_value": "versions v4.2.2 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in GROWI versions v4.2.2 and earlier allows a remote unauthenticated attacker to read the user's personal information and/or server's internal information via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20671.json b/2021/20xxx/CVE-2021-20671.json index 9a1934e8ee3..4d0d2529296 100644 --- a/2021/20xxx/CVE-2021-20671.json +++ b/2021/20xxx/CVE-2021-20671.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20671", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_value": "versions v4.2.2 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution." } ] } diff --git a/2021/20xxx/CVE-2021-20672.json b/2021/20xxx/CVE-2021-20672.json index cac1d33fd98..2a462a02215 100644 --- a/2021/20xxx/CVE-2021-20672.json +++ b/2021/20xxx/CVE-2021-20672.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20672", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI (v4.2 Series)", + "version": { + "version_data": [ + { + "version_value": "versions from v4.2.0 to v4.2.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" + }, + { + "url": "https://jvn.jp/en/jp/JVN86438134/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Reflected cross-site scripting vulnerability due to insufficient verification of URL query parameters in GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote attackers to inject an arbitrary script via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20673.json b/2021/20xxx/CVE-2021-20673.json index 37d54751d0d..ae5827bd42c 100644 --- a/2021/20xxx/CVE-2021-20673.json +++ b/2021/20xxx/CVE-2021-20673.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20673", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI (v4.2 Series)", + "version": { + "version_data": [ + { + "version_value": "versions from v4.2.0 to v4.2.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" + }, + { + "url": "https://jvn.jp/en/jp/JVN86438134/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability in Admin Page of GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors." } ] } From c40ab194a87da6c72ea209fa3b315c0f78228dc4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 10:00:45 +0000 Subject: [PATCH 230/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20667.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20668.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20669.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20670.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20671.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20672.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20673.json | 11 ++++++++--- 2021/28xxx/CVE-2021-28125.json | 18 ++++++++++++++++++ 8 files changed, 74 insertions(+), 21 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28125.json diff --git a/2021/20xxx/CVE-2021-20667.json b/2021/20xxx/CVE-2021-20667.json index a56ea114ee1..adcd30c7bb3 100644 --- a/2021/20xxx/CVE-2021-20667.json +++ b/2021/20xxx/CVE-2021-20667.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20667", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20668.json b/2021/20xxx/CVE-2021-20668.json index 223e5f12a4b..4eb0dbde09a 100644 --- a/2021/20xxx/CVE-2021-20668.json +++ b/2021/20xxx/CVE-2021-20668.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20668", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20669.json b/2021/20xxx/CVE-2021-20669.json index aeb87508082..ac87d9e4797 100644 --- a/2021/20xxx/CVE-2021-20669.json +++ b/2021/20xxx/CVE-2021-20669.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20669", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20670.json b/2021/20xxx/CVE-2021-20670.json index 4b06bf19cd9..b0de98bcbf3 100644 --- a/2021/20xxx/CVE-2021-20670.json +++ b/2021/20xxx/CVE-2021-20670.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20670", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20671.json b/2021/20xxx/CVE-2021-20671.json index 4d0d2529296..b021f16fa42 100644 --- a/2021/20xxx/CVE-2021-20671.json +++ b/2021/20xxx/CVE-2021-20671.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20671", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20672.json b/2021/20xxx/CVE-2021-20672.json index 2a462a02215..d17eca9a108 100644 --- a/2021/20xxx/CVE-2021-20672.json +++ b/2021/20xxx/CVE-2021-20672.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20672", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" + "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" }, { - "url": "https://jvn.jp/en/jp/JVN86438134/index.html" + "url": "https://jvn.jp/en/jp/JVN86438134/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN86438134/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20673.json b/2021/20xxx/CVE-2021-20673.json index ae5827bd42c..02e9622be30 100644 --- a/2021/20xxx/CVE-2021-20673.json +++ b/2021/20xxx/CVE-2021-20673.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20673", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" + "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" }, { - "url": "https://jvn.jp/en/jp/JVN86438134/index.html" + "url": "https://jvn.jp/en/jp/JVN86438134/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN86438134/index.html" } ] }, diff --git a/2021/28xxx/CVE-2021-28125.json b/2021/28xxx/CVE-2021-28125.json new file mode 100644 index 00000000000..6cdc3fac565 --- /dev/null +++ b/2021/28xxx/CVE-2021-28125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From c1faaa12edaa2afad7fb02b15d670a2715978937 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 13:00:51 +0000 Subject: [PATCH 231/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13936.json | 10 ++++++ 2020/13xxx/CVE-2020-13959.json | 10 ++++++ 2021/28xxx/CVE-2021-28007.json | 56 ++++++++++++++++++++++++++++++---- 3 files changed, 70 insertions(+), 6 deletions(-) diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json index 1c7ffe5edab..6ba1e521055 100644 --- a/2020/13xxx/CVE-2020-13936.json +++ b/2020/13xxx/CVE-2020-13936.json @@ -79,6 +79,16 @@ "refsource": "MLIST", "name": "[velocity-commits] 20210310 [velocity-site] 01/01: CVE announcement", "url": "https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210309 CVE-2020-13936: Velocity Sandbox Bypass", + "url": "http://www.openwall.com/lists/oss-security/2021/03/10/1" + }, + { + "refsource": "MLIST", + "name": "[announce] 20210310 CVE-2020-13936: Velocity Sandbox Bypass", + "url": "https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6@%3Cannounce.apache.org%3E" } ] }, diff --git a/2020/13xxx/CVE-2020-13959.json b/2020/13xxx/CVE-2020-13959.json index cb86077e065..f77cba28717 100644 --- a/2020/13xxx/CVE-2020-13959.json +++ b/2020/13xxx/CVE-2020-13959.json @@ -79,6 +79,16 @@ "refsource": "MLIST", "name": "[velocity-commits] 20210310 [velocity-site] 01/01: CVE announcement", "url": "https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[announce] 20210310 CVE-2020-13959: Velocity Tools XSS Vulnerability", + "url": "https://lists.apache.org/thread.html/rf9868c564cff7adfd5283563f2309b93b3e496354a211a57503b2f72@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210309 CVE-2020-13959: Velocity Tools XSS Vulnerability", + "url": "http://www.openwall.com/lists/oss-security/2021/03/10/2" } ] }, diff --git a/2021/28xxx/CVE-2021-28007.json b/2021/28xxx/CVE-2021-28007.json index 4321c80efc2..fcfea3f7566 100644 --- a/2021/28xxx/CVE-2021-28007.json +++ b/2021/28xxx/CVE-2021-28007.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28007", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28007", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Web Based Quiz System 1.0 is affected by cross-site scripting (XSS) in register.php through the name parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49607", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49607" } ] } From 2800d8557c7e1a8823c754b2da8b68e16d3f4044 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 14:00:42 +0000 Subject: [PATCH 232/845] "-Synchronized-Data." --- 2020/23xxx/CVE-2020-23721.json | 56 +++++++++++++++++++++++++---- 2020/23xxx/CVE-2020-23722.json | 56 +++++++++++++++++++++++++---- 2020/24xxx/CVE-2020-24791.json | 66 ++++++++++++++++++++++++++++++---- 2020/28xxx/CVE-2020-28705.json | 61 +++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3224.json | 61 +++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3427.json | 18 ++++++++++ 6 files changed, 288 insertions(+), 30 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3427.json diff --git a/2020/23xxx/CVE-2020-23721.json b/2020/23xxx/CVE-2020-23721.json index 4e157dc4d6d..11d76b438cc 100644 --- a/2020/23xxx/CVE-2020-23721.json +++ b/2020/23xxx/CVE-2020-23721.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23721", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23721", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in FUEL CMS V1.4.7. An attacker can use a XSS payload and bypass a filter via /fuelCM/fuel/pages/edit/1?lang=english." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/daylightstudio/FUEL-CMS/issues/559", + "refsource": "MISC", + "name": "https://github.com/daylightstudio/FUEL-CMS/issues/559" } ] } diff --git a/2020/23xxx/CVE-2020-23722.json b/2020/23xxx/CVE-2020-23722.json index a7b04d8f1ed..8fb526771a7 100644 --- a/2020/23xxx/CVE-2020-23722.json +++ b/2020/23xxx/CVE-2020-23722.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23722", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23722", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in FUEL CMS 1.4.7. There is a escalation of privilege vulnerability to obtain super admin privilege via the \"id\" and \"fuel_id\" parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/daylightstudio/FUEL-CMS/issues/560", + "refsource": "MISC", + "name": "https://github.com/daylightstudio/FUEL-CMS/issues/560" } ] } diff --git a/2020/24xxx/CVE-2020-24791.json b/2020/24xxx/CVE-2020-24791.json index 47ba5d69c91..2f1921f11d5 100644 --- a/2020/24xxx/CVE-2020-24791.json +++ b/2020/24xxx/CVE-2020-24791.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24791", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24791", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/daylightstudio/FUEL-CMS/issues/561", + "refsource": "MISC", + "name": "https://github.com/daylightstudio/FUEL-CMS/issues/561" + }, + { + "refsource": "MISC", + "name": "https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt", + "url": "https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/48778", + "url": "https://www.exploit-db.com/exploits/48778" } ] } diff --git a/2020/28xxx/CVE-2020-28705.json b/2020/28xxx/CVE-2020-28705.json index 3e3734f34f8..bc64dde0ac6 100644 --- a/2020/28xxx/CVE-2020-28705.json +++ b/2020/28xxx/CVE-2020-28705.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28705", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28705", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a page via a post ID to /pages/delete/3." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/daylightstudio/FUEL-CMS/issues/576", + "refsource": "MISC", + "name": "https://github.com/daylightstudio/FUEL-CMS/issues/576" + }, + { + "url": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b", + "refsource": "MISC", + "name": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b" } ] } diff --git a/2021/3xxx/CVE-2021-3224.json b/2021/3xxx/CVE-2021-3224.json index de92c71ba32..63371bd1746 100644 --- a/2021/3xxx/CVE-2021-3224.json +++ b/2021/3xxx/CVE-2021-3224.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3224", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3224", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stored cross-site scripting (XSS) vulnerability in cszcms 1.2.9 exists in /admin/pages/new via the content parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.cszcms.com/", + "refsource": "MISC", + "name": "https://www.cszcms.com/" + }, + { + "url": "https://github.com/cskaza/cszcms/issues/28", + "refsource": "MISC", + "name": "https://github.com/cskaza/cszcms/issues/28" } ] } diff --git a/2021/3xxx/CVE-2021-3427.json b/2021/3xxx/CVE-2021-3427.json new file mode 100644 index 00000000000..f7a0b8e2d62 --- /dev/null +++ b/2021/3xxx/CVE-2021-3427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 44f32d87c273c4fae300b7abd595dcabad8f6279 Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Wed, 10 Mar 2021 10:00:27 -0500 Subject: [PATCH 233/845] IBM20210310-10027 Added CVE-2020-5016, CVE-2020-4717 --- 2020/4xxx/CVE-2020-4717.json | 102 +++++++++++++++++++++++++++----- 2020/5xxx/CVE-2020-5016.json | 111 ++++++++++++++++++++++++++++++----- 2 files changed, 183 insertions(+), 30 deletions(-) diff --git a/2020/4xxx/CVE-2020-4717.json b/2020/4xxx/CVE-2020-4717.json index a8ccd6c4b42..b81134c1be5 100644 --- a/2020/4xxx/CVE-2020-4717.json +++ b/2020/4xxx/CVE-2020-4717.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4717", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "Subscription" + } + ] + }, + "product_name" : "SPSS Modeler" + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "impact" : { + "cvssv3" : { + "TM" : { + "E" : "U", + "RL" : "O", + "RC" : "C" + }, + "BM" : { + "AV" : "L", + "AC" : "L", + "UI" : "N", + "I" : "H", + "A" : "N", + "PR" : "N", + "S" : "U", + "SCORE" : "6.200", + "C" : "N" + } + } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6427901", + "url" : "https://www.ibm.com/support/pages/node/6427901", + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6427901 (SPSS Modeler)" + }, + { + "name" : "ibm-spss-cve20204717-symlink (187727)", + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187727" + } + ] + }, + "description" : { + "description_data" : [ + { + "value" : "A vulnerability exists in IBM SPSS Modeler Subscription Installer that allows a user with create symbolic link permission to write arbitrary file in another protected path during product installation. IBM X-Force ID: 187727.", + "lang" : "eng" + } + ] + }, + "CVE_data_meta" : { + "ID" : "CVE-2020-4717", + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-03-09T00:00:00" + }, + "data_type" : "CVE", + "data_format" : "MITRE" +} diff --git a/2020/5xxx/CVE-2020-5016.json b/2020/5xxx/CVE-2020-5016.json index 7349f1ac1ab..6f07985b399 100644 --- a/2020/5xxx/CVE-2020-5016.json +++ b/2020/5xxx/CVE-2020-5016.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-5016", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6427873 (WebSphere Application Server)", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6427873", + "name" : "https://www.ibm.com/support/pages/node/6427873" + }, + { + "name" : "ibm-websphere-cve20205016-info-disc (193556)", + "title" : "X-Force Vulnerability Report", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193556", + "refsource" : "XF" + } + ] + }, + "description" : { + "description_data" : [ + { + "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. When application security is disabled and JAX-RPC applications are present, an attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary xml files on the system. This does not occur if Application security is enabled. IBM X-Force ID: 193556.", + "lang" : "eng" + } + ] + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "WebSphere Application Server", + "version" : { + "version_data" : [ + { + "version_value" : "7.0" + }, + { + "version_value" : "8.0" + }, + { + "version_value" : "8.5" + }, + { + "version_value" : "9.0" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "impact" : { + "cvssv3" : { + "BM" : { + "A" : "N", + "I" : "N", + "PR" : "L", + "SCORE" : "5.300", + "C" : "H", + "S" : "U", + "AC" : "H", + "AV" : "N", + "UI" : "N" + }, + "TM" : { + "RC" : "C", + "E" : "U", + "RL" : "O" + } + } + }, + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-03-09T00:00:00", + "STATE" : "PUBLIC", + "ID" : "CVE-2020-5016" + }, + "data_type" : "CVE", + "data_format" : "MITRE" +} From 52dc675bdec8e44fd608dd6fdbe6ca72896a7ec7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 15:00:42 +0000 Subject: [PATCH 234/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35752.json | 66 +++++++++++++++++++++--- 2021/21xxx/CVE-2021-21491.json | 91 ++++++++++++++++++++++++++++++++-- 2021/28xxx/CVE-2021-28122.json | 66 +++++++++++++++++++++--- 2021/28xxx/CVE-2021-28126.json | 18 +++++++ 4 files changed, 226 insertions(+), 15 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28126.json diff --git a/2020/35xxx/CVE-2020-35752.json b/2020/35xxx/CVE-2020-35752.json index 1027e64ef2c..db34818980d 100644 --- a/2020/35xxx/CVE-2020-35752.json +++ b/2020/35xxx/CVE-2020-35752.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35752", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35752", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Baby Care System 1.0 is affected by a cross-site scripting (XSS) vulnerability in the Edit Page tab through the Post title parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/download-code?nid=14622&title=Baby+Care+System+in+PHP%2FMySQLi+with+Full+Source+Code+", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/download-code?nid=14622&title=Baby+Care+System+in+PHP%2FMySQLi+with+Full+Source+Code+" + }, + { + "url": "https://www.sourcecodester.com/php/14622/baby-care-system-phpmysqli-full-source-code.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14622/baby-care-system-phpmysqli-full-source-code.html" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49358", + "url": "https://www.exploit-db.com/exploits/49358" } ] } diff --git a/2021/21xxx/CVE-2021-21491.json b/2021/21xxx/CVE-2021-21491.json index 437cff503af..b2e9de9bdae 100644 --- a/2021/21xxx/CVE-2021-21491.json +++ b/2021/21xxx/CVE-2021-21491.json @@ -4,14 +4,99 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21491", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP NetWeaver Application Server Java (Applications based on Web Dynpro Java)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "7.00" + }, + { + "version_name": "<", + "version_value": "7.10" + }, + { + "version_name": "<", + "version_value": "7.11" + }, + { + "version_name": "<", + "version_value": "7.20" + }, + { + "version_name": "<", + "version_value": "7.30" + }, + { + "version_name": "<", + "version_value": "731" + }, + { + "version_name": "<", + "version_value": "7.40" + }, + { + "version_name": "<", + "version_value": "7.50" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.7", + "vectorString": "CVSS:/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reverse Tabnabbing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2976947", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2976947" } ] } diff --git a/2021/28xxx/CVE-2021-28122.json b/2021/28xxx/CVE-2021-28122.json index 108ac5207d6..35d9357d293 100644 --- a/2021/28xxx/CVE-2021-28122.json +++ b/2021/28xxx/CVE-2021-28122.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28122", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28122", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.0. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/open5gs/open5gs/releases", + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/issues/837", + "url": "https://github.com/open5gs/open5gs/issues/837" + }, + { + "refsource": "MISC", + "name": "https://github.com/open5gs/open5gs/pull/838", + "url": "https://github.com/open5gs/open5gs/pull/838" } ] } diff --git a/2021/28xxx/CVE-2021-28126.json b/2021/28xxx/CVE-2021-28126.json new file mode 100644 index 00000000000..b2715422709 --- /dev/null +++ b/2021/28xxx/CVE-2021-28126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 84101babda07a64c4be839c16519b758c21b9bca Mon Sep 17 00:00:00 2001 From: Neal Poole Date: Wed, 10 Mar 2021 10:32:13 -0500 Subject: [PATCH 235/845] Publish CVE-2021-24030 for Facebook Gameroom --- 2021/24xxx/CVE-2021-24030.json | 84 +++++++++++++++++++++++++++------- 1 file changed, 67 insertions(+), 17 deletions(-) diff --git a/2021/24xxx/CVE-2021-24030.json b/2021/24xxx/CVE-2021-24030.json index c512862bf39..3bc902e2a8b 100644 --- a/2021/24xxx/CVE-2021-24030.json +++ b/2021/24xxx/CVE-2021-24030.json @@ -1,18 +1,68 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24030", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2021-02-25", + "ID": "CVE-2021-24030", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "Facebook Gameroom", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "1.26.0" + }, + { + "version_affected": "<", + "version_value": "1.26.0" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The fbgames protocol handler registered as part of Facebook Gameroom does not properly quote arguments passed to the executable. That allows a malicious URL to cause code execution. This issue affects versions prior to v1.26.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (CWE-88)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.facebook.com/security/advisories/cve-2021-24030", + "url": "https://www.facebook.com/security/advisories/cve-2021-24030" + } + ] + } +} From a443a7c36093756e78e623826b7b323d52fc1078 Mon Sep 17 00:00:00 2001 From: Neal Poole Date: Wed, 10 Mar 2021 10:43:53 -0500 Subject: [PATCH 236/845] Publish some HHVM CVEs --- 2020/1xxx/CVE-2020-1916.json | 137 +++++++++++++++++++++++++++---- 2020/1xxx/CVE-2020-1917.json | 145 +++++++++++++++++++++++++++++---- 2020/1xxx/CVE-2020-1918.json | 145 +++++++++++++++++++++++++++++---- 2020/1xxx/CVE-2020-1919.json | 145 +++++++++++++++++++++++++++++---- 2020/1xxx/CVE-2020-1921.json | 145 +++++++++++++++++++++++++++++---- 2021/24xxx/CVE-2021-24025.json | 145 +++++++++++++++++++++++++++++---- 6 files changed, 760 insertions(+), 102 deletions(-) diff --git a/2020/1xxx/CVE-2020-1916.json b/2020/1xxx/CVE-2020-1916.json index 0450552d7eb..ae7dd906819 100644 --- a/2020/1xxx/CVE-2020-1916.json +++ b/2020/1xxx/CVE-2020-1916.json @@ -1,18 +1,121 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1916", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-10-30", + "ID": "CVE-2020-1916", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.83.1" + }, + { + "version_affected": "=", + "version_value": "4.83.0" + }, + { + "version_affected": "!>=", + "version_value": "4.82.1" + }, + { + "version_affected": "=", + "version_value": "4.82.0" + }, + { + "version_affected": "!>=", + "version_value": "4.81.1" + }, + { + "version_affected": "=", + "version_value": "4.81.0" + }, + { + "version_affected": "!>=", + "version_value": "4.80.1" + }, + { + "version_affected": "=", + "version_value": "4.80.0" + }, + { + "version_affected": "!>=", + "version_value": "4.79.1" + }, + { + "version_affected": "=", + "version_value": "4.79.0" + }, + { + "version_affected": "!>=", + "version_value": "4.78.1" + }, + { + "version_affected": ">=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.2" + }, + { + "version_affected": "<", + "version_value": "4.56.2" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow (CWE-122)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://hhvm.com/blog/2020/11/12/security-update.html", + "url": "https://hhvm.com/blog/2020/11/12/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4", + "url": "https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4" + } + ] + } +} diff --git a/2020/1xxx/CVE-2020-1917.json b/2020/1xxx/CVE-2020-1917.json index f05359f3e97..61c7ab00961 100644 --- a/2020/1xxx/CVE-2020-1917.json +++ b/2020/1xxx/CVE-2020-1917.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1917", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-11-11", + "ID": "CVE-2020-1917", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.98.1" + }, + { + "version_affected": "=", + "version_value": "4.98.0" + }, + { + "version_affected": "!>=", + "version_value": "4.97.1" + }, + { + "version_affected": "=", + "version_value": "4.97.0" + }, + { + "version_affected": "!>=", + "version_value": "4.96.1" + }, + { + "version_affected": "=", + "version_value": "4.96.0" + }, + { + "version_affected": "!>=", + "version_value": "4.95.1" + }, + { + "version_affected": "=", + "version_value": "4.95.0" + }, + { + "version_affected": "!>=", + "version_value": "4.94.1" + }, + { + "version_affected": "=", + "version_value": "4.94.0" + }, + { + "version_affected": "!>=", + "version_value": "4.93.2" + }, + { + "version_affected": ">=", + "version_value": "4.81.0" + }, + { + "version_affected": "!>=", + "version_value": "4.80.2" + }, + { + "version_affected": ">=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.3" + }, + { + "version_affected": "<", + "version_value": "4.56.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow (CWE-122)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hhvm.com/blog/2021/02/25/security-update.html", + "url": "https://hhvm.com/blog/2021/02/25/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", + "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" + } + ] + } +} diff --git a/2020/1xxx/CVE-2020-1918.json b/2020/1xxx/CVE-2020-1918.json index e14becedf7b..2ba2564e73b 100644 --- a/2020/1xxx/CVE-2020-1918.json +++ b/2020/1xxx/CVE-2020-1918.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1918", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-11-15", + "ID": "CVE-2020-1918", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.98.1" + }, + { + "version_affected": "=", + "version_value": "4.98.0" + }, + { + "version_affected": "!>=", + "version_value": "4.97.1" + }, + { + "version_affected": "=", + "version_value": "4.97.0" + }, + { + "version_affected": "!>=", + "version_value": "4.96.1" + }, + { + "version_affected": "=", + "version_value": "4.96.0" + }, + { + "version_affected": "!>=", + "version_value": "4.95.1" + }, + { + "version_affected": "=", + "version_value": "4.95.0" + }, + { + "version_affected": "!>=", + "version_value": "4.94.1" + }, + { + "version_affected": "=", + "version_value": "4.94.0" + }, + { + "version_affected": "!>=", + "version_value": "4.93.2" + }, + { + "version_affected": ">=", + "version_value": "4.81.0" + }, + { + "version_affected": "!>=", + "version_value": "4.80.2" + }, + { + "version_affected": ">=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.3" + }, + { + "version_affected": "<", + "version_value": "4.56.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In-memory file operations (ie: using fopen on a data URI) did not properly restrict negative seeking, allowing for the reading of memory prior to the in-memory buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Under-read (CWE-127)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hhvm.com/blog/2021/02/25/security-update.html", + "url": "https://hhvm.com/blog/2021/02/25/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", + "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" + } + ] + } +} diff --git a/2020/1xxx/CVE-2020-1919.json b/2020/1xxx/CVE-2020-1919.json index c61f80049d0..f76cc63679f 100644 --- a/2020/1xxx/CVE-2020-1919.json +++ b/2020/1xxx/CVE-2020-1919.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1919", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-12-11", + "ID": "CVE-2020-1919", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.98.1" + }, + { + "version_affected": "=", + "version_value": "4.98.0" + }, + { + "version_affected": "!>=", + "version_value": "4.97.1" + }, + { + "version_affected": "=", + "version_value": "4.97.0" + }, + { + "version_affected": "!>=", + "version_value": "4.96.1" + }, + { + "version_affected": "=", + "version_value": "4.96.0" + }, + { + "version_affected": "!>=", + "version_value": "4.95.1" + }, + { + "version_affected": "=", + "version_value": "4.95.0" + }, + { + "version_affected": "!>=", + "version_value": "4.94.1" + }, + { + "version_affected": "=", + "version_value": "4.94.0" + }, + { + "version_affected": "!>=", + "version_value": "4.93.2" + }, + { + "version_affected": ">=", + "version_value": "4.81.0" + }, + { + "version_affected": "!>=", + "version_value": "4.80.2" + }, + { + "version_affected": ">=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.3" + }, + { + "version_affected": "<", + "version_value": "4.56.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hhvm.com/blog/2021/02/25/security-update.html", + "url": "https://hhvm.com/blog/2021/02/25/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", + "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" + } + ] + } +} diff --git a/2020/1xxx/CVE-2020-1921.json b/2020/1xxx/CVE-2020-1921.json index f42578e2ac9..547f3c20e26 100644 --- a/2020/1xxx/CVE-2020-1921.json +++ b/2020/1xxx/CVE-2020-1921.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1921", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-12-14", + "ID": "CVE-2020-1921", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.98.1" + }, + { + "version_affected": "=", + "version_value": "4.98.0" + }, + { + "version_affected": "!>=", + "version_value": "4.97.1" + }, + { + "version_affected": "=", + "version_value": "4.97.0" + }, + { + "version_affected": "!>=", + "version_value": "4.96.1" + }, + { + "version_affected": "=", + "version_value": "4.96.0" + }, + { + "version_affected": "!>=", + "version_value": "4.95.1" + }, + { + "version_affected": "=", + "version_value": "4.95.0" + }, + { + "version_affected": "!>=", + "version_value": "4.94.1" + }, + { + "version_affected": "=", + "version_value": "4.94.0" + }, + { + "version_affected": "!>=", + "version_value": "4.93.2" + }, + { + "version_affected": ">=", + "version_value": "4.81.0" + }, + { + "version_affected": "!>=", + "version_value": "4.80.2" + }, + { + "version_affected": ">=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.3" + }, + { + "version_affected": "<", + "version_value": "4.56.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Stack-based Buffer Overflow (CWE-121)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hhvm.com/blog/2021/02/25/security-update.html", + "url": "https://hhvm.com/blog/2021/02/25/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", + "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" + } + ] + } +} diff --git a/2021/24xxx/CVE-2021-24025.json b/2021/24xxx/CVE-2021-24025.json index 04b5b6c8679..8aa97380b49 100644 --- a/2021/24xxx/CVE-2021-24025.json +++ b/2021/24xxx/CVE-2021-24025.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24025", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2021-01-27", + "ID": "CVE-2021-24025", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.98.1" + }, + { + "version_affected": "=", + "version_value": "4.98.0" + }, + { + "version_affected": "!>=", + "version_value": "4.97.1" + }, + { + "version_affected": "=", + "version_value": "4.97.0" + }, + { + "version_affected": "!>=", + "version_value": "4.96.1" + }, + { + "version_affected": "=", + "version_value": "4.96.0" + }, + { + "version_affected": "!>=", + "version_value": "4.95.1" + }, + { + "version_affected": "=", + "version_value": "4.95.0" + }, + { + "version_affected": "!>=", + "version_value": "4.94.1" + }, + { + "version_affected": "=", + "version_value": "4.94.0" + }, + { + "version_affected": "!>=", + "version_value": "4.93.2" + }, + { + "version_affected": ">=", + "version_value": "4.81.0" + }, + { + "version_affected": "!>=", + "version_value": "4.80.2" + }, + { + "version_affected": ">=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.3" + }, + { + "version_affected": "<", + "version_value": "4.56.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow (CWE-122)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hhvm.com/blog/2021/02/25/security-update.html", + "url": "https://hhvm.com/blog/2021/02/25/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca", + "url": "https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca" + } + ] + } +} From e788b9b8ad28d70e94571a9c0010fdae854ab404 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 16:00:44 +0000 Subject: [PATCH 237/845] "-Synchronized-Data." --- 2015/6xxx/CVE-2015-6420.json | 5 + 2018/10xxx/CVE-2018-10237.json | 5 + 2020/0xxx/CVE-2020-0025.json | 62 +++++++++++ 2020/13xxx/CVE-2020-13949.json | 5 + 2020/27xxx/CVE-2020-27216.json | 5 + 2020/27xxx/CVE-2020-27218.json | 5 + 2020/4xxx/CVE-2020-4717.json | 174 +++++++++++++++--------------- 2020/5xxx/CVE-2020-5016.json | 192 ++++++++++++++++----------------- 2021/0xxx/CVE-2021-0368.json | 50 ++++++++- 2021/0xxx/CVE-2021-0369.json | 50 ++++++++- 2021/0xxx/CVE-2021-0370.json | 50 ++++++++- 2021/0xxx/CVE-2021-0371.json | 50 ++++++++- 2021/0xxx/CVE-2021-0372.json | 50 ++++++++- 2021/0xxx/CVE-2021-0374.json | 50 ++++++++- 2021/0xxx/CVE-2021-0375.json | 50 ++++++++- 2021/0xxx/CVE-2021-0376.json | 50 ++++++++- 2021/0xxx/CVE-2021-0377.json | 50 ++++++++- 2021/0xxx/CVE-2021-0390.json | 50 ++++++++- 2021/0xxx/CVE-2021-0391.json | 50 ++++++++- 2021/0xxx/CVE-2021-0392.json | 50 ++++++++- 2021/0xxx/CVE-2021-0393.json | 50 ++++++++- 2021/0xxx/CVE-2021-0394.json | 50 ++++++++- 2021/0xxx/CVE-2021-0395.json | 50 ++++++++- 2021/0xxx/CVE-2021-0396.json | 50 ++++++++- 2021/0xxx/CVE-2021-0397.json | 50 ++++++++- 2021/0xxx/CVE-2021-0398.json | 50 ++++++++- 2021/0xxx/CVE-2021-0399.json | 50 ++++++++- 2021/20xxx/CVE-2021-20265.json | 55 +++++++++- 2021/28xxx/CVE-2021-28127.json | 18 ++++ 2021/28xxx/CVE-2021-28128.json | 18 ++++ 30 files changed, 1251 insertions(+), 243 deletions(-) create mode 100644 2020/0xxx/CVE-2020-0025.json create mode 100644 2021/28xxx/CVE-2021-28127.json create mode 100644 2021/28xxx/CVE-2021-28128.json diff --git a/2015/6xxx/CVE-2015-6420.json b/2015/6xxx/CVE-2015-6420.json index d57736eb611..15a87c00cc7 100644 --- a/2015/6xxx/CVE-2015-6420.json +++ b/2015/6xxx/CVE-2015-6420.json @@ -91,6 +91,11 @@ "name": "https://www.tenable.com/security/research/tra-2017-14", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2017-14" + }, + { + "refsource": "MLIST", + "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", + "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" } ] } diff --git a/2018/10xxx/CVE-2018-10237.json b/2018/10xxx/CVE-2018-10237.json index 6a2caf0594a..06cff29e1ad 100644 --- a/2018/10xxx/CVE-2018-10237.json +++ b/2018/10xxx/CVE-2018-10237.json @@ -286,6 +286,11 @@ "refsource": "MLIST", "name": "[flink-issues] 20210212 [jira] [Closed] (FLINK-18841) CVE-2018-10237 and CWE-400 occurred in flink dependency", "url": "https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", + "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" } ] } diff --git a/2020/0xxx/CVE-2020-0025.json b/2020/0xxx/CVE-2020-0025.json new file mode 100644 index 00000000000..335ea5f7796 --- /dev/null +++ b/2020/0xxx/CVE-2020-0025.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0025", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In deletePackageVersionedInternal of PackageManagerService.java, there is a possible way to exit Screen Pinning due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-135604684" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index b60a277e652..126468ec129 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -148,6 +148,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210309 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210310 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 7bf2128e535..3ad196ed331 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -435,6 +435,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210309 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", + "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27218.json b/2020/27xxx/CVE-2020-27218.json index d2427e64177..13f30b9ef83 100644 --- a/2020/27xxx/CVE-2020-27218.json +++ b/2020/27xxx/CVE-2020-27218.json @@ -612,6 +612,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", "url": "https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", + "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" } ] } diff --git a/2020/4xxx/CVE-2020-4717.json b/2020/4xxx/CVE-2020-4717.json index b81134c1be5..75700988ae9 100644 --- a/2020/4xxx/CVE-2020-4717.json +++ b/2020/4xxx/CVE-2020-4717.json @@ -1,90 +1,90 @@ { - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "Subscription" - } - ] - }, - "product_name" : "SPSS Modeler" - } - ] - } + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RL" : "O", - "RC" : "C" - }, - "BM" : { - "AV" : "L", - "AC" : "L", - "UI" : "N", - "I" : "H", - "A" : "N", - "PR" : "N", - "S" : "U", - "SCORE" : "6.200", - "C" : "N" - } - } - }, - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6427901", - "url" : "https://www.ibm.com/support/pages/node/6427901", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6427901 (SPSS Modeler)" - }, - { - "name" : "ibm-spss-cve20204717-symlink (187727)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/187727" - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "A vulnerability exists in IBM SPSS Modeler Subscription Installer that allows a user with create symbolic link permission to write arbitrary file in another protected path during product installation. IBM X-Force ID: 187727.", - "lang" : "eng" - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-4717", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-03-09T00:00:00" - }, - "data_type" : "CVE", - "data_format" : "MITRE" -} + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "Subscription" + } + ] + }, + "product_name": "SPSS Modeler" + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RL": "O", + "RC": "C" + }, + "BM": { + "AV": "L", + "AC": "L", + "UI": "N", + "I": "H", + "A": "N", + "PR": "N", + "S": "U", + "SCORE": "6.200", + "C": "N" + } + } + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6427901", + "url": "https://www.ibm.com/support/pages/node/6427901", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6427901 (SPSS Modeler)" + }, + { + "name": "ibm-spss-cve20204717-symlink (187727)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/187727" + } + ] + }, + "description": { + "description_data": [ + { + "value": "A vulnerability exists in IBM SPSS Modeler Subscription Installer that allows a user with create symbolic link permission to write arbitrary file in another protected path during product installation. IBM X-Force ID: 187727.", + "lang": "eng" + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2020-4717", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-03-09T00:00:00" + }, + "data_type": "CVE", + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5016.json b/2020/5xxx/CVE-2020-5016.json index 6f07985b399..c33ce6d673d 100644 --- a/2020/5xxx/CVE-2020-5016.json +++ b/2020/5xxx/CVE-2020-5016.json @@ -1,99 +1,99 @@ { - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6427873 (WebSphere Application Server)", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6427873", - "name" : "https://www.ibm.com/support/pages/node/6427873" - }, - { - "name" : "ibm-websphere-cve20205016-info-disc (193556)", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193556", - "refsource" : "XF" - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. When application security is disabled and JAX-RPC applications are present, an attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary xml files on the system. This does not occur if Application security is enabled. IBM X-Force ID: 193556.", - "lang" : "eng" - } - ] - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "WebSphere Application Server", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "8.0" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "9.0" - } - ] - } - } - ] - } + "title": "IBM Security Bulletin 6427873 (WebSphere Application Server)", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6427873", + "name": "https://www.ibm.com/support/pages/node/6427873" + }, + { + "name": "ibm-websphere-cve20205016-info-disc (193556)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193556", + "refsource": "XF" } - ] - } - }, - "impact" : { - "cvssv3" : { - "BM" : { - "A" : "N", - "I" : "N", - "PR" : "L", - "SCORE" : "5.300", - "C" : "H", - "S" : "U", - "AC" : "H", - "AV" : "N", - "UI" : "N" - }, - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - } - } - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-03-09T00:00:00", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-5016" - }, - "data_type" : "CVE", - "data_format" : "MITRE" -} + ] + }, + "description": { + "description_data": [ + { + "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. When application security is disabled and JAX-RPC applications are present, an attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary xml files on the system. This does not occur if Application security is enabled. IBM X-Force ID: 193556.", + "lang": "eng" + } + ] + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "WebSphere Application Server", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "8.0" + }, + { + "version_value": "8.5" + }, + { + "version_value": "9.0" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "BM": { + "A": "N", + "I": "N", + "PR": "L", + "SCORE": "5.300", + "C": "H", + "S": "U", + "AC": "H", + "AV": "N", + "UI": "N" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-03-09T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2020-5016" + }, + "data_type": "CVE", + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2021/0xxx/CVE-2021-0368.json b/2021/0xxx/CVE-2021-0368.json index 83c97719332..95590196075 100644 --- a/2021/0xxx/CVE-2021-0368.json +++ b/2021/0xxx/CVE-2021-0368.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0368", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In oggpack_look of bitwise.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169829774" } ] } diff --git a/2021/0xxx/CVE-2021-0369.json b/2021/0xxx/CVE-2021-0369.json index 3f96839c5ba..92dca222fad 100644 --- a/2021/0xxx/CVE-2021-0369.json +++ b/2021/0xxx/CVE-2021-0369.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0369", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In CrossProfileAppsServiceImpl.java, there is the possibility of an application's INTERACT_ACROSS_PROFILES grant state not displaying properly in the setting UI due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-166561076" } ] } diff --git a/2021/0xxx/CVE-2021-0370.json b/2021/0xxx/CVE-2021-0370.json index 8890ce187a1..0a43443e9f4 100644 --- a/2021/0xxx/CVE-2021-0370.json +++ b/2021/0xxx/CVE-2021-0370.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0370", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Write of NxpMfcReader.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the NFC server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169259605" } ] } diff --git a/2021/0xxx/CVE-2021-0371.json b/2021/0xxx/CVE-2021-0371.json index f197ba1297e..c7758a9b054 100644 --- a/2021/0xxx/CVE-2021-0371.json +++ b/2021/0xxx/CVE-2021-0371.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0371", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In nci_proc_rf_management_ntf of nci_hrcv.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-164440989" } ] } diff --git a/2021/0xxx/CVE-2021-0372.json b/2021/0xxx/CVE-2021-0372.json index 8e6d28327ce..41eafdbd1c2 100644 --- a/2021/0xxx/CVE-2021-0372.json +++ b/2021/0xxx/CVE-2021-0372.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0372", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In getMediaOutputSliceAction of RemoteMediaSlice.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174047735" } ] } diff --git a/2021/0xxx/CVE-2021-0374.json b/2021/0xxx/CVE-2021-0374.json index 0b17c524a26..a82fc737613 100644 --- a/2021/0xxx/CVE-2021-0374.json +++ b/2021/0xxx/CVE-2021-0374.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0374", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169572641" } ] } diff --git a/2021/0xxx/CVE-2021-0375.json b/2021/0xxx/CVE-2021-0375.json index b752e982f4c..3227e8aaf70 100644 --- a/2021/0xxx/CVE-2021-0375.json +++ b/2021/0xxx/CVE-2021-0375.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0375", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onPackageModified of VoiceInteractionManagerService.java, there is a possible change of default applications due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-167261484" } ] } diff --git a/2021/0xxx/CVE-2021-0376.json b/2021/0xxx/CVE-2021-0376.json index 7c660f1f007..d5825e290d7 100644 --- a/2021/0xxx/CVE-2021-0376.json +++ b/2021/0xxx/CVE-2021-0376.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0376", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In checkUriPermission and related functions of MediaProvider.java, there is a possible way to access external files due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-115619667" } ] } diff --git a/2021/0xxx/CVE-2021-0377.json b/2021/0xxx/CVE-2021-0377.json index 2ca042e00cd..9b80d71833e 100644 --- a/2021/0xxx/CVE-2021-0377.json +++ b/2021/0xxx/CVE-2021-0377.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0377", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In DeltaPerformer::Write of delta_performer.cc, there is a possible use of untrusted input due to improper input validation. This could lead to a local bypass of defense in depth protections with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160800689" } ] } diff --git a/2021/0xxx/CVE-2021-0390.json b/2021/0xxx/CVE-2021-0390.json index 9cf9a0d888a..a560f1c0a62 100644 --- a/2021/0xxx/CVE-2021-0390.json +++ b/2021/0xxx/CVE-2021-0390.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0390", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461" } ] } diff --git a/2021/0xxx/CVE-2021-0391.json b/2021/0xxx/CVE-2021-0391.json index f470b13a7f3..fabea43ba00 100644 --- a/2021/0xxx/CVE-2021-0391.json +++ b/2021/0xxx/CVE-2021-0391.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0391", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550" } ] } diff --git a/2021/0xxx/CVE-2021-0392.json b/2021/0xxx/CVE-2021-0392.json index 31c97e3eb02..28e8bace324 100644 --- a/2021/0xxx/CVE-2021-0392.json +++ b/2021/0xxx/CVE-2021-0392.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0392", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-10 Android-11 Android-9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730" } ] } diff --git a/2021/0xxx/CVE-2021-0393.json b/2021/0xxx/CVE-2021-0393.json index 86003baa9e5..0df7746b706 100644 --- a/2021/0xxx/CVE-2021-0393.json +++ b/2021/0xxx/CVE-2021-0393.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0393", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375" } ] } diff --git a/2021/0xxx/CVE-2021-0394.json b/2021/0xxx/CVE-2021-0394.json index d2ba55f4f73..a5f141ecb9a 100644 --- a/2021/0xxx/CVE-2021-0394.json +++ b/2021/0xxx/CVE-2021-0394.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0394", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291" } ] } diff --git a/2021/0xxx/CVE-2021-0395.json b/2021/0xxx/CVE-2021-0395.json index b50db9b4d56..501d5f56ba7 100644 --- a/2021/0xxx/CVE-2021-0395.json +++ b/2021/0xxx/CVE-2021-0395.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0395", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In StopServicesAndLogViolations of reboot.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-170315126" } ] } diff --git a/2021/0xxx/CVE-2021-0396.json b/2021/0xxx/CVE-2021-0396.json index 2990e2a8460..6b231eb5980 100644 --- a/2021/0xxx/CVE-2021-0396.json +++ b/2021/0xxx/CVE-2021-0396.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0396", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-8.1 Android-9 Android-10 Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106" } ] } diff --git a/2021/0xxx/CVE-2021-0397.json b/2021/0xxx/CVE-2021-0397.json index f595184ca7e..90cfa6e1677 100644 --- a/2021/0xxx/CVE-2021-0397.json +++ b/2021/0xxx/CVE-2021-0397.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0397", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11 Android-8.1 Android-9 Android-10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148" } ] } diff --git a/2021/0xxx/CVE-2021-0398.json b/2021/0xxx/CVE-2021-0398.json index a454b8e7690..d111fd4ce00 100644 --- a/2021/0xxx/CVE-2021-0398.json +++ b/2021/0xxx/CVE-2021-0398.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In bindServiceLocked of ActiveServices.java, there is a possible foreground service launch due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-173516292" } ] } diff --git a/2021/0xxx/CVE-2021-0399.json b/2021/0xxx/CVE-2021-0399.json index 286a79a8e3f..96251779e94 100644 --- a/2021/0xxx/CVE-2021-0399.json +++ b/2021/0xxx/CVE-2021-0399.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0399", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/2021-03-01", + "url": "https://source.android.com/security/bulletin/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel" } ] } diff --git a/2021/20xxx/CVE-2021-20265.json b/2021/20xxx/CVE-2021-20265.json index b9269f0d1d0..8dd9d8a2492 100644 --- a/2021/20xxx/CVE-2021-20265.json +++ b/2021/20xxx/CVE-2021-20265.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20265", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "Linux kernel 4.5-rc3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1908827", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908827" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa0dc04df259ba2df3ce1920e9690c7842f8fa4b", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa0dc04df259ba2df3ce1920e9690c7842f8fa4b" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/28xxx/CVE-2021-28127.json b/2021/28xxx/CVE-2021-28127.json new file mode 100644 index 00000000000..31a2630fdf4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28128.json b/2021/28xxx/CVE-2021-28128.json new file mode 100644 index 00000000000..c18c8734cc3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 23daf507d2e4a4d4490f71c5c8f4db4f8f091378 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 16:00:59 +0000 Subject: [PATCH 238/845] "-Synchronized-Data." --- 2021/0xxx/CVE-2021-0378.json | 50 +++++++++++++++++++++++++++++++++--- 1 file changed, 47 insertions(+), 3 deletions(-) diff --git a/2021/0xxx/CVE-2021-0378.json b/2021/0xxx/CVE-2021-0378.json index afa9c6c97ca..63bee434ad4 100644 --- a/2021/0xxx/CVE-2021-0378.json +++ b/2021/0xxx/CVE-2021-0378.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0378", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In getNbits of pvmp3_getbits.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154076193" } ] } From 98a0e4d41ce7fc23567a7b04e5911705b559c74a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 17:00:44 +0000 Subject: [PATCH 239/845] "-Synchronized-Data." --- 2018/13xxx/CVE-2018-13380.json | 4 +-- 2020/13xxx/CVE-2020-13949.json | 5 ++++ 2021/0xxx/CVE-2021-0379.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0380.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0381.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0382.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0383.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0384.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0385.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0386.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0387.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0388.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0389.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0449.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0450.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0451.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0452.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0453.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0454.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0455.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0456.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0457.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0458.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0459.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0460.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0461.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0462.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0463.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0464.json | 50 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0465.json | 50 ++++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20205.json | 50 ++++++++++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21772.json | 50 ++++++++++++++++++++++++++++++++-- 2021/28xxx/CVE-2021-28129.json | 18 ++++++++++++ 2021/28xxx/CVE-2021-28130.json | 18 ++++++++++++ 2021/28xxx/CVE-2021-28131.json | 18 ++++++++++++ 35 files changed, 1471 insertions(+), 92 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28129.json create mode 100644 2021/28xxx/CVE-2021-28130.json create mode 100644 2021/28xxx/CVE-2021-28131.json diff --git a/2018/13xxx/CVE-2018-13380.json b/2018/13xxx/CVE-2018-13380.json index 596ab4a974e..04e1fdb81d1 100644 --- a/2018/13xxx/CVE-2018-13380.json +++ b/2018/13xxx/CVE-2018-13380.json @@ -76,8 +76,8 @@ "description_data": [ { "lang": "eng", - "value": "A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below and Fortinet FortiProxy 2.0.0, 1.2.8 and below under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters." + "value": "A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below and Fortinet FortiProxy 2.0.0, 1.2.8 and below under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters." } ] } -} +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 126468ec129..aef8164c710 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -153,6 +153,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210310 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210310 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2021/0xxx/CVE-2021-0379.json b/2021/0xxx/CVE-2021-0379.json index 187f4092fb1..75a8cc30b36 100644 --- a/2021/0xxx/CVE-2021-0379.json +++ b/2021/0xxx/CVE-2021-0379.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0379", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In getUpTo17bits of pvmp3_getbits.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154075955" } ] } diff --git a/2021/0xxx/CVE-2021-0380.json b/2021/0xxx/CVE-2021-0380.json index 7295c0343df..9bdf4271dc9 100644 --- a/2021/0xxx/CVE-2021-0380.json +++ b/2021/0xxx/CVE-2021-0380.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0380", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onReceive of DcTracker.java, there is a possible way to trigger a provisioning URL and modify other telephony settings due to a missing permission check. This could lead to local escalation of privilege during the onboarding flow with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-172459128" } ] } diff --git a/2021/0xxx/CVE-2021-0381.json b/2021/0xxx/CVE-2021-0381.json index 706cca11855..bad218b6754 100644 --- a/2021/0xxx/CVE-2021-0381.json +++ b/2021/0xxx/CVE-2021-0381.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0381", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In updateNotifications of DeviceStorageMonitorService.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153466381" } ] } diff --git a/2021/0xxx/CVE-2021-0382.json b/2021/0xxx/CVE-2021-0382.json index 2dd16ad11a0..7d6ccd5dd0b 100644 --- a/2021/0xxx/CVE-2021-0382.json +++ b/2021/0xxx/CVE-2021-0382.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0382", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In checkSlicePermission of SliceManagerService.java, there is a possible resource exposure due to an incorrect permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-140727941" } ] } diff --git a/2021/0xxx/CVE-2021-0383.json b/2021/0xxx/CVE-2021-0383.json index ae8e612360a..4ae4987c097 100644 --- a/2021/0xxx/CVE-2021-0383.json +++ b/2021/0xxx/CVE-2021-0383.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0383", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In done of CaptivePortalLoginActivity.java, there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160871056" } ] } diff --git a/2021/0xxx/CVE-2021-0384.json b/2021/0xxx/CVE-2021-0384.json index 4caf934eb1c..91ee33448ab 100644 --- a/2021/0xxx/CVE-2021-0384.json +++ b/2021/0xxx/CVE-2021-0384.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0384", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In read_and_discard_scanlines of jdapistd.c, there is a possible null pointer exception due to a missing NULL check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-173702583" } ] } diff --git a/2021/0xxx/CVE-2021-0385.json b/2021/0xxx/CVE-2021-0385.json index fb335f70a81..f2e82ba66d5 100644 --- a/2021/0xxx/CVE-2021-0385.json +++ b/2021/0xxx/CVE-2021-0385.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0385", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In createConnectToAvailableNetworkNotification of ConnectToNetworkNotificationBuilder.java, there is a possible connection to untrusted WiFi networks due to notification interaction above the lockscreen. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-172584372" } ] } diff --git a/2021/0xxx/CVE-2021-0386.json b/2021/0xxx/CVE-2021-0386.json index 560485ea4e6..8845f0efa40 100644 --- a/2021/0xxx/CVE-2021-0386.json +++ b/2021/0xxx/CVE-2021-0386.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0386", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onCreate of UsbConfirmActivity, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-173421110" } ] } diff --git a/2021/0xxx/CVE-2021-0387.json b/2021/0xxx/CVE-2021-0387.json index 2cef623d9af..bf4116f2a4e 100644 --- a/2021/0xxx/CVE-2021-0387.json +++ b/2021/0xxx/CVE-2021-0387.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0387", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In FindQuotaDeviceForUuid of QuotaUtils.cpp, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169421939" } ] } diff --git a/2021/0xxx/CVE-2021-0388.json b/2021/0xxx/CVE-2021-0388.json index 59ef2e556dc..da5c11a716b 100644 --- a/2021/0xxx/CVE-2021-0388.json +++ b/2021/0xxx/CVE-2021-0388.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0388", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onReceive of ImsPhoneCallTracker.java, there is a possible misattribution of data usage due to an incorrect broadcast handler. This could lead to local escalation of privilege resulting in attributing video call data to the wrong app, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162741489" } ] } diff --git a/2021/0xxx/CVE-2021-0389.json b/2021/0xxx/CVE-2021-0389.json index bb5d1ce5606..bbec527b010 100644 --- a/2021/0xxx/CVE-2021-0389.json +++ b/2021/0xxx/CVE-2021-0389.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0389", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In setNightModeActivated of UiModeManagerService.java, there is a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168039904" } ] } diff --git a/2021/0xxx/CVE-2021-0449.json b/2021/0xxx/CVE-2021-0449.json index f39890859e9..38dcd0d44a1 100644 --- a/2021/0xxx/CVE-2021-0449.json +++ b/2021/0xxx/CVE-2021-0449.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0449", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Titan M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117965" } ] } diff --git a/2021/0xxx/CVE-2021-0450.json b/2021/0xxx/CVE-2021-0450.json index dc08bd2f861..7d284a30699 100644 --- a/2021/0xxx/CVE-2021-0450.json +++ b/2021/0xxx/CVE-2021-0450.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0450", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Titan M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117880" } ] } diff --git a/2021/0xxx/CVE-2021-0451.json b/2021/0xxx/CVE-2021-0451.json index f856d086905..8e84f911cb3 100644 --- a/2021/0xxx/CVE-2021-0451.json +++ b/2021/0xxx/CVE-2021-0451.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0451", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Titan M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117871" } ] } diff --git a/2021/0xxx/CVE-2021-0452.json b/2021/0xxx/CVE-2021-0452.json index f22224e388d..958461f4155 100644 --- a/2021/0xxx/CVE-2021-0452.json +++ b/2021/0xxx/CVE-2021-0452.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0452", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Titan M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117261" } ] } diff --git a/2021/0xxx/CVE-2021-0453.json b/2021/0xxx/CVE-2021-0453.json index 2e12145b454..755067fd2ef 100644 --- a/2021/0xxx/CVE-2021-0453.json +++ b/2021/0xxx/CVE-2021-0453.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0453", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Titan-M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117199" } ] } diff --git a/2021/0xxx/CVE-2021-0454.json b/2021/0xxx/CVE-2021-0454.json index c753554551b..9cec4097082 100644 --- a/2021/0xxx/CVE-2021-0454.json +++ b/2021/0xxx/CVE-2021-0454.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0454", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Citadel chip firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117047" } ] } diff --git a/2021/0xxx/CVE-2021-0455.json b/2021/0xxx/CVE-2021-0455.json index 13ed7c0beab..f2632577f4c 100644 --- a/2021/0xxx/CVE-2021-0455.json +++ b/2021/0xxx/CVE-2021-0455.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0455", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Citadel chip firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175116439" } ] } diff --git a/2021/0xxx/CVE-2021-0456.json b/2021/0xxx/CVE-2021-0456.json index de88baa2e4c..34b89703743 100644 --- a/2021/0xxx/CVE-2021-0456.json +++ b/2021/0xxx/CVE-2021-0456.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0456", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Citadel chip firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174769927" } ] } diff --git a/2021/0xxx/CVE-2021-0457.json b/2021/0xxx/CVE-2021-0457.json index 7cb8bef14c8..974e1ba2bbe 100644 --- a/2021/0xxx/CVE-2021-0457.json +++ b/2021/0xxx/CVE-2021-0457.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0457", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the FingerTipS touch screen driver, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157155375" } ] } diff --git a/2021/0xxx/CVE-2021-0458.json b/2021/0xxx/CVE-2021-0458.json index 9deef9a55eb..e4772815a44 100644 --- a/2021/0xxx/CVE-2021-0458.json +++ b/2021/0xxx/CVE-2021-0458.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0458", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the FingerTipS touch screen driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157156744" } ] } diff --git a/2021/0xxx/CVE-2021-0459.json b/2021/0xxx/CVE-2021-0459.json index bf644a1ca3f..e4859092a1d 100644 --- a/2021/0xxx/CVE-2021-0459.json +++ b/2021/0xxx/CVE-2021-0459.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0459", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In fts_driver_test_write of fts_proc.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157154534" } ] } diff --git a/2021/0xxx/CVE-2021-0460.json b/2021/0xxx/CVE-2021-0460.json index be30b0b8d53..23ac0dd912a 100644 --- a/2021/0xxx/CVE-2021-0460.json +++ b/2021/0xxx/CVE-2021-0460.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0460", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the FingerTipS touch screen driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-156739245" } ] } diff --git a/2021/0xxx/CVE-2021-0461.json b/2021/0xxx/CVE-2021-0461.json index 3e0ba302f24..be5ae1675a8 100644 --- a/2021/0xxx/CVE-2021-0461.json +++ b/2021/0xxx/CVE-2021-0461.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0461", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In iaxxx_core_sensor_change_state of iaxxx-module.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175124074" } ] } diff --git a/2021/0xxx/CVE-2021-0462.json b/2021/0xxx/CVE-2021-0462.json index f32a443dd5b..571c3d1c268 100644 --- a/2021/0xxx/CVE-2021-0462.json +++ b/2021/0xxx/CVE-2021-0462.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0462", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the NXP NFC firmware, there is a possible insecure firmware update due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168799695" } ] } diff --git a/2021/0xxx/CVE-2021-0463.json b/2021/0xxx/CVE-2021-0463.json index e6025400bec..88977d82118 100644 --- a/2021/0xxx/CVE-2021-0463.json +++ b/2021/0xxx/CVE-2021-0463.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0463", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In convertToHidl of convert.cpp, there is a possible out of bounds read due to uninitialized data from ReturnFrameworkMessage. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154867068" } ] } diff --git a/2021/0xxx/CVE-2021-0464.json b/2021/0xxx/CVE-2021-0464.json index 9476d15f61b..8cd5a515cfb 100644 --- a/2021/0xxx/CVE-2021-0464.json +++ b/2021/0xxx/CVE-2021-0464.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0464", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In sound_trigger_event_alloc of platform.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-167663878" } ] } diff --git a/2021/0xxx/CVE-2021-0465.json b/2021/0xxx/CVE-2021-0465.json index a2c19cd4a9d..f07475e1017 100644 --- a/2021/0xxx/CVE-2021-0465.json +++ b/2021/0xxx/CVE-2021-0465.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0465", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In GenerateFaceMask of face.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-172005755" } ] } diff --git a/2021/20xxx/CVE-2021-20205.json b/2021/20xxx/CVE-2021-20205.json index 5c1e7020d19..802329596fa 100644 --- a/2021/20xxx/CVE-2021-20205.json +++ b/2021/20xxx/CVE-2021-20205.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20205", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Libjpeg-turbo", + "version": { + "version_data": [ + { + "version_value": "2.0.90 and 2.0.91" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Divide By Zero" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1937385", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937385" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Libjpeg-turbo versions 2.0.91 and 2.0.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted GIF image." } ] } diff --git a/2021/21xxx/CVE-2021-21772.json b/2021/21xxx/CVE-2021-21772.json index 97707cdd82a..da11e1d671f 100644 --- a/2021/21xxx/CVE-2021-21772.json +++ b/2021/21xxx/CVE-2021-21772.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21772", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "3MF", + "version": { + "version_data": [ + { + "version_value": "3MF Consortium lib3mf 2.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "use-after-free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP() functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] } diff --git a/2021/28xxx/CVE-2021-28129.json b/2021/28xxx/CVE-2021-28129.json new file mode 100644 index 00000000000..363e447b3c7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28130.json b/2021/28xxx/CVE-2021-28130.json new file mode 100644 index 00000000000..0f6ca433b38 --- /dev/null +++ b/2021/28xxx/CVE-2021-28130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28131.json b/2021/28xxx/CVE-2021-28131.json new file mode 100644 index 00000000000..c8e70715326 --- /dev/null +++ b/2021/28xxx/CVE-2021-28131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d425a795019821f9972c1c1ba54f32fc6ddfebde Mon Sep 17 00:00:00 2001 From: Chandan Date: Wed, 10 Mar 2021 10:00:01 -0800 Subject: [PATCH 240/845] CVE assigned for Palo Alto Networks March 2021 Patch Wednesday --- 2021/3xxx/CVE-2021-3034.json | 164 +++++++++++++++++++++++++++++++++-- 1 file changed, 157 insertions(+), 7 deletions(-) diff --git a/2021/3xxx/CVE-2021-3034.json b/2021/3xxx/CVE-2021-3034.json index ae2b7ab55ef..176c8d30dd8 100644 --- a/2021/3xxx/CVE-2021-3034.json +++ b/2021/3xxx/CVE-2021-3034.json @@ -1,18 +1,168 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@paloaltonetworks.com", + "DATE_PUBLIC": "2021-03-10T17:00:00.000Z", "ID": "CVE-2021-3034", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cortex XSOAR: Secrets for SAML single sign-on (SSO) integration may be logged in system logs" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cortex XSOAR", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "5.5.0", + "version_value": "98622" + }, + { + "version_affected": "<", + "version_name": "6.0.2", + "version_value": "98623" + }, + { + "version_affected": "<", + "version_name": "6.0.1", + "version_value": "830029" + }, + { + "version_affected": "<", + "version_name": "6.1.0", + "version_value": "848144" + }, + { + "version_affected": "!>=", + "version_name": "5.5.0", + "version_value": "98622" + }, + { + "version_affected": "!>=", + "version_name": "6.0.2", + "version_value": "98623" + }, + { + "version_affected": "!>=", + "version_name": "6.0.1", + "version_value": "830029" + }, + { + "version_affected": "!>=", + "version_name": "6.1.0", + "version_value": "848144" + } + ] + } + } + ] + }, + "vendor_name": "Palo Alto Networks" + } + ] + } + }, + "configuration": [ + { + "lang": "eng", + "value": "This issue is applicable only to Cortex XSOAR appliances configured to use SAML SSO and where the 'Test' button was used at some point to test the integration during SAML SSO setup." + } + ], + "credit": [ + { + "lang": "eng", + "value": "Palo Alto Networks thanks Martin Spielmann and Stefan Lubienetzki for discovering and reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the ‘/var/log/demisto/’ server logs when testing the integration during setup.\n\nThis logged information includes the private key and identity provider certificate used to configure the SAML SSO integration.\nThis issue impacts:\nCortex XSOAR 5.5.0 builds earlier than 98622;\nCortex XSOAR 6.0.1 builds earlier than 830029;\nCortex XSOAR 6.0.2 builds earlier than 98623;\nCortex XSOAR 6.1.0 builds earlier than 848144.\n" } ] - } + }, + "exploit": [ + { + "lang": "eng", + "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n\n" + } + ], + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532 Information Exposure Through Log Files" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://security.paloaltonetworks.com/CVE-2021-3034" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "This issue is fixed in Cortex XSOAR 5.5.0 build 98622, Cortex XSOAR 6.0.1 build 830029, Cortex XSOAR 6.0.2 build 98623, Cortex XSOAR 6.1.0 build 848144, and all later Cortex XSOAR versions.\n\nAfter you upgrade the Cortex XSOAR appliance, you must configure a new private key for SAML SSO integration. Clear the server system logs using the instructions provided in the Workarounds and Mitigations section to remove any potentially logged secrets." + } + ], + "source": { + "defect": [ + "XSOAR-33287" + ], + "discovery": "EXTERNAL" + }, + "timeline": [ + { + "lang": "eng", + "time": "2021-03-10T17:00:00.000Z", + "value": "Initial publication" + } + ], + "work_around": [ + { + "lang": "eng", + "value": "You must configure a new private key for SAML SSO integration and you should not use the 'Test' button at any time during setup until after you complete the Cortex XSOAR upgrade.\n\nYou must clear all server system log files located in the ‘/var/log/demisto/’ directory. There may be several files in this directory, including the server.log file and other archived server logs.\n\nYou can clear all server system logs by stopping the server and running the ‘rm /var/log/demisto/server*.log’ command from the console." + } + ], + "x_affectedList": [ + "Cortex XSOAR 6.1.0", + "Cortex XSOAR 6.0.2", + "Cortex XSOAR 6.0.1", + "Cortex XSOAR 5.5.0" + ] } \ No newline at end of file From 949e32643373757c15dd421a3d7391cb35d23030 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 18:00:49 +0000 Subject: [PATCH 241/845] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14181.json | 5 +++ 2020/19xxx/CVE-2020-19417.json | 56 ++++++++++++++++++++++++++++++---- 2020/19xxx/CVE-2020-19419.json | 56 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27632.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35220.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35221.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35222.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35223.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35224.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35225.json | 56 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28132.json | 18 +++++++++++ 11 files changed, 473 insertions(+), 54 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28132.json diff --git a/2020/14xxx/CVE-2020-14181.json b/2020/14xxx/CVE-2020-14181.json index dd7b4b13f55..f8399558d08 100644 --- a/2020/14xxx/CVE-2020-14181.json +++ b/2020/14xxx/CVE-2020-14181.json @@ -74,6 +74,11 @@ "url": "https://jira.atlassian.com/browse/JRASERVER-71560", "refsource": "MISC", "name": "https://jira.atlassian.com/browse/JRASERVER-71560" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html", + "url": "http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html" } ] } diff --git a/2020/19xxx/CVE-2020-19417.json b/2020/19xxx/CVE-2020-19417.json index 778c9cee139..520f6c566a6 100644 --- a/2020/19xxx/CVE-2020-19417.json +++ b/2020/19xxx/CVE-2020-19417.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19417", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19417", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Emerson Smart Wireless Gateway 1420 4.6.59 allows non-privileged users (such as the default account 'maint') to perform administrative tasks by sending specially crafted HTTP requests to the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161700/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/161700/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Privilege-Escalation.html" } ] } diff --git a/2020/19xxx/CVE-2020-19419.json b/2020/19xxx/CVE-2020-19419.json index 4f60e46f5d9..7f404b85f52 100644 --- a/2020/19xxx/CVE-2020-19419.json +++ b/2020/19xxx/CVE-2020-19419.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19419", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19419", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect Access Control in Emerson Smart Wireless Gateway 1420 4.6.59 allows remote attackers to obtain sensitive device information from the administrator console without authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161701/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Missing-Authentication.html", + "url": "http://packetstormsecurity.com/files/161701/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Missing-Authentication.html" } ] } diff --git a/2020/27xxx/CVE-2020-27632.json b/2020/27xxx/CVE-2020-27632.json index bd849aec340..9e233903e52 100644 --- a/2020/27xxx/CVE-2020-27632.json +++ b/2020/27xxx/CVE-2020-27632.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27632", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27632", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In SIMATIC MV400 family versions prior to v7.0.6, the ISN generator is initialized with a constant value and has constant increments. An attacker could predict and hijack TCP sessions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf" } ] } diff --git a/2020/35xxx/CVE-2020-35220.json b/2020/35xxx/CVE-2020-35220.json index 5d7ec44f6af..614066734c2 100644 --- a/2020/35xxx/CVE-2020-35220.json +++ b/2020/35xxx/CVE-2020-35220.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35220", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35220", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A TFTP server was found to be active by default on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices. It allows remote authenticated users to update the switch firmware." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35221.json b/2020/35xxx/CVE-2020-35221.json index f4dd4254bbc..8c29f4e8c9c 100644 --- a/2020/35xxx/CVE-2020-35221.json +++ b/2020/35xxx/CVE-2020-35221.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35221", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35221", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The hashing algorithm implemented for NSDP password authentication on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was found to be insecure, allowing attackers (with access to a network capture) to quickly generate multiple collisions to generate valid passwords, or infer some parts of the original." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35222.json b/2020/35xxx/CVE-2020-35222.json index 037435ffca6..8e4f7b479d9 100644 --- a/2020/35xxx/CVE-2020-35222.json +++ b/2020/35xxx/CVE-2020-35222.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35222", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35222", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The NSDP protocol version implemented on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows unauthenticated remote attackers to obtain all the switch configuration parameters by sending the corresponding read requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35223.json b/2020/35xxx/CVE-2020-35223.json index b5d25ef50e1..822d1ba5b9c 100644 --- a/2020/35xxx/CVE-2020-35223.json +++ b/2020/35xxx/CVE-2020-35223.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35223", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35223", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The CSRF protection mechanism implemented in the web administration panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices could be bypassed by omitting the CSRF token parameter in HTTP requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35224.json b/2020/35xxx/CVE-2020-35224.json index ed5ed576aa5..31bab552d8a 100644 --- a/2020/35xxx/CVE-2020-35224.json +++ b/2020/35xxx/CVE-2020-35224.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35224", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35224", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in the NSDP protocol authentication method on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote unauthenticated attackers to force a device reboot." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35225.json b/2020/35xxx/CVE-2020-35225.json index b923c2d2d84..3d6fd0040a8 100644 --- a/2020/35xxx/CVE-2020-35225.json +++ b/2020/35xxx/CVE-2020-35225.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35225", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35225", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The NSDP protocol implementation on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was not properly validating the length of string parameters sent in write requests, potentially allowing denial of service attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2021/28xxx/CVE-2021-28132.json b/2021/28xxx/CVE-2021-28132.json new file mode 100644 index 00000000000..676e687f429 --- /dev/null +++ b/2021/28xxx/CVE-2021-28132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From d82415ffa77726ba6098558f7893b7e219417f1c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 19:00:44 +0000 Subject: [PATCH 242/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++ 2020/35xxx/CVE-2020-35226.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35227.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35228.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35229.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35230.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35231.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35232.json | 56 ++++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35233.json | 56 ++++++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3034.json | 9 +++--- 10 files changed, 410 insertions(+), 52 deletions(-) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 3ad196ed331..82fa22f3488 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -440,6 +440,11 @@ "refsource": "MLIST", "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210310 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/35xxx/CVE-2020-35226.json b/2020/35xxx/CVE-2020-35226.json index 1cbdb3d3228..83fd86d226b 100644 --- a/2020/35xxx/CVE-2020-35226.json +++ b/2020/35xxx/CVE-2020-35226.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35226", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35226", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allow unauthenticated users to modify the switch DHCP configuration by sending the corresponding write request command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35227.json b/2020/35xxx/CVE-2020-35227.json index 3abaf40d421..58c28df555c 100644 --- a/2020/35xxx/CVE-2020-35227.json +++ b/2020/35xxx/CVE-2020-35227.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35227", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35227", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow vulnerability in the access control section on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices (in the administration web panel) allows an attacker to inject IP addresses into the whitelist via the checkedList parameter to the delete command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35228.json b/2020/35xxx/CVE-2020-35228.json index d858f1489b5..32e5cc43361 100644 --- a/2020/35xxx/CVE-2020-35228.json +++ b/2020/35xxx/CVE-2020-35228.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35228", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35228", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the administration web panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote attackers to inject arbitrary web script or HTML via the language parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35229.json b/2020/35xxx/CVE-2020-35229.json index 88268b4a0ce..ae487a76871 100644 --- a/2020/35xxx/CVE-2020-35229.json +++ b/2020/35xxx/CVE-2020-35229.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35229", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35229", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The authentication token required to execute NSDP write requests on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices is not properly invalidated and can be reused until a new token is generated, which allows attackers (with access to network traffic) to effectively gain administrative privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35230.json b/2020/35xxx/CVE-2020-35230.json index d71e8342830..60db833b1ab 100644 --- a/2020/35xxx/CVE-2020-35230.json +++ b/2020/35xxx/CVE-2020-35230.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35230", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35230", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple integer overflow parameters were found in the web administration panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices. Most of the integer parameters sent through the web server can be abused to cause a denial of service attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35231.json b/2020/35xxx/CVE-2020-35231.json index 84ede735fa9..7e981d771b8 100644 --- a/2020/35xxx/CVE-2020-35231.json +++ b/2020/35xxx/CVE-2020-35231.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35231", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35231", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The NSDP protocol implementation on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was affected by an authentication issue that allows an attacker to bypass access controls and obtain full control of the device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35232.json b/2020/35xxx/CVE-2020-35232.json index 64b570485c6..dc476802cf5 100644 --- a/2020/35xxx/CVE-2020-35232.json +++ b/2020/35xxx/CVE-2020-35232.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35232", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35232", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The TFTP firmware update mechanism on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices does not properly implement firmware validations, allowing remote attackers to write arbitrary data to internal memory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2020/35xxx/CVE-2020-35233.json b/2020/35xxx/CVE-2020-35233.json index 66352ba7a4c..b2fd6283abc 100644 --- a/2020/35xxx/CVE-2020-35233.json +++ b/2020/35xxx/CVE-2020-35233.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35233", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35233", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The TFTP server fails to handle multiple connections on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices, and allows external attackers to force device reboots by sending concurrent connections, aka a denial of service attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] } diff --git a/2021/3xxx/CVE-2021-3034.json b/2021/3xxx/CVE-2021-3034.json index 176c8d30dd8..c27627e77fd 100644 --- a/2021/3xxx/CVE-2021-3034.json +++ b/2021/3xxx/CVE-2021-3034.json @@ -85,7 +85,7 @@ "description_data": [ { "lang": "eng", - "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the ‘/var/log/demisto/’ server logs when testing the integration during setup.\n\nThis logged information includes the private key and identity provider certificate used to configure the SAML SSO integration.\nThis issue impacts:\nCortex XSOAR 5.5.0 builds earlier than 98622;\nCortex XSOAR 6.0.1 builds earlier than 830029;\nCortex XSOAR 6.0.2 builds earlier than 98623;\nCortex XSOAR 6.1.0 builds earlier than 848144.\n" + "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the \u2018/var/log/demisto/\u2019 server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144." } ] }, @@ -129,8 +129,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.paloaltonetworks.com/CVE-2021-3034" + "refsource": "MISC", + "url": "https://security.paloaltonetworks.com/CVE-2021-3034", + "name": "https://security.paloaltonetworks.com/CVE-2021-3034" } ] }, @@ -156,7 +157,7 @@ "work_around": [ { "lang": "eng", - "value": "You must configure a new private key for SAML SSO integration and you should not use the 'Test' button at any time during setup until after you complete the Cortex XSOAR upgrade.\n\nYou must clear all server system log files located in the ‘/var/log/demisto/’ directory. There may be several files in this directory, including the server.log file and other archived server logs.\n\nYou can clear all server system logs by stopping the server and running the ‘rm /var/log/demisto/server*.log’ command from the console." + "value": "You must configure a new private key for SAML SSO integration and you should not use the 'Test' button at any time during setup until after you complete the Cortex XSOAR upgrade.\n\nYou must clear all server system log files located in the \u2018/var/log/demisto/\u2019 directory. There may be several files in this directory, including the server.log file and other archived server logs.\n\nYou can clear all server system logs by stopping the server and running the \u2018rm /var/log/demisto/server*.log\u2019 command from the console." } ], "x_affectedList": [ From 2d6e371e0340a4cb5f09aa32606ba4e5104392bb Mon Sep 17 00:00:00 2001 From: Chandan Date: Wed, 10 Mar 2021 11:35:47 -0800 Subject: [PATCH 243/845] Remove unintended unicode quotes. Remove unintended unicode quotes. --- 2021/3xxx/CVE-2021-3034.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/2021/3xxx/CVE-2021-3034.json b/2021/3xxx/CVE-2021-3034.json index c27627e77fd..bd1fa1ed40e 100644 --- a/2021/3xxx/CVE-2021-3034.json +++ b/2021/3xxx/CVE-2021-3034.json @@ -85,7 +85,7 @@ "description_data": [ { "lang": "eng", - "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the \u2018/var/log/demisto/\u2019 server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144." + "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup.\n\nThis logged information includes the private key and identity provider certificate used to configure the SAML SSO integration.\nThis issue impacts:\nCortex XSOAR 5.5.0 builds earlier than 98622;\nCortex XSOAR 6.0.1 builds earlier than 830029;\nCortex XSOAR 6.0.2 builds earlier than 98623;\nCortex XSOAR 6.1.0 builds earlier than 848144.\n" } ] }, @@ -129,7 +129,7 @@ "references": { "reference_data": [ { - "refsource": "MISC", + "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2021-3034", "name": "https://security.paloaltonetworks.com/CVE-2021-3034" } @@ -157,7 +157,7 @@ "work_around": [ { "lang": "eng", - "value": "You must configure a new private key for SAML SSO integration and you should not use the 'Test' button at any time during setup until after you complete the Cortex XSOAR upgrade.\n\nYou must clear all server system log files located in the \u2018/var/log/demisto/\u2019 directory. There may be several files in this directory, including the server.log file and other archived server logs.\n\nYou can clear all server system logs by stopping the server and running the \u2018rm /var/log/demisto/server*.log\u2019 command from the console." + "value": "You must configure a new private key for SAML SSO integration and you should not use the 'Test' button at any time during setup until after you complete the Cortex XSOAR upgrade.\n\nYou must clear all server system log files located in the '/var/log/demisto/' directory. There may be several files in this directory, including the server.log file and other archived server logs.\n\nYou can clear all server system logs by stopping the server and running the 'rm /var/log/demisto/server*.log' command from the console." } ], "x_affectedList": [ @@ -166,4 +166,4 @@ "Cortex XSOAR 6.0.1", "Cortex XSOAR 5.5.0" ] -} \ No newline at end of file +} From 8237369d40c6b45435f631918db89488783a5f44 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 20:00:42 +0000 Subject: [PATCH 244/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3428.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3428.json diff --git a/2021/3xxx/CVE-2021-3428.json b/2021/3xxx/CVE-2021-3428.json new file mode 100644 index 00000000000..927e7e6d6c9 --- /dev/null +++ b/2021/3xxx/CVE-2021-3428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 1c0d100cbb7250ed3945ad159c076b1e9169cfbf Mon Sep 17 00:00:00 2001 From: Dhaval Kapil Date: Wed, 10 Mar 2021 10:43:29 -0800 Subject: [PATCH 245/845] Update formatting for CVE-2020-1896 --- 2020/1xxx/CVE-2020-1896.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2020/1xxx/CVE-2020-1896.json b/2020/1xxx/CVE-2020-1896.json index b6f9249de40..bc34ba5b845 100644 --- a/2020/1xxx/CVE-2020-1896.json +++ b/2020/1xxx/CVE-2020-1896.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "A stack overflow vulnerability in Facebook Hermes ‘builtin apply’ prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected." + "value": "A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected." } ] }, From e8d8e52a3469b147fc9079088cc2ca42e89f7145 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 14:00:54 -0700 Subject: [PATCH 246/845] Add CVE-2021-21265 for GHSA-xhfx-hgmf-v6vp --- 2021/21xxx/CVE-2021-21265.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21265.json b/2021/21xxx/CVE-2021-21265.json index d3ea538ecae..0c6065f7a46 100644 --- a/2021/21xxx/CVE-2021-21265.json +++ b/2021/21xxx/CVE-2021-21265.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21265", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Potential Host Header Poisoning on misconfigured servers" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "october", + "version": { + "version_data": [ + { + "version_value": "< 1.1.2" + } + ] + } + } + ] + }, + "vendor_name": "octobercms" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October before version 1.1.2, when running on poorly configured servers (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. \nThis has been addressed in version 1.1.2 by adding a feature to allow a set of trusted hosts to be specified in the application. As a workaround one may set the configuration setting cms.linkPolicy to force.\n\n" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp", + "refsource": "CONFIRM", + "url": "https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp" + }, + { + "name": "https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6", + "refsource": "MISC", + "url": "https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6" + }, + { + "name": "https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0", + "refsource": "MISC", + "url": "https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0" + } + ] + }, + "source": { + "advisory": "GHSA-xhfx-hgmf-v6vp", + "discovery": "UNKNOWN" } } \ No newline at end of file From 942f42c6972d3e8989bfc2662deb50874b50478b Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 14:26:49 -0700 Subject: [PATCH 247/845] Add CVE-2021-21334 for GHSA-6g2q-w5j3-fwh4 --- 2021/21xxx/CVE-2021-21334.json | 95 +++++++++++++++++++++++++++++++--- 1 file changed, 89 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21334.json b/2021/21xxx/CVE-2021-21334.json index 25bb22fb76f..1f561e0d5f0 100644 --- a/2021/21xxx/CVE-2021-21334.json +++ b/2021/21xxx/CVE-2021-21334.json @@ -1,18 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21334", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "environment variable leak" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "containerd", + "version": { + "version_data": [ + { + "version_value": "< 1.3.10" + }, + { + "version_value": ">= 1.4.0, < 1.4.4" + } + ] + } + } + ] + }, + "vendor_name": "containerd" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "{\"CWE-668\":\"Exposure of Resource to Wrong Sphere\"}" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/containerd/containerd/security/advisories/GHSA-6g2q-w5j3-fwh4", + "refsource": "CONFIRM", + "url": "https://github.com/containerd/containerd/security/advisories/GHSA-6g2q-w5j3-fwh4" + }, + { + "name": "https://github.com/containerd/containerd/releases/tag/v1.4.4", + "refsource": "MISC", + "url": "https://github.com/containerd/containerd/releases/tag/v1.4.4" + }, + { + "name": "https://github.com/containerd/containerd/releases/tag/v1.3.10", + "refsource": "MISC", + "url": "https://github.com/containerd/containerd/releases/tag/v1.3.10" + }, + { + "name": "https://github.com/containerd/containerd/commit/05f951a3781f4f2c1911b05e61c160e9c30eaa8e", + "refsource": "MISC", + "url": "https://github.com/containerd/containerd/commit/05f951a3781f4f2c1911b05e61c160e9c30eaa8e" + } + ] + }, + "source": { + "advisory": "GHSA-6g2q-w5j3-fwh4", + "discovery": "UNKNOWN" } } \ No newline at end of file From 8c94ff293f4ecdeeee46fe9f00b1bac90ad575d9 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 14:49:36 -0700 Subject: [PATCH 248/845] Add CVE-2021-21371 for GHSA-8278-88vv-x98r --- 2021/21xxx/CVE-2021-21371.json | 92 +++++++++++++++++++++++++++++++--- 1 file changed, 86 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21371.json b/2021/21xxx/CVE-2021-21371.json index 0367ed1026b..807c85b0921 100644 --- a/2021/21xxx/CVE-2021-21371.json +++ b/2021/21xxx/CVE-2021-21371.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21371", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Execution of untrusted code through config file" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "integration-jira-cloud", + "version": { + "version_data": [ + { + "version_value": "< 1.1.21" + } + ] + } + } + ] + }, + "vendor_name": "tenable" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as \"tenable-jira-cloud\". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().\n" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r", + "refsource": "CONFIRM", + "url": "https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r" + }, + { + "name": "https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0", + "refsource": "MISC", + "url": "https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0" + }, + { + "name": "https://pypi.org/project/tenable-jira-cloud/", + "refsource": "MISC", + "url": "https://pypi.org/project/tenable-jira-cloud/" + }, + { + "name": "https://pyyaml.docsforge.com/master/documentation/#loading-yaml", + "refsource": "MISC", + "url": "https://pyyaml.docsforge.com/master/documentation/#loading-yaml" + } + ] + }, + "source": { + "advisory": "GHSA-8278-88vv-x98r", + "discovery": "UNKNOWN" } } \ No newline at end of file From e16d0a388de94f7542ce44c605ea24b61091f739 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 22:00:42 +0000 Subject: [PATCH 249/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 2020/27xxx/CVE-2020-27223.json | 10 ++++++++++ 2021/21xxx/CVE-2021-21265.json | 2 +- 2021/21xxx/CVE-2021-21334.json | 2 +- 2021/21xxx/CVE-2021-21371.json | 2 +- 5 files changed, 18 insertions(+), 3 deletions(-) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 82fa22f3488..2008a457581 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -445,6 +445,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210310 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210310 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 024042c6d39..b6328897975 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -274,6 +274,16 @@ "refsource": "MLIST", "name": "[zookeeper-commits] 20210310 [zookeeper] branch master updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[solr-users] 20210310 Does CVE-2020-27223 impact Solr 8.6.1", + "url": "https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[nifi-issues] 20210310 [jira] [Created] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E" } ] } diff --git a/2021/21xxx/CVE-2021-21265.json b/2021/21xxx/CVE-2021-21265.json index 0c6065f7a46..198fe4b221b 100644 --- a/2021/21xxx/CVE-2021-21265.json +++ b/2021/21xxx/CVE-2021-21265.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October before version 1.1.2, when running on poorly configured servers (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. \nThis has been addressed in version 1.1.2 by adding a feature to allow a set of trusted hosts to be specified in the application. As a workaround one may set the configuration setting cms.linkPolicy to force.\n\n" + "value": "October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October before version 1.1.2, when running on poorly configured servers (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. This has been addressed in version 1.1.2 by adding a feature to allow a set of trusted hosts to be specified in the application. As a workaround one may set the configuration setting cms.linkPolicy to force." } ] }, diff --git a/2021/21xxx/CVE-2021-21334.json b/2021/21xxx/CVE-2021-21334.json index 1f561e0d5f0..932f68f7ed2 100644 --- a/2021/21xxx/CVE-2021-21334.json +++ b/2021/21xxx/CVE-2021-21334.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions." + "value": "In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions." } ] }, diff --git a/2021/21xxx/CVE-2021-21371.json b/2021/21xxx/CVE-2021-21371.json index 807c85b0921..c3060917e3c 100644 --- a/2021/21xxx/CVE-2021-21371.json +++ b/2021/21xxx/CVE-2021-21371.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as \"tenable-jira-cloud\". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().\n" + "value": "Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as \"tenable-jira-cloud\". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load()." } ] }, From 6d106e377ff7121c1f3f4ba44420aecddf7a479a Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 15:25:25 -0700 Subject: [PATCH 250/845] Add CVE-2021-21375 for GHSA-hvq6-f89p-frvp --- 2021/21xxx/CVE-2021-21375.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21375.json b/2021/21xxx/CVE-2021-21375.json index ae6975b9be5..047c84ee1e8 100644 --- a/2021/21xxx/CVE-2021-21375.json +++ b/2021/21xxx/CVE-2021-21375.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21375", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Crash in receiving updated SDP answer after initial SDP negotiation failed" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "pjproject", + "version": { + "version_data": [ + { + "version_value": "<= 2.10" + } + ] + } + } + ] + }, + "vendor_name": "pjsip" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp", + "refsource": "CONFIRM", + "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp" + }, + { + "name": "https://github.com/pjsip/pjproject/commit/97b3d7addbaa720b7ddb0af9bf6f3e443e664365", + "refsource": "MISC", + "url": "https://github.com/pjsip/pjproject/commit/97b3d7addbaa720b7ddb0af9bf6f3e443e664365" + } + ] + }, + "source": { + "advisory": "GHSA-hvq6-f89p-frvp", + "discovery": "UNKNOWN" } } \ No newline at end of file From 6ea60c3e746ef42986f4f6340aeb54d4dda7d753 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 15:26:55 -0700 Subject: [PATCH 251/845] Add CVE-2020-15260 for GHSA-8hcp-hm38-mfph --- 2020/15xxx/CVE-2020-15260.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2020/15xxx/CVE-2020-15260.json b/2020/15xxx/CVE-2020-15260.json index 903b6a1093f..c4ff0ef4737 100644 --- a/2020/15xxx/CVE-2020-15260.json +++ b/2020/15xxx/CVE-2020-15260.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15260", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Existing TLS connections can be reused without checking remote hostname" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "pjproject", + "version": { + "version_data": [ + { + "version_value": "<= 2.10" + } + ] + } + } + ] + }, + "vendor_name": "pjsip" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.10 and earlier, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote hostname authentication. Suppose we have created a TLS connection to `sip.foo.com`, which has an IP address `100.1.1.1`. If we want to create a TLS connection to another hostname, say `sip.bar.com`, which has the same IP address, then it will reuse that existing connection, even though `100.1.1.1` does not have certificate to authenticate as `sip.bar.com`. The vulnerability allows for an insecure interaction without user awareness. It affects users who need access to connections to different destinations that translate to the same address, and allows man-in-the-middle attack if attacker can route a connection to another destination such as in the case of DNS spoofing." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-297 Improper Validation of Certificate with Host Mismatch" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph", + "refsource": "CONFIRM", + "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph" + }, + { + "name": "https://github.com/pjsip/pjproject/commit/67e46c1ac45ad784db5b9080f5ed8b133c122872", + "refsource": "MISC", + "url": "https://github.com/pjsip/pjproject/commit/67e46c1ac45ad784db5b9080f5ed8b133c122872" + }, + { + "name": "https://github.com/pjsip/pjproject/pull/2663", + "refsource": "MISC", + "url": "https://github.com/pjsip/pjproject/pull/2663" + } + ] + }, + "source": { + "advisory": "GHSA-8hcp-hm38-mfph", + "discovery": "UNKNOWN" } } \ No newline at end of file From 9b26fb232e5533030373f7b40915b0aaa3ec7a78 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 23:00:46 +0000 Subject: [PATCH 252/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index b6328897975..8d2cabc8c24 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -284,6 +284,11 @@ "refsource": "MLIST", "name": "[nifi-issues] 20210310 [jira] [Created] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[lucene-dev] 20210310 Does CVE-2020-27223 impact Solr 8.6.1", + "url": "https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E" } ] } From a0c49acde0220d37752bb2128df28a38d40176ba Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 00:00:40 +0000 Subject: [PATCH 253/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 15 +++++++ 2021/27xxx/CVE-2021-27918.json | 56 ++++++++++++++++++++++--- 2021/27xxx/CVE-2021-27919.json | 56 ++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28133.json | 18 ++++++++ 2021/28xxx/CVE-2021-28134.json | 77 ++++++++++++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3429.json | 18 ++++++++ 6 files changed, 228 insertions(+), 12 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28133.json create mode 100644 2021/28xxx/CVE-2021-28134.json create mode 100644 2021/3xxx/CVE-2021-3429.json diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 8d2cabc8c24..ede16615977 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -289,6 +289,21 @@ "refsource": "MLIST", "name": "[lucene-dev] 20210310 Does CVE-2020-27223 impact Solr 8.6.1", "url": "https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[nifi-issues] 20210310 [jira] [Resolved] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[lucene-dev] 20210310 Re: Does CVE-2020-27223 impact Solr 8.6.1", + "url": "https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[nifi-issues] 20210310 [jira] [Commented] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E" } ] } diff --git a/2021/27xxx/CVE-2021-27918.json b/2021/27xxx/CVE-2021-27918.json index 26c3cc3c816..d578cf111fc 100644 --- a/2021/27xxx/CVE-2021-27918.json +++ b/2021/27xxx/CVE-2021-27918.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27918", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27918", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", + "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ] } diff --git a/2021/27xxx/CVE-2021-27919.json b/2021/27xxx/CVE-2021-27919.json index 20b0c8015e5..c4dd609f34d 100644 --- a/2021/27xxx/CVE-2021-27919.json +++ b/2021/27xxx/CVE-2021-27919.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27919", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27919", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", + "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ] } diff --git a/2021/28xxx/CVE-2021-28133.json b/2021/28xxx/CVE-2021-28133.json new file mode 100644 index 00000000000..26c7909d3f1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28134.json b/2021/28xxx/CVE-2021-28134.json new file mode 100644 index 00000000000..f5303a1740c --- /dev/null +++ b/2021/28xxx/CVE-2021-28134.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28134", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Clipper before 1.0.5 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/AkashRajpurohit/clipper/issues/13", + "refsource": "MISC", + "name": "https://github.com/AkashRajpurohit/clipper/issues/13" + }, + { + "url": "https://github.com/AkashRajpurohit/clipper/releases/tag/v1.0.5", + "refsource": "MISC", + "name": "https://github.com/AkashRajpurohit/clipper/releases/tag/v1.0.5" + }, + { + "url": "https://github.com/AkashRajpurohit/clipper/pull/14", + "refsource": "MISC", + "name": "https://github.com/AkashRajpurohit/clipper/pull/14" + }, + { + "url": "https://github.com/AkashRajpurohit/clipper/pull/14/commits/28f1492a12234cf1e6af85c78bf22ee2f5090d19", + "refsource": "MISC", + "name": "https://github.com/AkashRajpurohit/clipper/pull/14/commits/28f1492a12234cf1e6af85c78bf22ee2f5090d19" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3429.json b/2021/3xxx/CVE-2021-3429.json new file mode 100644 index 00000000000..2d1924c1acd --- /dev/null +++ b/2021/3xxx/CVE-2021-3429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 41d645eb8c23a37a95ad04983553c5a696e49faa Mon Sep 17 00:00:00 2001 From: Neal Poole Date: Wed, 10 Mar 2021 19:40:09 -0500 Subject: [PATCH 254/845] Release CVE-2020-1898, CVE-2020-1899, CVE-2020-1900 for HHVM --- 2020/1xxx/CVE-2020-1898.json | 145 +++++++++++++++++++++++++++++++---- 2020/1xxx/CVE-2020-1899.json | 145 +++++++++++++++++++++++++++++++---- 2020/1xxx/CVE-2020-1900.json | 145 +++++++++++++++++++++++++++++++---- 3 files changed, 384 insertions(+), 51 deletions(-) diff --git a/2020/1xxx/CVE-2020-1898.json b/2020/1xxx/CVE-2020-1898.json index 35c1a95217f..e02afc609f2 100644 --- a/2020/1xxx/CVE-2020-1898.json +++ b/2020/1xxx/CVE-2020-1898.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1898", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-06-09", + "ID": "CVE-2020-1898", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.62.1" + }, + { + "version_affected": "=", + "version_value": "4.62.0" + }, + { + "version_affected": "!>=", + "version_value": "4.61.1" + }, + { + "version_affected": "=", + "version_value": "4.61.0" + }, + { + "version_affected": "!>=", + "version_value": "4.60.1" + }, + { + "version_affected": "=", + "version_value": "4.60.0" + }, + { + "version_affected": "!>=", + "version_value": "4.59.1" + }, + { + "version_affected": "=", + "version_value": "4.59.0" + }, + { + "version_affected": "!>=", + "version_value": "4.58.2" + }, + { + "version_affected": ">=", + "version_value": "4.58.0" + }, + { + "version_affected": "!>=", + "version_value": "4.57.1" + }, + { + "version_affected": "=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.1" + }, + { + "version_affected": ">=", + "version_value": "4.33.0" + }, + { + "version_affected": "!>=", + "version_value": "4.32.3" + }, + { + "version_affected": "<", + "version_value": "4.32.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The fb_unserialize function did not impose a depth limit for nested deserialization. That meant a maliciously constructed string could cause deserialization to recurse, leading to stack exhaustion. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled Recursion (CWE-674)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://hhvm.com/blog/2020/06/30/security-update.html", + "url": "https://hhvm.com/blog/2020/06/30/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c", + "url": "https://github.com/facebook/hhvm/commit/1746dfb11fc0048366f34669e74318b8278a684c" + } + ] + } +} diff --git a/2020/1xxx/CVE-2020-1899.json b/2020/1xxx/CVE-2020-1899.json index 5297688ea90..c3b510ed7a6 100644 --- a/2020/1xxx/CVE-2020-1899.json +++ b/2020/1xxx/CVE-2020-1899.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1899", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-06-10", + "ID": "CVE-2020-1899", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.62.1" + }, + { + "version_affected": "=", + "version_value": "4.62.0" + }, + { + "version_affected": "!>=", + "version_value": "4.61.1" + }, + { + "version_affected": "=", + "version_value": "4.61.0" + }, + { + "version_affected": "!>=", + "version_value": "4.60.1" + }, + { + "version_affected": "=", + "version_value": "4.60.0" + }, + { + "version_affected": "!>=", + "version_value": "4.59.1" + }, + { + "version_affected": "=", + "version_value": "4.59.0" + }, + { + "version_affected": "!>=", + "version_value": "4.58.2" + }, + { + "version_affected": ">=", + "version_value": "4.58.0" + }, + { + "version_affected": "!>=", + "version_value": "4.57.1" + }, + { + "version_affected": "=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.1" + }, + { + "version_affected": ">=", + "version_value": "4.33.0" + }, + { + "version_affected": "!>=", + "version_value": "4.32.3" + }, + { + "version_affected": "<", + "version_value": "4.32.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Untrusted Pointer Dereference (CWE-822)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://hhvm.com/blog/2020/06/30/security-update.html", + "url": "https://hhvm.com/blog/2020/06/30/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9", + "url": "https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9" + } + ] + } +} diff --git a/2020/1xxx/CVE-2020-1900.json b/2020/1xxx/CVE-2020-1900.json index 757a4f714cd..feb58b1cb4b 100644 --- a/2020/1xxx/CVE-2020-1900.json +++ b/2020/1xxx/CVE-2020-1900.json @@ -1,18 +1,129 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-1900", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} \ No newline at end of file + "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2020-06-18", + "ID": "CVE-2020-1900", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "HHVM", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "4.62.1" + }, + { + "version_affected": "=", + "version_value": "4.62.0" + }, + { + "version_affected": "!>=", + "version_value": "4.61.1" + }, + { + "version_affected": "=", + "version_value": "4.61.0" + }, + { + "version_affected": "!>=", + "version_value": "4.60.1" + }, + { + "version_affected": "=", + "version_value": "4.60.0" + }, + { + "version_affected": "!>=", + "version_value": "4.59.1" + }, + { + "version_affected": "=", + "version_value": "4.59.0" + }, + { + "version_affected": "!>=", + "version_value": "4.58.2" + }, + { + "version_affected": ">=", + "version_value": "4.58.0" + }, + { + "version_affected": "!>=", + "version_value": "4.57.1" + }, + { + "version_affected": "=", + "version_value": "4.57.0" + }, + { + "version_affected": "!>=", + "version_value": "4.56.1" + }, + { + "version_affected": ">=", + "version_value": "4.33.0" + }, + { + "version_affected": "!>=", + "version_value": "4.32.3" + }, + { + "version_affected": "<", + "version_value": "4.32.3" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free (CWE-416)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://hhvm.com/blog/2020/06/30/security-update.html", + "url": "https://hhvm.com/blog/2020/06/30/security-update.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3", + "url": "https://github.com/facebook/hhvm/commit/c1c4bb0cf9e076aafaf4ff3515556ef9faf906f3" + } + ] + } +} From 97c323778d33b45e4311f9d51897e5ff553beae7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 01:00:42 +0000 Subject: [PATCH 255/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28135.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28136.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28137.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28138.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28139.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28140.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28141.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28142.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28143.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28144.json | 18 ++++++++++++++++++ 10 files changed, 180 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28135.json create mode 100644 2021/28xxx/CVE-2021-28136.json create mode 100644 2021/28xxx/CVE-2021-28137.json create mode 100644 2021/28xxx/CVE-2021-28138.json create mode 100644 2021/28xxx/CVE-2021-28139.json create mode 100644 2021/28xxx/CVE-2021-28140.json create mode 100644 2021/28xxx/CVE-2021-28141.json create mode 100644 2021/28xxx/CVE-2021-28142.json create mode 100644 2021/28xxx/CVE-2021-28143.json create mode 100644 2021/28xxx/CVE-2021-28144.json diff --git a/2021/28xxx/CVE-2021-28135.json b/2021/28xxx/CVE-2021-28135.json new file mode 100644 index 00000000000..6ec99359b3b --- /dev/null +++ b/2021/28xxx/CVE-2021-28135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28136.json b/2021/28xxx/CVE-2021-28136.json new file mode 100644 index 00000000000..ee2c688b014 --- /dev/null +++ b/2021/28xxx/CVE-2021-28136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28137.json b/2021/28xxx/CVE-2021-28137.json new file mode 100644 index 00000000000..36a1c6f826a --- /dev/null +++ b/2021/28xxx/CVE-2021-28137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28138.json b/2021/28xxx/CVE-2021-28138.json new file mode 100644 index 00000000000..001944b01a5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28139.json b/2021/28xxx/CVE-2021-28139.json new file mode 100644 index 00000000000..88bb83491c4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28139.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28139", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28140.json b/2021/28xxx/CVE-2021-28140.json new file mode 100644 index 00000000000..3738d7c4428 --- /dev/null +++ b/2021/28xxx/CVE-2021-28140.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28140", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28141.json b/2021/28xxx/CVE-2021-28141.json new file mode 100644 index 00000000000..1d575f40a06 --- /dev/null +++ b/2021/28xxx/CVE-2021-28141.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28142.json b/2021/28xxx/CVE-2021-28142.json new file mode 100644 index 00000000000..9c0b95e78f6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28142.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28142", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28143.json b/2021/28xxx/CVE-2021-28143.json new file mode 100644 index 00000000000..b46f3c09461 --- /dev/null +++ b/2021/28xxx/CVE-2021-28143.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28143", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28144.json b/2021/28xxx/CVE-2021-28144.json new file mode 100644 index 00000000000..b4ede06f2f2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28144.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28144", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 43007815384d3d72eed627bb7c2d3f67bacb29f2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 02:00:41 +0000 Subject: [PATCH 256/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28145.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28145.json diff --git a/2021/28xxx/CVE-2021-28145.json b/2021/28xxx/CVE-2021-28145.json new file mode 100644 index 00000000000..7c3b15e6664 --- /dev/null +++ b/2021/28xxx/CVE-2021-28145.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28145", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From f8ff3feb310c7f803a3f55a386a190663122342a Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 19:35:53 -0700 Subject: [PATCH 257/845] Add CVE-2021-21378 for GHSA-4996-m8hf-hj27 --- 2021/21xxx/CVE-2021-21378.json | 95 +++++++++++++++++++++++++++++++--- 1 file changed, 89 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21378.json b/2021/21xxx/CVE-2021-21378.json index 040f63cf238..183ffc7124a 100644 --- a/2021/21xxx/CVE-2021-21378.json +++ b/2021/21xxx/CVE-2021-21378.json @@ -1,18 +1,101 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21378", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "JWT authentication bypass with unknown issuer token" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "envoy", + "version": { + "version_data": [ + { + "version_value": "= 1.17.0" + } + ] + } + } + ] + }, + "vendor_name": "envoyproxy" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the `allow_missing` requirement under `requires_any` due to a mistake in implementation. Envoy's JWT Authentication filter can be configured with the `allow_missing` requirement that will be satisfied if JWT is missing (JwtMissed error) and fail if JWT is presented or invalid. Due to a mistake in implementation, a JwtUnknownIssuer error was mistakenly converted to JwtMissed when `requires_any` was configured. So if `allow_missing` was configured under `requires_any`, an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list. Integrity may be impacted depending on configuration if the JWT token is used to protect against writes or modifications. This regression was introduced on 2020/11/12 in PR 13839 which fixed handling `allow_missing` under RequiresAny in a JwtRequirement (see issue 13458). The AnyVerifier aggregates the children verifiers' results into a final status where JwtMissing is the default error. However, a JwtUnknownIssuer was mistakenly treated the same as a JwtMissing error and the resulting final aggregation was the default JwtMissing. As a result, `allow_missing` would allow a JWT token with an unknown issuer status. This is fixed in version 1.17.1 by PR 15194. The fix works by preferring JwtUnknownIssuer over a JwtMissing error, fixing the accidental conversion and bypass with `allow_missing`. A user could detect whether a bypass occurred if they have Envoy logs enabled with debug verbosity. Users can enable component level debug logs for JWT. The JWT filter logs will indicate that there is a request with a JWT token and a failure that the JWT token is missing." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-303: Incorrect Implementation of Authentication Algorithm" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-4996-m8hf-hj27", + "refsource": "CONFIRM", + "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-4996-m8hf-hj27" + }, + { + "name": "https://github.com/envoyproxy/envoy/pull/15194", + "refsource": "MISC", + "url": "https://github.com/envoyproxy/envoy/pull/15194" + }, + { + "name": "https://github.com/envoyproxy/envoy/commit/ea39e3cba652bcc4b11bb0d5c62b017e584d2e5a", + "refsource": "MISC", + "url": "https://github.com/envoyproxy/envoy/commit/ea39e3cba652bcc4b11bb0d5c62b017e584d2e5a" + } + ] + }, + "source": { + "advisory": "GHSA-4996-m8hf-hj27", + "discovery": "UNKNOWN" } } \ No newline at end of file From 65e43ebf2cfd60b488d7a9f51ca6a88eef492888 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 03:00:43 +0000 Subject: [PATCH 258/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21378.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/21xxx/CVE-2021-21378.json b/2021/21xxx/CVE-2021-21378.json index 183ffc7124a..f0d766bee25 100644 --- a/2021/21xxx/CVE-2021-21378.json +++ b/2021/21xxx/CVE-2021-21378.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the `allow_missing` requirement under `requires_any` due to a mistake in implementation. Envoy's JWT Authentication filter can be configured with the `allow_missing` requirement that will be satisfied if JWT is missing (JwtMissed error) and fail if JWT is presented or invalid. Due to a mistake in implementation, a JwtUnknownIssuer error was mistakenly converted to JwtMissed when `requires_any` was configured. So if `allow_missing` was configured under `requires_any`, an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list. Integrity may be impacted depending on configuration if the JWT token is used to protect against writes or modifications. This regression was introduced on 2020/11/12 in PR 13839 which fixed handling `allow_missing` under RequiresAny in a JwtRequirement (see issue 13458). The AnyVerifier aggregates the children verifiers' results into a final status where JwtMissing is the default error. However, a JwtUnknownIssuer was mistakenly treated the same as a JwtMissing error and the resulting final aggregation was the default JwtMissing. As a result, `allow_missing` would allow a JWT token with an unknown issuer status. This is fixed in version 1.17.1 by PR 15194. The fix works by preferring JwtUnknownIssuer over a JwtMissing error, fixing the accidental conversion and bypass with `allow_missing`. A user could detect whether a bypass occurred if they have Envoy logs enabled with debug verbosity. Users can enable component level debug logs for JWT. The JWT filter logs will indicate that there is a request with a JWT token and a failure that the JWT token is missing." + "value": "Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the `allow_missing` requirement under `requires_any` due to a mistake in implementation. Envoy's JWT Authentication filter can be configured with the `allow_missing` requirement that will be satisfied if JWT is missing (JwtMissed error) and fail if JWT is presented or invalid. Due to a mistake in implementation, a JwtUnknownIssuer error was mistakenly converted to JwtMissed when `requires_any` was configured. So if `allow_missing` was configured under `requires_any`, an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list. Integrity may be impacted depending on configuration if the JWT token is used to protect against writes or modifications. This regression was introduced on 2020/11/12 in PR 13839 which fixed handling `allow_missing` under RequiresAny in a JwtRequirement (see issue 13458). The AnyVerifier aggregates the children verifiers' results into a final status where JwtMissing is the default error. However, a JwtUnknownIssuer was mistakenly treated the same as a JwtMissing error and the resulting final aggregation was the default JwtMissing. As a result, `allow_missing` would allow a JWT token with an unknown issuer status. This is fixed in version 1.17.1 by PR 15194. The fix works by preferring JwtUnknownIssuer over a JwtMissing error, fixing the accidental conversion and bypass with `allow_missing`. A user could detect whether a bypass occurred if they have Envoy logs enabled with debug verbosity. Users can enable component level debug logs for JWT. The JWT filter logs will indicate that there is a request with a JWT token and a failure that the JWT token is missing." } ] }, From 563a74d2d284693614a9985d393be3c7b19578a8 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 20:03:23 -0700 Subject: [PATCH 259/845] Add CVE-2021-21363 for GHSA-pc22-3g76-gm6j --- 2021/21xxx/CVE-2021-21363.json | 90 +++++++++++++++++++++++++++++++--- 1 file changed, 84 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21363.json b/2021/21xxx/CVE-2021-21363.json index 11ef1c7e10f..06f9bbd65f4 100644 --- a/2021/21xxx/CVE-2021-21363.json +++ b/2021/21xxx/CVE-2021-21363.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21363", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "swagger-codegen", + "version": { + "version_data": [ + { + "version_value": "< 2.4.19" + } + ] + } + } + ] + }, + "vendor_name": "swagger-api" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-378: Creation of Temporary File With Insecure Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j", + "refsource": "CONFIRM", + "url": "https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j" + }, + { + "name": "https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89", + "refsource": "MISC", + "url": "https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89" + } + ] + }, + "source": { + "advisory": "GHSA-pc22-3g76-gm6j", + "discovery": "UNKNOWN" } } \ No newline at end of file From dbf664b3d7ef3c500bab35436ff7b6ca113b7eb6 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Wed, 10 Mar 2021 20:04:31 -0700 Subject: [PATCH 260/845] Add CVE-2021-21364 for GHSA-hpv8-9rq5-hq7w --- 2021/21xxx/CVE-2021-21364.json | 98 +++++++++++++++++++++++++++++++--- 1 file changed, 92 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21364.json b/2021/21xxx/CVE-2021-21364.json index d8512fec863..2b47524049b 100644 --- a/2021/21xxx/CVE-2021-21364.json +++ b/2021/21xxx/CVE-2021-21364.json @@ -1,18 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21364", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Generated Code Contains Local Information Disclosure Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "swagger-codegen", + "version": { + "version_data": [ + { + "version_value": "< 2.4.19" + } + ] + } + } + ] + }, + "vendor_name": "swagger-api" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. Because this vulnerability impacts generated code, the generated code will remain vulnerable until fixed manually! This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21363." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Exposure" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-378: Creation of Temporary File With Insecure Permissions" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-732 Incorrect Permission Assignment for Critical Resource" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w", + "refsource": "CONFIRM", + "url": "https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w" + }, + { + "name": "https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2", + "refsource": "MISC", + "url": "https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2" + } + ] + }, + "source": { + "advisory": "GHSA-hpv8-9rq5-hq7w", + "discovery": "UNKNOWN" } } \ No newline at end of file From fd1ed8e5729ff2896dfe2c5f0a11b4e4031dde98 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 04:00:42 +0000 Subject: [PATCH 261/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21363.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/21xxx/CVE-2021-21363.json b/2021/21xxx/CVE-2021-21363.json index 06f9bbd65f4..b0697dcfd6d 100644 --- a/2021/21xxx/CVE-2021-21363.json +++ b/2021/21xxx/CVE-2021-21363.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364." + "value": "swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364." } ] }, From 0a6b6d070392c1280ae2bd73af0b000dd43f80e6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 07:00:41 +0000 Subject: [PATCH 262/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28132.json | 56 ++++++++++++++++++++++++++++++---- 1 file changed, 50 insertions(+), 6 deletions(-) diff --git a/2021/28xxx/CVE-2021-28132.json b/2021/28xxx/CVE-2021-28132.json index 676e687f429..16d1534c728 100644 --- a/2021/28xxx/CVE-2021-28132.json +++ b/2021/28xxx/CVE-2021-28132.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28132", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28132", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LUCY Security Awareness Software through 4.7.x allows unauthenticated remote code execution because the Migration Tool (in the Support section) allows upload of .php files within a system.tar.gz file. The .php file becomes accessible with a public/system/static URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://abuyv.com/cve/lucy-file-upload-RCE", + "refsource": "MISC", + "name": "https://abuyv.com/cve/lucy-file-upload-RCE" } ] } From 0afc17c0eba9c79a3749bcace27b9ba1bea22979 Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Thu, 11 Mar 2021 03:05:10 -0500 Subject: [PATCH 263/845] Revise CVE-2021-26567 --- 2021/26xxx/CVE-2021-26567.json | 22 ++++++++++------------ 1 file changed, 10 insertions(+), 12 deletions(-) diff --git a/2021/26xxx/CVE-2021-26567.json b/2021/26xxx/CVE-2021-26567.json index b1453b04f81..7b0c2315b12 100644 --- a/2021/26xxx/CVE-2021-26567.json +++ b/2021/26xxx/CVE-2021-26567.json @@ -15,19 +15,19 @@ "product": { "product_data": [ { - "product_name": "Synology DiskStation Manager (DSM)", + "product_name": "faad2", "version": { "version_data": [ { "affected": "<", - "version_value": "6.2.3-25426-3" + "version_value": "2.2.7.1" } ] } } ] }, - "vendor_name": "Synology" + "vendor_name": "github/knik0" } ] } @@ -36,24 +36,17 @@ "description_data": [ { "lang": "eng", - "value": "Use of unmaintained third party components vulnerability in faad in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote authenticated users to execute arbitrary code via a crafted file path." + "value": "Stack-based buffer overflow vulnerability in frontend/main.c in faad2 before 2.2.7.1 allow local attackers to execute arbitrary code via filename and pathname options." } ] }, - "impact": { - "cvss": { - "baseScore": "8.8", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.1" - } - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-1104: Use of Unmaintained Third Party Components" + "value": "CWE-121: Stack-based Buffer Overflow" } ] } @@ -65,6 +58,11 @@ "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "name": "https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa", + "refsource": "MISC", + "url": "https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa" } ] } From 9d51e77bdbe83c3a170f8c1055f52b3e7d6aad4f Mon Sep 17 00:00:00 2001 From: Siemens ProductCERT Date: Tue, 9 Mar 2021 12:55:18 +0000 Subject: [PATCH 264/845] --- 2017/12xxx/CVE-2017-12741.json | 6 +- 2017/2xxx/CVE-2017-2680.json | 24 +++++-- 2017/2xxx/CVE-2017-2681.json | 24 +++++-- 2019/10xxx/CVE-2019-10925.json | 34 ++++----- 2019/10xxx/CVE-2019-10926.json | 34 ++++----- 2019/13xxx/CVE-2019-13946.json | 14 +--- 2019/19xxx/CVE-2019-19300.json | 24 ++++++- 2019/6xxx/CVE-2019-6570.json | 22 +++--- 2020/25xxx/CVE-2020-25236.json | 55 +++++++++++++-- 2020/25xxx/CVE-2020-25239.json | 55 +++++++++++++-- 2020/25xxx/CVE-2020-25240.json | 55 +++++++++++++-- 2020/25xxx/CVE-2020-25241.json | 55 +++++++++++++-- 2020/28xxx/CVE-2020-28385.json | 75 ++++++++++++++++++-- 2020/28xxx/CVE-2020-28387.json | 65 +++++++++++++++-- 2020/28xxx/CVE-2020-28388.json | 18 +++-- 2020/7xxx/CVE-2020-7580.json | 6 +- 2020/7xxx/CVE-2020-7581.json | 22 +----- 2020/7xxx/CVE-2020-7587.json | 24 +------ 2020/7xxx/CVE-2020-7588.json | 24 +------ 2021/25xxx/CVE-2021-25667.json | 125 +++++++++++++++++++++++++++++++-- 2021/25xxx/CVE-2021-25672.json | 55 +++++++++++++-- 2021/25xxx/CVE-2021-25673.json | 55 +++++++++++++-- 2021/25xxx/CVE-2021-25674.json | 55 +++++++++++++-- 2021/25xxx/CVE-2021-25675.json | 55 +++++++++++++-- 2021/25xxx/CVE-2021-25676.json | 85 ++++++++++++++++++++-- 2021/27xxx/CVE-2021-27380.json | 75 ++++++++++++++++++-- 2021/27xxx/CVE-2021-27381.json | 65 +++++++++++++++-- 27 files changed, 964 insertions(+), 242 deletions(-) diff --git a/2017/12xxx/CVE-2017-12741.json b/2017/12xxx/CVE-2017-12741.json index e11fe7e20c7..560621e7d90 100644 --- a/2017/12xxx/CVE-2017-12741.json +++ b/2017/12xxx/CVE-2017-12741.json @@ -11,7 +11,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ { @@ -165,7 +165,7 @@ } }, { - "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6ES7143-6BH00-0BB0, 6ES7146-6FF00-0AB0 and 6ES7148-6JD00-0AB0)", + "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0)", "version": { "version_data": [ { @@ -656,7 +656,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC Compact Field Unit, SIMATIC ET200AL, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6ES7143-6BH00-0BB0, 6ES7146-6FF00-0AB0 and 6ES7148-6JD00-0AB0), SIMATIC ET200pro, SIMATIC PN/PN Coupler (incl. SIPLUS NET variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-200 Smart, SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX (F) 2010, SIMOCODE pro V EIP (incl. SIPLUS variants), SIMOCODE pro V PN (incl. SIPLUS variants), SIMOTION C, SIMOTION D (incl. SIPLUS variants), SIMOTION D4xx V4.4 for SINAMICS SM150i-2 w. PROFINET (incl. SIPLUS variants), SIMOTION P V4.4 and V4.5, SIMOTION P V5, SINAMICS DCM w. PN, SINAMICS DCP w. PN, SINAMICS G110M w. PN, SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants), SINAMICS G130 V4.7 w. PN, SINAMICS G130 V4.8 w. PN, SINAMICS G150 V4.7 w. PN, SINAMICS G150 V4.8 w. PN, SINAMICS GH150 V4.7 w. PROFINET, SINAMICS GL150 V4.7 w. PROFINET, SINAMICS GM150 V4.7 w. PROFINET, SINAMICS S110 w. PN, SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants), SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants), SINAMICS S150 V4.7 w. PN, SINAMICS S150 V4.8 w. PN, SINAMICS SL150 V4.7.0 w. PROFINET, SINAMICS SL150 V4.7.4 w. PROFINET, SINAMICS SL150 V4.7.5 w. PROFINET, SINAMICS SM120 V4.7 w. PROFINET, SINAMICS V90 w. PN, SINUMERIK 840D sl, SIRIUS Soft Starter 3RW44 PN. Specially crafted packets sent to port 161/udp could cause a Denial-of-Service condition. The affected devices must be restarted manually." + "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC Compact Field Unit, SIMATIC ET200AL, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0), SIMATIC ET200pro, SIMATIC PN/PN Coupler (incl. SIPLUS NET variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-200 Smart, SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX (F) 2010, SIMOCODE pro V EIP (incl. SIPLUS variants), SIMOCODE pro V PN (incl. SIPLUS variants), SIMOTION C, SIMOTION D (incl. SIPLUS variants), SIMOTION D4xx V4.4 for SINAMICS SM150i-2 w. PROFINET (incl. SIPLUS variants), SIMOTION P V4.4 and V4.5, SIMOTION P V5, SINAMICS DCM w. PN, SINAMICS DCP w. PN, SINAMICS G110M w. PN, SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants), SINAMICS G130 V4.7 w. PN, SINAMICS G130 V4.8 w. PN, SINAMICS G150 V4.7 w. PN, SINAMICS G150 V4.8 w. PN, SINAMICS GH150 V4.7 w. PROFINET, SINAMICS GL150 V4.7 w. PROFINET, SINAMICS GM150 V4.7 w. PROFINET, SINAMICS S110 w. PN, SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants), SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants), SINAMICS S150 V4.7 w. PN, SINAMICS S150 V4.8 w. PN, SINAMICS SL150 V4.7.0 w. PROFINET, SINAMICS SL150 V4.7.4 w. PROFINET, SINAMICS SL150 V4.7.5 w. PROFINET, SINAMICS SM120 V4.7 w. PROFINET, SINAMICS V90 w. PN, SINUMERIK 840D sl, SIRIUS Soft Starter 3RW44 PN. Specially crafted packets sent to port 161/udp could cause a Denial-of-Service condition. The affected devices must be restarted manually.\n" } ] }, diff --git a/2017/2xxx/CVE-2017-2680.json b/2017/2xxx/CVE-2017-2680.json index f66d0ea8731..651f121b809 100644 --- a/2017/2xxx/CVE-2017-2680.json +++ b/2017/2xxx/CVE-2017-2680.json @@ -11,11 +11,11 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ { - "product_name": "Development/Evaluation Kit DK Standard Ethernet Controller", + "product_name": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", "version": { "version_data": [ { @@ -25,7 +25,7 @@ } }, { - "product_name": "Development/Evaluation Kit EK-ERTEC 200", + "product_name": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", "version": { "version_data": [ { @@ -35,7 +35,7 @@ } }, { - "product_name": "Development/Evaluation Kit EK-ERTEC 200P", + "product_name": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", "version": { "version_data": [ { @@ -335,7 +335,7 @@ } }, { - "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6ES7143-6BH00-0BB0, 6ES7146-6FF00-0AB0 and 6ES7148-6JD00-0AB0)", + "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0)", "version": { "version_data": [ { @@ -364,6 +364,16 @@ ] } }, + { + "product_name": "SIMATIC MV400 family", + "version": { + "version_data": [ + { + "version_value": "All Versions < V7.0.6" + } + ] + } + }, { "product_name": "SIMATIC NET CM 1542-1", "version": { @@ -1096,7 +1106,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-400: Uncontrolled Resource Consumption" } ] } @@ -1106,7 +1116,7 @@ "description_data": [ { "lang": "eng", - "value": "Specially crafted PROFINET DCP broadcast packets could cause a Denial-of-Service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected." + "value": "Specially crafted PROFINET DCP broadcast packets could cause a Denial-of-Service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.\n" } ] }, diff --git a/2017/2xxx/CVE-2017-2681.json b/2017/2xxx/CVE-2017-2681.json index 2dcbe7ab6e7..55bebe0edef 100644 --- a/2017/2xxx/CVE-2017-2681.json +++ b/2017/2xxx/CVE-2017-2681.json @@ -11,11 +11,11 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ { - "product_name": "Development/Evaluation Kit DK Standard Ethernet Controller", + "product_name": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", "version": { "version_data": [ { @@ -25,7 +25,7 @@ } }, { - "product_name": "Development/Evaluation Kit EK-ERTEC 200", + "product_name": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", "version": { "version_data": [ { @@ -35,7 +35,7 @@ } }, { - "product_name": "Development/Evaluation Kit EK-ERTEC 200P", + "product_name": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", "version": { "version_data": [ { @@ -255,7 +255,7 @@ } }, { - "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6ES7143-6BH00-0BB0, 6ES7146-6FF00-0AB0 and 6ES7148-6JD00-0AB0)", + "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0)", "version": { "version_data": [ { @@ -284,6 +284,16 @@ ] } }, + { + "product_name": "SIMATIC MV400 family", + "version": { + "version_data": [ + { + "version_value": "All Versions < V7.0.6" + } + ] + } + }, { "product_name": "SIMATIC NET CM 1542-1", "version": { @@ -936,7 +946,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-400: Uncontrolled Resource Consumption" } ] } @@ -946,7 +956,7 @@ "description_data": [ { "lang": "eng", - "value": "Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a Denial-of-Service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices." + "value": "Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a Denial-of-Service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices.\n" } ] }, diff --git a/2019/10xxx/CVE-2019-10925.json b/2019/10xxx/CVE-2019-10925.json index 9bc4b3719e0..646260ba707 100644 --- a/2019/10xxx/CVE-2019-10925.json +++ b/2019/10xxx/CVE-2019-10925.json @@ -5,31 +5,21 @@ "STATE": "PUBLIC" }, "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", "affects": { "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ { - "product_name": "SIMATIC Ident MV420 family", + "product_name": "SIMATIC MV400 family", "version": { "version_data": [ { - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SIMATIC Ident MV440 family", - "version": { - "version_data": [ - { - "version_value": "All versions" + "version_value": "All Versions < V7.0.6" } ] } @@ -52,6 +42,14 @@ } ] }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially\ncrafted requests to the integrated webserver.\n\nThe security vulnerability can be exploited by an attacker with network\naccess to the device. Valid user credentials, but no user interaction are\nrequired. Successful exploitation compromises integrity and availability of\nthe device.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n" + } + ] + }, "references": { "reference_data": [ { @@ -70,13 +68,5 @@ "url": "http://www.securityfocus.com/bid/108725" } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC Ident MV420 family (All versions), SIMATIC Ident MV440 family (All versions). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known." - } - ] } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10926.json b/2019/10xxx/CVE-2019-10926.json index e8453644fa3..9dbcd7ed0cd 100644 --- a/2019/10xxx/CVE-2019-10926.json +++ b/2019/10xxx/CVE-2019-10926.json @@ -5,31 +5,21 @@ "STATE": "PUBLIC" }, "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", "affects": { "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ { - "product_name": "SIMATIC Ident MV420 family", + "product_name": "SIMATIC MV400 family", "version": { "version_data": [ { - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SIMATIC Ident MV440 family", - "version": { - "version_data": [ - { - "version_value": "All versions" + "version_value": "All Versions < V7.0.6" } ] } @@ -52,6 +42,14 @@ } ] }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). Communication with the device is not encrypted. Data transmitted between the\ndevice and the user can be obtained by an attacker in a privileged network\nposition.\n\nThe security vulnerability can be exploited by an attacker in a privileged\nnetwork position which allows eavesdropping the communication between the\naffected device and the user. The user must invoke a session. Successful\nexploitation of the vulnerability compromises confidentiality of the data\ntransmitted.\n" + } + ] + }, "references": { "reference_data": [ { @@ -70,13 +68,5 @@ "url": "http://www.securityfocus.com/bid/108725" } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC Ident MV420 family (All versions), SIMATIC Ident MV440 family (All versions). Communication with the device is not encrypted. Data transmitted between the device and the user can be obtained by an attacker in a privileged network position. The security vulnerability can be exploited by an attacker in a privileged network position which allows evesdropping the communication between the affected device and the user. The user must invoke a session. Successful exploitation of the vulnerability compromises confidentiality of the data transmitted. At the time of advisory publication no public exploitation of this security vulnerability was known." - } - ] } } \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13946.json b/2019/13xxx/CVE-2019-13946.json index 8d37fa76919..92beb8d517c 100644 --- a/2019/13xxx/CVE-2019-13946.json +++ b/2019/13xxx/CVE-2019-13946.json @@ -234,16 +234,6 @@ ] } }, - { - "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6ES7143-6BH00-0BB0, 6ES7146-6FF00-0AB0 and 6ES7148-6JD00-0AB0)", - "version": { - "version_data": [ - { - "version_value": "All versions" - } - ] - } - }, { "product_name": "SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0)", "version": { @@ -289,7 +279,7 @@ "version": { "version_data": [ { - "version_value": "All versions" + "version_value": "All Versions < V7.0.6" } ] } @@ -486,7 +476,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All Versions < V4.5), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All Versions < V4.6), PROFINET Driver for Controller (All Versions < V2.1), RUGGEDCOM RM1224 (All versions < V4.3), SCALANCE M-800 / S615 (All versions < V4.3), SCALANCE W700 IEEE 802.11n (All versions <= V6.0.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All Versions < V5.3), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions), SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG (All Versions < V3.0), SCALANCE XM-400 switch family (All Versions < V6.0), SCALANCE XR-500 switch family (All Versions < V6.0), SIMATIC ET200AL IM 157-1 PN (All versions), SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) (All versions), SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) (All versions), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All Versions < V4.2.0), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200S (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All Versions < V3.3.1), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6ES7143-6BH00-0BB0, 6ES7146-6FF00-0AB0 and 6ES7148-6JD00-0AB0) (All versions), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0) (All versions), SIMATIC ET200pro, IM 154-3 PN HF (All versions), SIMATIC ET200pro, IM 154-4 PN HF (All versions), SIMATIC IPC Support, Package for VxWorks (All versions), SIMATIC MV400 family (All versions), SIMATIC NET CP 1616 and CP 1604 (All Versions < V2.8), SIMATIC NET CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 ERPC (All versions), SIMATIC NET CP 343-1 LEAN (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 OPC UA (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) (All Versions), SIMATIC RF180C (All versions), SIMATIC RF182C (All versions), SIMATIC RF600 family (All versions < V3), SIMOTION C (All versions < V4.5), SIMOTION D (incl. SIPLUS variants) (All versions < V4.5), SIMOTION P (All versions < V4.5), SINAMICS DCP (All Versions < V1.3), SOFTNET-IE PNIO (All versions). Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit internal resource allocation when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. This could lead to a denial of service condition due to lack of memory for devices that include a vulnerable version of the stack. The security vulnerability could be exploited by an attacker with network access to an affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the availability of the device." + "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All Versions < V4.5), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All Versions < V4.6), PROFINET Driver for Controller (All Versions < V2.1), RUGGEDCOM RM1224 (All versions < V4.3), SCALANCE M-800 / S615 (All versions < V4.3), SCALANCE W700 IEEE 802.11n (All versions <= V6.0.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All Versions < V5.3), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions), SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG (All Versions < V3.0), SCALANCE XM-400 switch family (All Versions < V6.0), SCALANCE XR-500 switch family (All Versions < V6.0), SIMATIC ET200AL IM 157-1 PN (All versions), SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) (All versions), SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) (All versions), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All Versions < V4.2.0), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200S (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All Versions < V3.3.1), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0) (All versions), SIMATIC ET200pro, IM 154-3 PN HF (All versions), SIMATIC ET200pro, IM 154-4 PN HF (All versions), SIMATIC IPC Support, Package for VxWorks (All versions), SIMATIC MV400 family (All Versions < V7.0.6), SIMATIC NET CP 1616 and CP 1604 (All Versions < V2.8), SIMATIC NET CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 ERPC (All versions), SIMATIC NET CP 343-1 LEAN (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 OPC UA (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) (All Versions), SIMATIC RF180C (All versions), SIMATIC RF182C (All versions), SIMATIC RF600 family (All versions < V3), SIMOTION C (All versions < V4.5), SIMOTION D (incl. SIPLUS variants) (All versions < V4.5), SIMOTION P (All versions < V4.5), SINAMICS DCP (All Versions < V1.3), SOFTNET-IE PNIO (All versions). Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit\ninternal resource allocation when multiple legitimate diagnostic package\nrequests are sent to the DCE-RPC interface.\nThis could lead to a denial of service condition due to lack of memory\nfor devices that include a vulnerable version of the stack.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to an affected device. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise the availability of the device.\n" } ] }, diff --git a/2019/19xxx/CVE-2019-19300.json b/2019/19xxx/CVE-2019-19300.json index ab44eb077d7..2a6f027d4b0 100644 --- a/2019/19xxx/CVE-2019-19300.json +++ b/2019/19xxx/CVE-2019-19300.json @@ -11,9 +11,29 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ + { + "product_name": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + }, + { + "product_name": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + }, { "product_name": "KTK ATE530S", "version": { @@ -276,7 +296,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in KTK ATE530S (All versions), SIDOOR ATD430W (All versions), SIDOOR ATE530S COATED (All versions), SIDOOR ATE531S (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 MF HF (All versions), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC MICRO-DRIVE PDC (All versions), SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) (All versions >= V4.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.0), SIMATIC S7-1500 Software Controller (All versions < V2.0), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions), SIMATIC TDC CP51M1 (All versions), SIMATIC TDC CPU555 (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINAMICS S/G Control Unit w. PROFINET (All versions). The Interniche-based TCP Stack can be forced to make very expensive calls for every incoming packet which can lead to a denial of service." + "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), KTK ATE530S (All versions), SIDOOR ATD430W (All versions), SIDOOR ATE530S COATED (All versions), SIDOOR ATE531S (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 MF HF (All versions), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC MICRO-DRIVE PDC (All versions), SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) (All versions >= V4.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.0), SIMATIC S7-1500 Software Controller (All versions < V2.0), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions), SIMATIC TDC CP51M1 (All versions), SIMATIC TDC CPU555 (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINAMICS S/G Control Unit w. PROFINET (All versions). The Interniche-based TCP Stack can be forced to make very expensive calls for every incoming packet which can lead to a denial of service.\n" } ] }, diff --git a/2019/6xxx/CVE-2019-6570.json b/2019/6xxx/CVE-2019-6570.json index dc2b8ee594d..d92142a3fed 100644 --- a/2019/6xxx/CVE-2019-6570.json +++ b/2019/6xxx/CVE-2019-6570.json @@ -5,13 +5,13 @@ "STATE": "PUBLIC" }, "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", "affects": { "vendor": { "vendor_data": [ { - "vendor_name": "Siemens AG", + "vendor_name": "Siemens", "product": { "product_data": [ { @@ -36,12 +36,20 @@ "description": [ { "lang": "eng", - "value": "CWE-280: Improper Handling of Insufficient Permissions or Privileges" + "value": "CWE-280: Improper Handling of Insufficient Permissions or Privileges " } ] } ] }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Due to insufficient checking of user permissions, an attacker may access URLs that require special authorization.\n\nAn attacker must have access to a low privileged\naccount in order to exploit the vulnerability.\n" + } + ] + }, "references": { "reference_data": [ { @@ -50,13 +58,5 @@ "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf" } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Due to insufficient checking of user permissions, an attacker may access URLs that require special authorization. The security vulnerability could be exploited by an attacker with network access to the affected system. An attacker must have access to a low privileged account in order to exploit the vulnerability. An attacker could use the vulnerability to compromise confidentiality, integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known." - } - ] } } \ No newline at end of file diff --git a/2020/25xxx/CVE-2020-25236.json b/2020/25xxx/CVE-2020-25236.json index e624abd0ee8..abed636a1aa 100644 --- a/2020/25xxx/CVE-2020-25236.json +++ b/2020/25xxx/CVE-2020-25236.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2020-25236", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-25236", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "LOGO! 8 BM (incl. SIPLUS variants)", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-755: Improper Handling of Exceptional Conditions" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). The control logic (CL) the LOGO! 8 executes could be manipulated in a way that could cause the device\nexecuting the CL to improperly handle the manipulation and crash. After successful execution of the attack, the device needs to be manually reset.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-783481.pdf" } ] } diff --git a/2020/25xxx/CVE-2020-25239.json b/2020/25xxx/CVE-2020-25239.json index 2f930ef2053..19c3d815dbd 100644 --- a/2020/25xxx/CVE-2020-25239.json +++ b/2020/25xxx/CVE-2020-25239.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2020-25239", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-25239", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEMA Remote Connect Server", + "version": { + "version_data": [ + { + "version_value": "All versions < V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863: Incorrect Authorization" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). The webserver could allow unauthorized actions via special urls for unpriviledged users. The settings of the UMC authorization server could be changed to add a rogue server by an attacker authenticating with unprivilege user rights.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf" } ] } diff --git a/2020/25xxx/CVE-2020-25240.json b/2020/25xxx/CVE-2020-25240.json index 66353e322f5..e11601631ff 100644 --- a/2020/25xxx/CVE-2020-25240.json +++ b/2020/25xxx/CVE-2020-25240.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2020-25240", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-25240", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEMA Remote Connect Server", + "version": { + "version_data": [ + { + "version_value": "All versions < V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863: Incorrect Authorization" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). Unpriviledged users can access services when guessing the url. An attacker could impact availability, integrity and gain information from logs and templates of the service.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf" } ] } diff --git a/2020/25xxx/CVE-2020-25241.json b/2020/25xxx/CVE-2020-25241.json index e1d63031e28..f35768d9dc4 100644 --- a/2020/25xxx/CVE-2020-25241.json +++ b/2020/25xxx/CVE-2020-25241.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2020-25241", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-25241", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SIMATIC MV400 family", + "version": { + "version_data": [ + { + "version_value": "All Versions < V7.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28385.json b/2020/28xxx/CVE-2020-28385.json index 38f344af09b..58c636bc1fe 100644 --- a/2020/28xxx/CVE-2020-28385.json +++ b/2020/28xxx/CVE-2020-28385.json @@ -1,17 +1,80 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2020-28385", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-28385", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Solid Edge SE2020", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2020MP13" + } + ] + } + }, + { + "product_name": "Solid Edge SE2021", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2021MP3" + } + ] + } + }, + { + "product_name": "Solid Edge SE2021", + "version": { + "version_data": [ + { + "version_value": "SE2021MP3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3), Solid Edge SE2021 (SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12049)" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28387.json b/2020/28xxx/CVE-2020-28387.json index 051b976cabb..f9f59a2fa59 100644 --- a/2020/28xxx/CVE-2020-28387.json +++ b/2020/28xxx/CVE-2020-28387.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2020-28387", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-28387", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Solid Edge SE2020", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2020MP13" + } + ] + } + }, + { + "product_name": "Solid Edge SE2021", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2021MP3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611: Improper Restriction of XML External Entity Reference" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923)\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28388.json b/2020/28xxx/CVE-2020-28388.json index b7538cd7bf0..296ed836eb1 100644 --- a/2020/28xxx/CVE-2020-28388.json +++ b/2020/28xxx/CVE-2020-28388.json @@ -33,6 +33,16 @@ } ] } + }, + { + "product_name": "PLUSCONTROL 1st Gen", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } } ] } @@ -56,7 +66,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2012.12). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones." + "value": "A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2012.12), PLUSCONTROL 1st Gen (All versions). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones.\n" } ] }, @@ -69,9 +79,9 @@ }, { "refsource": "CONFIRM", - "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" } ] } -} \ No newline at end of file +} diff --git a/2020/7xxx/CVE-2020-7580.json b/2020/7xxx/CVE-2020-7580.json index 2051b6c1d55..e2e8d7bc2d9 100644 --- a/2020/7xxx/CVE-2020-7580.json +++ b/2020/7xxx/CVE-2020-7580.json @@ -249,7 +249,7 @@ "version": { "version_data": [ { - "version_value": "All versions" + "version_value": "All Versions < V6.14" } ] } @@ -259,7 +259,7 @@ "version": { "version_data": [ { - "version_value": "All versions" + "version_value": "All Versions < V6.14" } ] } @@ -286,7 +286,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC Automation Tool (All versions), SIMATIC NET PC software (All versions V16 < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (All versions < V5.6 SP2 HF3), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC WinCC OA V3.16 (All versions < P018), SIMATIC WinCC OA V3.17 (All versions < P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions), SINEMA Server (All versions), SINUMERIK ONE virtual (All versions), SINUMERIK Operate (All versions). A component within the affected application regularly calls a helper binary with SYSTEM privileges while the call path is not quoted." + "value": "A vulnerability has been identified in SIMATIC Automation Tool (All versions), SIMATIC NET PC software (All versions V16 < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (All versions < V5.6 SP2 HF3), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC WinCC OA V3.16 (All versions < P018), SIMATIC WinCC OA V3.17 (All versions < P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions), SINEMA Server (All versions), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A component within the affected application regularly calls a helper binary with SYSTEM privileges while the call path is not quoted.\n" } ] }, diff --git a/2020/7xxx/CVE-2020-7581.json b/2020/7xxx/CVE-2020-7581.json index c2c8bd61937..4734a43e124 100644 --- a/2020/7xxx/CVE-2020-7581.json +++ b/2020/7xxx/CVE-2020-7581.json @@ -114,16 +114,6 @@ ] } }, - { - "product_name": "SIMOCODE ES", - "version": { - "version_data": [ - { - "version_value": "All versions < V16 Update 1" - } - ] - } - }, { "product_name": "SIMOCODE ES <= V15.1", "version": { @@ -144,16 +134,6 @@ ] } }, - { - "product_name": "Soft Starter ES", - "version": { - "version_data": [ - { - "version_value": "All versions < V16 Update 1" - } - ] - } - }, { "product_name": "Soft Starter ES <= V15.1", "version": { @@ -196,7 +176,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES (All versions < V16 Update 1), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted." + "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted.\n" } ] }, diff --git a/2020/7xxx/CVE-2020-7587.json b/2020/7xxx/CVE-2020-7587.json index 6a3c87e25d2..50ad3668107 100644 --- a/2020/7xxx/CVE-2020-7587.json +++ b/2020/7xxx/CVE-2020-7587.json @@ -89,7 +89,7 @@ "version": { "version_data": [ { - "version_value": "All versions" + "version_value": "All versions < V8.0" } ] } @@ -134,16 +134,6 @@ ] } }, - { - "product_name": "SIMOCODE ES", - "version": { - "version_data": [ - { - "version_value": "All versions < V16 Update 1" - } - ] - } - }, { "product_name": "SIMOCODE ES <= V15.1", "version": { @@ -164,16 +154,6 @@ ] } }, - { - "product_name": "Soft Starter ES", - "version": { - "version_data": [ - { - "version_value": "All versions < V16 Update 1" - } - ] - } - }, { "product_name": "Soft Starter ES <= V15.1", "version": { @@ -216,7 +196,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES (All versions < V16 Update 1), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could cause a partial remote Denial-of-Service, that would cause the service to restart itself. On some cases the vulnerability could leak random information from the remote service." + "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could\ncause a partial remote Denial-of-Service, that would cause the service\nto restart itself.\n\nOn some cases the vulnerability could leak random information from the\nremote service.\n" } ] }, diff --git a/2020/7xxx/CVE-2020-7588.json b/2020/7xxx/CVE-2020-7588.json index ec7f878a7ae..73d6fde84d9 100644 --- a/2020/7xxx/CVE-2020-7588.json +++ b/2020/7xxx/CVE-2020-7588.json @@ -89,7 +89,7 @@ "version": { "version_data": [ { - "version_value": "All versions" + "version_value": "All versions < V8.0" } ] } @@ -134,16 +134,6 @@ ] } }, - { - "product_name": "SIMOCODE ES", - "version": { - "version_data": [ - { - "version_value": "All versions < V16 Update 1" - } - ] - } - }, { "product_name": "SIMOCODE ES <= V15.1", "version": { @@ -164,16 +154,6 @@ ] } }, - { - "product_name": "Soft Starter ES", - "version": { - "version_data": [ - { - "version_value": "All versions < V16 Update 1" - } - ] - } - }, { "product_name": "Soft Starter ES <= V15.1", "version": { @@ -216,7 +196,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES (All versions < V16 Update 1), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote Denial-of-Service, that would cause the service to restart itself." + "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a\npartial remote Denial-of-Service, that would cause the service to restart\nitself.\n" } ] }, diff --git a/2021/25xxx/CVE-2021-25667.json b/2021/25xxx/CVE-2021-25667.json index 209ca68e893..f621ad16fda 100644 --- a/2021/25xxx/CVE-2021-25667.json +++ b/2021/25xxx/CVE-2021-25667.json @@ -1,17 +1,130 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-25667", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25667", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "RUGGEDCOM RM1224", + "version": { + "version_data": [ + { + "version_value": "All versions >= V4.3" + } + ] + } + }, + { + "product_name": "SCALANCE M-800", + "version": { + "version_data": [ + { + "version_value": "All versions >= V4.3" + } + ] + } + }, + { + "product_name": "SCALANCE S615", + "version": { + "version_data": [ + { + "version_value": "All versions >= V4.3" + } + ] + } + }, + { + "product_name": "SCALANCE SC-600 Family", + "version": { + "version_data": [ + { + "version_value": "All versions >= V2.0 and < V2.1.3" + } + ] + } + }, + { + "product_name": "SCALANCE X300WG", + "version": { + "version_data": [ + { + "version_value": "All versions < V4.1" + } + ] + } + }, + { + "product_name": "SCALANCE XM400", + "version": { + "version_data": [ + { + "version_value": "All versions < V6.2" + } + ] + } + }, + { + "product_name": "SCALANCE XR500", + "version": { + "version_data": [ + { + "version_value": "All versions < V6.2" + } + ] + } + }, + { + "product_name": "SCALANCE Xx200 Family", + "version": { + "version_data": [ + { + "version_value": "All versions < V4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3), SCALANCE M-800 (All versions >= V4.3), SCALANCE S615 (All versions >= V4.3), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE X300WG (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XR500 (All versions < V6.2), SCALANCE Xx200 Family (All versions < V4.1). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could \nallow a remote attacker to trigger a denial-of-service condition or potentially remote code execution.\n\nSuccessful exploitation requires the passive listening feature of the device to be active.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25672.json b/2021/25xxx/CVE-2021-25672.json index 889ff8ba94d..bb513a786d9 100644 --- a/2021/25xxx/CVE-2021-25672.json +++ b/2021/25xxx/CVE-2021-25672.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-25672", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25672", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Mendix Forgot Password Appstore module", + "version": { + "version_data": [ + { + "version_value": "All Versions < V3.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Mendix Forgot Password Appstore module (All Versions < V3.2.1). The Forgot Password Marketplace module does not properly control access. An attacker could take over accounts.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917115.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25673.json b/2021/25xxx/CVE-2021-25673.json index c0066a17bdf..70b4b993f98 100644 --- a/2021/25xxx/CVE-2021-25673.json +++ b/2021/25xxx/CVE-2021-25673.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-25673", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25673", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SIMATIC S7-PLCSIM V5.4", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, the application could enter an infinite loop, become unresponsive and must be restarted to restore the service.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25674.json b/2021/25xxx/CVE-2021-25674.json index 32b514f1e6d..a627127396c 100644 --- a/2021/25xxx/CVE-2021-25674.json +++ b/2021/25xxx/CVE-2021-25674.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-25674", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25674", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SIMATIC S7-PLCSIM V5.4", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476: NULL Pointer Dereference" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a NULL pointer deference condition could cause the application to terminate unexpectedly and must be restarted to restore the service.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25675.json b/2021/25xxx/CVE-2021-25675.json index ee7d2d74ce3..f38c4bb5539 100644 --- a/2021/25xxx/CVE-2021-25675.json +++ b/2021/25xxx/CVE-2021-25675.json @@ -1,17 +1,60 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-25675", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25675", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SIMATIC S7-PLCSIM V5.4", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369: Divide By Zero" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a divide by zero operation could occur and cause the application to terminate unexpectedly and must be restarted to restore the service.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25676.json b/2021/25xxx/CVE-2021-25676.json index 59ea7f5be4a..eb934ee1320 100644 --- a/2021/25xxx/CVE-2021-25676.json +++ b/2021/25xxx/CVE-2021-25676.json @@ -1,17 +1,90 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-25676", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25676", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "RUGGEDCOM RM1224", + "version": { + "version_data": [ + { + "version_value": "V6.3" + } + ] + } + }, + { + "product_name": "SCALANCE M-800", + "version": { + "version_data": [ + { + "version_value": "V6.3" + } + ] + } + }, + { + "product_name": "SCALANCE S615", + "version": { + "version_data": [ + { + "version_value": "V6.3" + } + ] + } + }, + { + "product_name": "SCALANCE SC-600", + "version": { + "version_data": [ + { + "version_value": "All Versions >= V2.1 and < V2.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-307: Improper Restriction of Excessive Authentication Attempts" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically.\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-296266.pdf" } ] } diff --git a/2021/27xxx/CVE-2021-27380.json b/2021/27xxx/CVE-2021-27380.json index 5ec7c0fa06c..8a3db197c93 100644 --- a/2021/27xxx/CVE-2021-27380.json +++ b/2021/27xxx/CVE-2021-27380.json @@ -1,17 +1,80 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-27380", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27380", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Solid Edge SE2020", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2020MP13" + } + ] + } + }, + { + "product_name": "Solid Edge SE2021", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2021MP3" + } + ] + } + }, + { + "product_name": "Solid Edge SE2021", + "version": { + "version_data": [ + { + "version_value": "SE2021MP3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3), Solid Edge SE2021 (SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12532)\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2021/27xxx/CVE-2021-27381.json b/2021/27xxx/CVE-2021-27381.json index 5586f219eaf..1d96586a51d 100644 --- a/2021/27xxx/CVE-2021-27381.json +++ b/2021/27xxx/CVE-2021-27381.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", + "ID": "CVE-2021-27381", + "STATE": "PUBLIC" + }, "data_format": "MITRE", "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-27381", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Solid Edge SE2020", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2020MP13" + } + ] + } + }, + { + "product_name": "Solid Edge SE2021", + "version": { + "version_data": [ + { + "version_value": "All Versions < SE2021MP3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534)\n" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } From b411b4f8aaead8609672a6aa347e3ad2eaaf3136 Mon Sep 17 00:00:00 2001 From: Stanley S Huang Date: Thu, 11 Mar 2021 17:08:10 +0800 Subject: [PATCH 265/845] QSA-20-08 switch CVE-2020-2506 and CVE-2020-2507 The order should be exchanged. --- 2020/2xxx/CVE-2020-2506.json | 34 +++++++++++++--------------------- 2020/2xxx/CVE-2020-2507.json | 36 ++++++++++++++++++++++-------------- 2 files changed, 35 insertions(+), 35 deletions(-) diff --git a/2020/2xxx/CVE-2020-2506.json b/2020/2xxx/CVE-2020-2506.json index fdcc58870ee..c674cd1ff24 100644 --- a/2020/2xxx/CVE-2020-2506.json +++ b/2020/2xxx/CVE-2020-2506.json @@ -10,7 +10,6 @@ "vendor": { "vendor_data": [ { - "vendor_name": "QNAP Systems Inc.", "product": { "product_data": [ { @@ -18,13 +17,15 @@ "version": { "version_data": [ { - "version_value": "< 3.0.3" + "version_affected": "<", + "version_value": "3.0.3" } ] } } ] - } + }, + "vendor_name": "QNAP Systems Inc." } ] } @@ -32,7 +33,7 @@ "credit": [ { "lang": "eng", - "value": "Jose Antonio P\u00e9rez Piedra" + "value": "Jose Antonio Pérez Piedra" } ], "data_format": "MITRE", @@ -42,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to obtain control of a QNAP device. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3." + "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to compromise the security of the software by gaining privileges, or reading sensitive information.\nThis issue affects:\nQNAP Systems Inc. Helpdesk\nversions prior to 3.0.3." } ] }, @@ -53,15 +54,15 @@ "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, @@ -71,15 +72,7 @@ "description": [ { "lang": "eng", - "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')" - } - ] - }, - { - "description": [ - { - "lang": "eng", - "value": "CWE-78 OS Command Injection" + "value": "CWE-284 Improper Access Control" } ] } @@ -89,7 +82,6 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08" } ] diff --git a/2020/2xxx/CVE-2020-2507.json b/2020/2xxx/CVE-2020-2507.json index d9f07b69905..f9dc3eab8f8 100644 --- a/2020/2xxx/CVE-2020-2507.json +++ b/2020/2xxx/CVE-2020-2507.json @@ -4,13 +4,12 @@ "DATE_PUBLIC": "2020-10-07T03:07:00.000Z", "ID": "CVE-2020-2507", "STATE": "PUBLIC", - "TITLE": "improper access control vulnerability in Helpdesk" + "TITLE": "command injection vulnerability in Helpdesk" }, "affects": { "vendor": { "vendor_data": [ { - "vendor_name": "QNAP Systems Inc.", "product": { "product_data": [ { @@ -18,13 +17,15 @@ "version": { "version_data": [ { - "version_value": "< 3.0.3" + "version_affected": "<", + "version_value": "3.0.3" } ] } } ] - } + }, + "vendor_name": "QNAP Systems Inc." } ] } @@ -32,7 +33,7 @@ "credit": [ { "lang": "eng", - "value": "Jose Antonio P\u00e9rez Piedra" + "value": "Jose Antonio Pérez Piedra" } ], "data_format": "MITRE", @@ -42,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to obtain control of a QNAP device. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3." + "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands.\nThis issue affects:\nQNAP Systems Inc. Helpdesk\nversions prior to 3.0.3." } ] }, @@ -53,15 +54,15 @@ "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", - "availabilityImpact": "LOW", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, @@ -71,7 +72,15 @@ "description": [ { "lang": "eng", - "value": "CWE-284 Improper Access Control" + "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 OS Command Injection" } ] } @@ -81,7 +90,6 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08" } ] From 040e7ade76ff04b38712d7335fdebec142626cea Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 12:00:40 +0000 Subject: [PATCH 266/845] "-Synchronized-Data." --- 2011/1xxx/CVE-2011-1473.json | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/2011/1xxx/CVE-2011-1473.json b/2011/1xxx/CVE-2011-1473.json index 3cbcd357054..effc4411297 100644 --- a/2011/1xxx/CVE-2011-1473.json +++ b/2011/1xxx/CVE-2011-1473.json @@ -146,6 +146,21 @@ "refsource": "MLIST", "name": "[rocketmq-dev] 20200305 [GitHub] [rocketmq] ShadowySpirits opened a new pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "url": "https://lists.apache.org/thread.html/r77fe575893261889b983e067293be72fa1f8c6305ede9fdbc404c514@%3Cdev.rocketmq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] vongosling closed issue #1233: TLS Client-initiated renegotiation attack (CVE-2011-1473)", + "url": "https://lists.apache.org/thread.html/r5e595b91f00613dafa635852121d45b161e8b5c3eba4551aeccc6483@%3Cdev.rocketmq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[rocketmq-commits] 20210311 [rocketmq] branch develop updated: [ISSUE #1233] Fix CVE-2011-1473", + "url": "https://lists.apache.org/thread.html/r3822ad69442291562c2ab41132fc49780d269e8b52deb458b7060f6d@%3Ccommits.rocketmq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] vongosling merged pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", + "url": "https://lists.apache.org/thread.html/r8680f41bcdad13c3f267cb868b45e5fb1f57df8b39d25193f7d66500@%3Cdev.rocketmq.apache.org%3E" } ] } From 1644f66025b1d028025019263aeb7d19d081d3f1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 15:00:42 +0000 Subject: [PATCH 267/845] "-Synchronized-Data." --- 2020/2xxx/CVE-2020-2506.json | 9 +++++---- 2020/2xxx/CVE-2020-2507.json | 9 +++++---- 2021/3xxx/CVE-2021-3034.json | 4 ++-- 3 files changed, 12 insertions(+), 10 deletions(-) diff --git a/2020/2xxx/CVE-2020-2506.json b/2020/2xxx/CVE-2020-2506.json index c674cd1ff24..6dcc676a4ba 100644 --- a/2020/2xxx/CVE-2020-2506.json +++ b/2020/2xxx/CVE-2020-2506.json @@ -33,7 +33,7 @@ "credit": [ { "lang": "eng", - "value": "Jose Antonio Pérez Piedra" + "value": "Jose Antonio P\u00e9rez Piedra" } ], "data_format": "MITRE", @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to compromise the security of the software by gaining privileges, or reading sensitive information.\nThis issue affects:\nQNAP Systems Inc. Helpdesk\nversions prior to 3.0.3." + "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to compromise the security of the software by gaining privileges, or reading sensitive information. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3." } ] }, @@ -81,8 +81,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08" + "refsource": "MISC", + "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08", + "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08" } ] }, diff --git a/2020/2xxx/CVE-2020-2507.json b/2020/2xxx/CVE-2020-2507.json index f9dc3eab8f8..f623b346079 100644 --- a/2020/2xxx/CVE-2020-2507.json +++ b/2020/2xxx/CVE-2020-2507.json @@ -33,7 +33,7 @@ "credit": [ { "lang": "eng", - "value": "Jose Antonio Pérez Piedra" + "value": "Jose Antonio P\u00e9rez Piedra" } ], "data_format": "MITRE", @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands.\nThis issue affects:\nQNAP Systems Inc. Helpdesk\nversions prior to 3.0.3." + "value": "The vulnerability have been reported to affect earlier versions of QTS. If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3." } ] }, @@ -89,8 +89,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08" + "refsource": "MISC", + "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08", + "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-08" } ] }, diff --git a/2021/3xxx/CVE-2021-3034.json b/2021/3xxx/CVE-2021-3034.json index bd1fa1ed40e..6ab63d8cdb7 100644 --- a/2021/3xxx/CVE-2021-3034.json +++ b/2021/3xxx/CVE-2021-3034.json @@ -85,7 +85,7 @@ "description_data": [ { "lang": "eng", - "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup.\n\nThis logged information includes the private key and identity provider certificate used to configure the SAML SSO integration.\nThis issue impacts:\nCortex XSOAR 5.5.0 builds earlier than 98622;\nCortex XSOAR 6.0.1 builds earlier than 830029;\nCortex XSOAR 6.0.2 builds earlier than 98623;\nCortex XSOAR 6.1.0 builds earlier than 848144.\n" + "value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144." } ] }, @@ -166,4 +166,4 @@ "Cortex XSOAR 6.0.1", "Cortex XSOAR 5.5.0" ] -} +} \ No newline at end of file From a016329d92432e51c863349a047b59b336505641 Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Thu, 11 Mar 2021 10:24:55 -0500 Subject: [PATCH 268/845] IBM20210311-102455 Added CVE-2020-5025, CVE-2020-4976, CVE-2021-20336, CVE-2020-5024 --- 2020/4xxx/CVE-2020-4976.json | 114 ++++++++++++++++++++++++++++----- 2020/5xxx/CVE-2020-5024.json | 114 ++++++++++++++++++++++++++++----- 2020/5xxx/CVE-2020-5025.json | 114 ++++++++++++++++++++++++++++----- 2021/20xxx/CVE-2021-20336.json | 102 ++++++++++++++++++++++++----- 4 files changed, 384 insertions(+), 60 deletions(-) diff --git a/2020/4xxx/CVE-2020-4976.json b/2020/4xxx/CVE-2020-4976.json index bae57c6c87a..0e8eda782d1 100644 --- a/2020/4xxx/CVE-2020-4976.json +++ b/2020/4xxx/CVE-2020-4976.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4976", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_format" : "MITRE", + "CVE_data_meta" : { + "ID" : "CVE-2020-4976", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-03-10T00:00:00", + "STATE" : "PUBLIC" + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.ibm.com/support/pages/node/6427859", + "title" : "IBM Security Bulletin 6427859 (DB2 for Linux, UNIX and Windows)", + "name" : "https://www.ibm.com/support/pages/node/6427859", + "refsource" : "CONFIRM" + }, + { + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192469", + "title" : "X-Force Vulnerability Report", + "name" : "ibm-db2-cve20204976-file-write (192469)", + "refsource" : "XF" + } + ] + }, + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "File Manipulation" + } + ] + } + ] + }, + "data_type" : "CVE", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to read and write specific files due to weak file permissions. IBM X-Force ID: 192469." + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "DB2 for Linux, UNIX and Windows", + "version" : { + "version_data" : [ + { + "version_value" : "10.5" + }, + { + "version_value" : "10.1" + }, + { + "version_value" : "9.7" + }, + { + "version_value" : "11.1" + }, + { + "version_value" : "11.5" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RC" : "C", + "RL" : "O", + "E" : "U" + }, + "BM" : { + "UI" : "N", + "AC" : "L", + "SCORE" : "5.100", + "AV" : "L", + "PR" : "N", + "C" : "L", + "A" : "N", + "I" : "L", + "S" : "U" + } + } + } +} diff --git a/2020/5xxx/CVE-2020-5024.json b/2020/5xxx/CVE-2020-5024.json index 8df6c81cb99..f0f3d2afb0d 100644 --- a/2020/5xxx/CVE-2020-5024.json +++ b/2020/5xxx/CVE-2020-5024.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-5024", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Denial of Service", + "lang" : "eng" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "refsource" : "CONFIRM", + "name" : "https://www.ibm.com/support/pages/node/6427861", + "title" : "IBM Security Bulletin 6427861 (DB2 for Linux, UNIX and Windows)", + "url" : "https://www.ibm.com/support/pages/node/6427861" + }, + { + "title" : "X-Force Vulnerability Report", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193660", + "refsource" : "XF", + "name" : "ibm-db2-cve20205024-dos (193660)" + } + ] + }, + "data_format" : "MITRE", + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2020-5024", + "DATE_PUBLIC" : "2021-03-10T00:00:00", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "product_name" : "DB2 for Linux, UNIX and Windows", + "version" : { + "version_data" : [ + { + "version_value" : "10.5" + }, + { + "version_value" : "10.1" + }, + { + "version_value" : "9.7" + }, + { + "version_value" : "11.1" + }, + { + "version_value" : "11.5" + } + ] + } + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "impact" : { + "cvssv3" : { + "BM" : { + "AC" : "L", + "PR" : "N", + "SCORE" : "7.500", + "AV" : "N", + "UI" : "N", + "I" : "N", + "S" : "U", + "C" : "N", + "A" : "H" + }, + "TM" : { + "RC" : "C", + "E" : "U", + "RL" : "O" + } + } + }, + "data_type" : "CVE", + "description" : { + "description_data" : [ + { + "value" : "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the SSL handshake response. IBM X-Force ID: 193660.", + "lang" : "eng" + } + ] + } +} diff --git a/2020/5xxx/CVE-2020-5025.json b/2020/5xxx/CVE-2020-5025.json index 2ea485bf328..85558e6f1ef 100644 --- a/2020/5xxx/CVE-2020-5025.json +++ b/2020/5xxx/CVE-2020-5025.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-5025", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6427855", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6427855", + "title" : "IBM Security Bulletin 6427855 (DB2 for Linux, UNIX and Windows)" + }, + { + "refsource" : "XF", + "name" : "ibm-db2-cve20205025-bo (193661)", + "title" : "X-Force Vulnerability Report", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193661" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Gain Privileges" + } + ] + } + ] + }, + "data_version" : "4.0", + "data_format" : "MITRE", + "CVE_data_meta" : { + "STATE" : "PUBLIC", + "DATE_PUBLIC" : "2021-03-10T00:00:00", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2020-5025" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "10.5" + }, + { + "version_value" : "10.1" + }, + { + "version_value" : "9.7" + }, + { + "version_value" : "11.1" + }, + { + "version_value" : "11.5" + } + ] + }, + "product_name" : "DB2 for Linux, UNIX and Windows" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "impact" : { + "cvssv3" : { + "BM" : { + "SCORE" : "8.400", + "PR" : "N", + "AV" : "L", + "AC" : "L", + "UI" : "N", + "S" : "U", + "I" : "H", + "A" : "H", + "C" : "H" + }, + "TM" : { + "RC" : "C", + "RL" : "O", + "E" : "U" + } + } + }, + "data_type" : "CVE", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661." + } + ] + } +} diff --git a/2021/20xxx/CVE-2021-20336.json b/2021/20xxx/CVE-2021-20336.json index 07e3b46f518..1bd8dd80a3a 100644 --- a/2021/20xxx/CVE-2021-20336.json +++ b/2021/20xxx/CVE-2021-20336.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20336", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "impact" : { + "cvssv3" : { + "BM" : { + "AC" : "L", + "PR" : "L", + "SCORE" : "6.400", + "AV" : "N", + "UI" : "N", + "I" : "L", + "S" : "C", + "C" : "L", + "A" : "N" + }, + "TM" : { + "E" : "H", + "RL" : "O", + "RC" : "C" + } + } + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "product_name" : "Tivoli Netcool/OMNIbus_GUI", + "version" : { + "version_data" : [ + { + "version_value" : "8.1.0" + } + ] + } + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "value" : "IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", + "lang" : "eng" + } + ] + }, + "data_type" : "CVE", + "data_version" : "4.0", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-Site Scripting" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6427953", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/pages/node/6427953", + "title" : "IBM Security Bulletin 6427953 (Tivoli Netcool/OMNIbus_GUI)" + }, + { + "name" : "ibm-tivoli-cve202120336-xss (194350)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194350", + "title" : "X-Force Vulnerability Report" + } + ] + }, + "CVE_data_meta" : { + "ID" : "CVE-2021-20336", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-03-10T00:00:00", + "STATE" : "PUBLIC" + }, + "data_format" : "MITRE" +} From 753dffcd35eb17f7cb79ac1670708cf2647b2edb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 16:00:43 +0000 Subject: [PATCH 269/845] "-Synchronized-Data." --- 2020/4xxx/CVE-2020-4976.json | 198 +++---- 2020/5xxx/CVE-2020-5024.json | 198 +++---- 2020/5xxx/CVE-2020-5025.json | 198 +++---- 2021/1xxx/CVE-2021-1640.json | 532 ++++++++++--------- 2021/1xxx/CVE-2021-1729.json | 406 +++++++------- 2021/24xxx/CVE-2021-24089.json | 112 ++-- 2021/24xxx/CVE-2021-24090.json | 332 ++++++------ 2021/24xxx/CVE-2021-24095.json | 406 +++++++------- 2021/24xxx/CVE-2021-24104.json | 152 +++--- 2021/24xxx/CVE-2021-24107.json | 532 ++++++++++--------- 2021/24xxx/CVE-2021-24108.json | 198 +++---- 2021/24xxx/CVE-2021-24110.json | 112 ++-- 2021/26xxx/CVE-2021-26411.json | 944 +++++++++++++++++---------------- 2021/26xxx/CVE-2021-26412.json | 192 +++---- 2021/26xxx/CVE-2021-26854.json | 192 +++---- 2021/26xxx/CVE-2021-26855.json | 312 +++++------ 2021/26xxx/CVE-2021-26857.json | 332 ++++++------ 2021/26xxx/CVE-2021-26858.json | 312 +++++------ 2021/26xxx/CVE-2021-26859.json | 132 ++--- 2021/26xxx/CVE-2021-26860.json | 388 +++++++------- 2021/26xxx/CVE-2021-26861.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26862.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26863.json | 406 +++++++------- 2021/26xxx/CVE-2021-26864.json | 412 +++++++------- 2021/26xxx/CVE-2021-26865.json | 412 +++++++------- 2021/26xxx/CVE-2021-26866.json | 442 +++++++-------- 2021/26xxx/CVE-2021-26867.json | 212 ++++---- 2021/26xxx/CVE-2021-26868.json | 484 ++++++++--------- 2021/26xxx/CVE-2021-26869.json | 508 +++++++++--------- 2021/26xxx/CVE-2021-26870.json | 406 +++++++------- 2021/26xxx/CVE-2021-26871.json | 344 ++++++------ 2021/26xxx/CVE-2021-26872.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26873.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26874.json | 388 +++++++------- 2021/26xxx/CVE-2021-26875.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26876.json | 406 +++++++------- 2021/26xxx/CVE-2021-26877.json | 250 ++++----- 2021/26xxx/CVE-2021-26878.json | 534 +++++++++---------- 2021/26xxx/CVE-2021-26879.json | 304 +++++------ 2021/26xxx/CVE-2021-26880.json | 430 +++++++-------- 2021/26xxx/CVE-2021-26881.json | 508 +++++++++--------- 2021/26xxx/CVE-2021-26882.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26884.json | 484 ++++++++--------- 2021/26xxx/CVE-2021-26885.json | 344 ++++++------ 2021/26xxx/CVE-2021-26886.json | 484 ++++++++--------- 2021/26xxx/CVE-2021-26887.json | 534 +++++++++---------- 2021/26xxx/CVE-2021-26889.json | 406 +++++++------- 2021/26xxx/CVE-2021-26890.json | 388 +++++++------- 2021/26xxx/CVE-2021-26891.json | 412 +++++++------- 2021/26xxx/CVE-2021-26892.json | 430 +++++++-------- 2021/26xxx/CVE-2021-26893.json | 248 ++++----- 2021/26xxx/CVE-2021-26894.json | 248 ++++----- 2021/26xxx/CVE-2021-26895.json | 248 ++++----- 2021/26xxx/CVE-2021-26896.json | 248 ++++----- 2021/26xxx/CVE-2021-26897.json | 250 ++++----- 2021/26xxx/CVE-2021-26898.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26899.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26900.json | 332 ++++++------ 2021/26xxx/CVE-2021-26901.json | 532 ++++++++++--------- 2021/26xxx/CVE-2021-26902.json | 112 ++-- 2021/27xxx/CVE-2021-27047.json | 112 ++-- 2021/27xxx/CVE-2021-27048.json | 112 ++-- 2021/27xxx/CVE-2021-27049.json | 112 ++-- 2021/27xxx/CVE-2021-27050.json | 112 ++-- 2021/27xxx/CVE-2021-27051.json | 112 ++-- 2021/27xxx/CVE-2021-27052.json | 132 ++--- 2021/27xxx/CVE-2021-27053.json | 252 ++++----- 2021/27xxx/CVE-2021-27054.json | 302 +++++------ 2021/27xxx/CVE-2021-27055.json | 206 +++---- 2021/27xxx/CVE-2021-27056.json | 212 ++++---- 2021/27xxx/CVE-2021-27057.json | 300 +++++------ 2021/27xxx/CVE-2021-27058.json | 132 ++--- 2021/27xxx/CVE-2021-27059.json | 146 ++--- 2021/27xxx/CVE-2021-27060.json | 112 ++-- 2021/27xxx/CVE-2021-27061.json | 112 ++-- 2021/27xxx/CVE-2021-27062.json | 112 ++-- 2021/27xxx/CVE-2021-27063.json | 248 ++++----- 2021/27xxx/CVE-2021-27065.json | 312 +++++------ 2021/27xxx/CVE-2021-27078.json | 192 +++---- 2021/27xxx/CVE-2021-27080.json | 112 ++-- 2021/27xxx/CVE-2021-27081.json | 112 ++-- 2021/27xxx/CVE-2021-27082.json | 112 ++-- 2021/27xxx/CVE-2021-27083.json | 112 ++-- 2021/27xxx/CVE-2021-27084.json | 112 ++-- 2021/27xxx/CVE-2021-27085.json | 326 ++++++------ 85 files changed, 13481 insertions(+), 13317 deletions(-) diff --git a/2020/4xxx/CVE-2020-4976.json b/2020/4xxx/CVE-2020-4976.json index 0e8eda782d1..7ada345dc4d 100644 --- a/2020/4xxx/CVE-2020-4976.json +++ b/2020/4xxx/CVE-2020-4976.json @@ -1,102 +1,102 @@ { - "data_format" : "MITRE", - "CVE_data_meta" : { - "ID" : "CVE-2020-4976", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-03-10T00:00:00", - "STATE" : "PUBLIC" - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6427859", - "title" : "IBM Security Bulletin 6427859 (DB2 for Linux, UNIX and Windows)", - "name" : "https://www.ibm.com/support/pages/node/6427859", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192469", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-db2-cve20204976-file-write (192469)", - "refsource" : "XF" - } - ] - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "File Manipulation" - } - ] - } - ] - }, - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to read and write specific files due to weak file permissions. IBM X-Force ID: 192469." - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2020-4976", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-03-10T00:00:00", + "STATE": "PUBLIC" + }, + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "DB2 for Linux, UNIX and Windows", - "version" : { - "version_data" : [ - { - "version_value" : "10.5" - }, - { - "version_value" : "10.1" - }, - { - "version_value" : "9.7" - }, - { - "version_value" : "11.1" - }, - { - "version_value" : "11.5" - } - ] - } - } - ] - } + "url": "https://www.ibm.com/support/pages/node/6427859", + "title": "IBM Security Bulletin 6427859 (DB2 for Linux, UNIX and Windows)", + "name": "https://www.ibm.com/support/pages/node/6427859", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192469", + "title": "X-Force Vulnerability Report", + "name": "ibm-db2-cve20204976-file-write (192469)", + "refsource": "XF" } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - }, - "BM" : { - "UI" : "N", - "AC" : "L", - "SCORE" : "5.100", - "AV" : "L", - "PR" : "N", - "C" : "L", - "A" : "N", - "I" : "L", - "S" : "U" - } - } - } -} + ] + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "File Manipulation" + } + ] + } + ] + }, + "data_type": "CVE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to read and write specific files due to weak file permissions. IBM X-Force ID: 192469." + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "DB2 for Linux, UNIX and Windows", + "version": { + "version_data": [ + { + "version_value": "10.5" + }, + { + "version_value": "10.1" + }, + { + "version_value": "9.7" + }, + { + "version_value": "11.1" + }, + { + "version_value": "11.5" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "RL": "O", + "E": "U" + }, + "BM": { + "UI": "N", + "AC": "L", + "SCORE": "5.100", + "AV": "L", + "PR": "N", + "C": "L", + "A": "N", + "I": "L", + "S": "U" + } + } + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5024.json b/2020/5xxx/CVE-2020-5024.json index f0f3d2afb0d..8d475220903 100644 --- a/2020/5xxx/CVE-2020-5024.json +++ b/2020/5xxx/CVE-2020-5024.json @@ -1,102 +1,102 @@ { - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Denial of Service", - "lang" : "eng" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6427861", - "title" : "IBM Security Bulletin 6427861 (DB2 for Linux, UNIX and Windows)", - "url" : "https://www.ibm.com/support/pages/node/6427861" - }, - { - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193660", - "refsource" : "XF", - "name" : "ibm-db2-cve20205024-dos (193660)" - } - ] - }, - "data_format" : "MITRE", - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-5024", - "DATE_PUBLIC" : "2021-03-10T00:00:00", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "DB2 for Linux, UNIX and Windows", - "version" : { - "version_data" : [ - { - "version_value" : "10.5" - }, - { - "version_value" : "10.1" - }, - { - "version_value" : "9.7" - }, - { - "version_value" : "11.1" - }, - { - "version_value" : "11.5" - } - ] - } - } - ] - } + "description": [ + { + "value": "Denial of Service", + "lang": "eng" + } + ] } - ] - } - }, - "impact" : { - "cvssv3" : { - "BM" : { - "AC" : "L", - "PR" : "N", - "SCORE" : "7.500", - "AV" : "N", - "UI" : "N", - "I" : "N", - "S" : "U", - "C" : "N", - "A" : "H" - }, - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - } - } - }, - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "value" : "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the SSL handshake response. IBM X-Force ID: 193660.", - "lang" : "eng" - } - ] - } -} + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6427861", + "title": "IBM Security Bulletin 6427861 (DB2 for Linux, UNIX and Windows)", + "url": "https://www.ibm.com/support/pages/node/6427861" + }, + { + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193660", + "refsource": "XF", + "name": "ibm-db2-cve20205024-dos (193660)" + } + ] + }, + "data_format": "MITRE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-5024", + "DATE_PUBLIC": "2021-03-10T00:00:00", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "DB2 for Linux, UNIX and Windows", + "version": { + "version_data": [ + { + "version_value": "10.5" + }, + { + "version_value": "10.1" + }, + { + "version_value": "9.7" + }, + { + "version_value": "11.1" + }, + { + "version_value": "11.5" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvssv3": { + "BM": { + "AC": "L", + "PR": "N", + "SCORE": "7.500", + "AV": "N", + "UI": "N", + "I": "N", + "S": "U", + "C": "N", + "A": "H" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "data_type": "CVE", + "description": { + "description_data": [ + { + "value": "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the SSL handshake response. IBM X-Force ID: 193660.", + "lang": "eng" + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5025.json b/2020/5xxx/CVE-2020-5025.json index 85558e6f1ef..b6cceaf347e 100644 --- a/2020/5xxx/CVE-2020-5025.json +++ b/2020/5xxx/CVE-2020-5025.json @@ -1,102 +1,102 @@ { - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6427855", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/6427855", - "title" : "IBM Security Bulletin 6427855 (DB2 for Linux, UNIX and Windows)" - }, - { - "refsource" : "XF", - "name" : "ibm-db2-cve20205025-bo (193661)", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193661" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Gain Privileges" - } - ] - } - ] - }, - "data_version" : "4.0", - "data_format" : "MITRE", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2021-03-10T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-5025" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "10.5" - }, - { - "version_value" : "10.1" - }, - { - "version_value" : "9.7" - }, - { - "version_value" : "11.1" - }, - { - "version_value" : "11.5" - } - ] - }, - "product_name" : "DB2 for Linux, UNIX and Windows" - } - ] - }, - "vendor_name" : "IBM" + "name": "https://www.ibm.com/support/pages/node/6427855", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/6427855", + "title": "IBM Security Bulletin 6427855 (DB2 for Linux, UNIX and Windows)" + }, + { + "refsource": "XF", + "name": "ibm-db2-cve20205025-bo (193661)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193661" } - ] - } - }, - "impact" : { - "cvssv3" : { - "BM" : { - "SCORE" : "8.400", - "PR" : "N", - "AV" : "L", - "AC" : "L", - "UI" : "N", - "S" : "U", - "I" : "H", - "A" : "H", - "C" : "H" - }, - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - } - } - }, - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661." - } - ] - } -} + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Gain Privileges" + } + ] + } + ] + }, + "data_version": "4.0", + "data_format": "MITRE", + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-03-10T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-5025" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "10.5" + }, + { + "version_value": "10.1" + }, + { + "version_value": "9.7" + }, + { + "version_value": "11.1" + }, + { + "version_value": "11.5" + } + ] + }, + "product_name": "DB2 for Linux, UNIX and Windows" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "impact": { + "cvssv3": { + "BM": { + "SCORE": "8.400", + "PR": "N", + "AV": "L", + "AC": "L", + "UI": "N", + "S": "U", + "I": "H", + "A": "H", + "C": "H" + }, + "TM": { + "RC": "C", + "RL": "O", + "E": "U" + } + } + }, + "data_type": "CVE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1640.json b/2021/1xxx/CVE-2021-1640.json index cddcd09cac3..07c8a4fbb0b 100644 --- a/2021/1xxx/CVE-2021-1640.json +++ b/2021/1xxx/CVE-2021-1640.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-1640", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1640", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1729.json b/2021/1xxx/CVE-2021-1729.json index c78dcb39f7c..b835d44dfa7 100644 --- a/2021/1xxx/CVE-2021-1729.json +++ b/2021/1xxx/CVE-2021-1729.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-1729", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-1729", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Update Stack Setup Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Update Stack Setup Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24089.json b/2021/24xxx/CVE-2021-24089.json index a20d80fbc71..86830e35f03 100644 --- a/2021/24xxx/CVE-2021-24089.json +++ b/2021/24xxx/CVE-2021-24089.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24089", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24089", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24089" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24089", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24089" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24090.json b/2021/24xxx/CVE-2021-24090.json index 89567d92a88..64ef93f4336 100644 --- a/2021/24xxx/CVE-2021-24090.json +++ b/2021/24xxx/CVE-2021-24090.json @@ -1,170 +1,172 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24090", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24090", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Error Reporting Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Error Reporting Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24095.json b/2021/24xxx/CVE-2021-24095.json index dacbdc31fb4..23f123ec7d8 100644 --- a/2021/24xxx/CVE-2021-24095.json +++ b/2021/24xxx/CVE-2021-24095.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24095", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24095", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "DirectX Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "DirectX Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24104.json b/2021/24xxx/CVE-2021-24104.json index ec337d68053..12f99438e74 100644 --- a/2021/24xxx/CVE-2021-24104.json +++ b/2021/24xxx/CVE-2021-24104.json @@ -1,80 +1,82 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24104", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft SharePoint Enterprise Server", - "version": { - "version_data": [ - { - "version_value": "2016" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24104", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Foundation", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft SharePoint Server", - "version": { - "version_data": [ - { - "version_value": "2019" - } - ] - } - }, - { - "product_name": "Microsoft SharePoint Foundation", - "version": { - "version_data": [ - { - "version_value": "2013 Service Pack 1" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft SharePoint Spoofing Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Spoofing" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Spoofing Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24104" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24104", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24104" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24107.json b/2021/24xxx/CVE-2021-24107.json index 65d08c06fd7..ad08f916e56 100644 --- a/2021/24xxx/CVE-2021-24107.json +++ b/2021/24xxx/CVE-2021-24107.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24107", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24107", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Event Tracing Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24108.json b/2021/24xxx/CVE-2021-24108.json index 1f74eb6b5ef..0b1162f58e6 100644 --- a/2021/24xxx/CVE-2021-24108.json +++ b/2021/24xxx/CVE-2021-24108.json @@ -1,104 +1,106 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24108", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2019 for 32-bit editions" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24108", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2019 for 64-bit editions" - }, - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27057, CVE-2021-27059." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27057, CVE-2021-27059." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24108" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24108", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24108" + } + ] + } +} \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24110.json b/2021/24xxx/CVE-2021-24110.json index 4ae71b54cfd..f2c47c846e1 100644 --- a/2021/24xxx/CVE-2021-24110.json +++ b/2021/24xxx/CVE-2021-24110.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-24110", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-24110", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24110" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24110", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24110" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26411.json b/2021/26xxx/CVE-2021-26411.json index 5c0fae1ddd1..edd5a709ecc 100644 --- a/2021/26xxx/CVE-2021-26411.json +++ b/2021/26xxx/CVE-2021-26411.json @@ -1,477 +1,479 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26411", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Internet Explorer 9", - "version": { - "version_data": [ - { - "version_value": "Windows Server 2008 for 32-bit Systems Service Pack 2" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26411", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Internet Explorer 9", + "version": { + "version_data": [ + { + "version_value": "Windows Server 2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "Windows Server 2008 for x64-based Systems Service Pack 2" + } + ] + } + }, + { + "product_name": "Internet Explorer 11", + "version": { + "version_data": [ + { + "version_value": "Windows 10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1803 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1809 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "Windows Server 2019" + }, + { + "version_value": "Windows 10 for 32-bit Systems" + }, + { + "version_value": "Windows 10 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1607 for x64-based Systems" + }, + { + "version_value": "Windows 7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "Windows 7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "Windows 8.1 for 32-bit systems" + }, + { + "version_value": "Windows 8.1 for x64-based systems" + }, + { + "version_value": "Windows RT 8.1" + }, + { + "version_value": "Windows Server 2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "Windows Server 2012 R2" + }, + { + "version_value": "Windows Server 2016" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows Server 2012", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows Server 2019", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Edge (EdgeHTML-based) on Windows Server 2016", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "Windows Server 2008 for x64-based Systems Service Pack 2" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Internet Explorer 11", - "version": { - "version_data": [ - { - "version_value": "Windows 10 Version 1803 for 32-bit Systems" - }, - { - "version_value": "Windows 10 Version 1803 for x64-based Systems" - }, - { - "version_value": "Windows 10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "Windows 10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "Windows 10 Version 1809 for x64-based Systems" - }, - { - "version_value": "Windows 10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "Windows Server 2019" - }, - { - "version_value": "Windows 10 for 32-bit Systems" - }, - { - "version_value": "Windows 10 for x64-based Systems" - }, - { - "version_value": "Windows 10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "Windows 10 Version 1607 for x64-based Systems" - }, - { - "version_value": "Windows 7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "Windows 7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "Windows 8.1 for 32-bit systems" - }, - { - "version_value": "Windows 8.1 for x64-based systems" - }, - { - "version_value": "Windows RT 8.1" - }, - { - "version_value": "Windows Server 2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "Windows Server 2012 R2" - }, - { - "version_value": "Windows Server 2016" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows Server 2012", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows Server 2019", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Edge (EdgeHTML-based) on Windows Server 2016", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Internet Explorer Memory Corruption Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Internet Explorer Memory Corruption Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26411" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26411", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26411" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26412.json b/2021/26xxx/CVE-2021-26412.json index 4f95353c453..cac5e81202e 100644 --- a/2021/26xxx/CVE-2021-26412.json +++ b/2021/26xxx/CVE-2021-26412.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26412", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26412", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26412" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26854.json b/2021/26xxx/CVE-2021-26854.json index 801847427b6..4abaa3b27cf 100644 --- a/2021/26xxx/CVE-2021-26854.json +++ b/2021/26xxx/CVE-2021-26854.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26854", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26854", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26854" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26855.json b/2021/26xxx/CVE-2021-26855.json index 44b9890488b..24ceccc7fef 100644 --- a/2021/26xxx/CVE-2021-26855.json +++ b/2021/26xxx/CVE-2021-26855.json @@ -1,160 +1,162 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26855", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26855", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26857.json b/2021/26xxx/CVE-2021-26857.json index 82c91e109a8..c337215040c 100644 --- a/2021/26xxx/CVE-2021-26857.json +++ b/2021/26xxx/CVE-2021-26857.json @@ -1,170 +1,172 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26857", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26857", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server", + "version": { + "version_data": [ + { + "version_value": "2010 Service Pack 3" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server", - "version": { - "version_data": [ - { - "version_value": "2010 Service Pack 3" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26857" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26858.json b/2021/26xxx/CVE-2021-26858.json index e2b54fa56af..b104e71cb73 100644 --- a/2021/26xxx/CVE-2021-26858.json +++ b/2021/26xxx/CVE-2021-26858.json @@ -1,160 +1,162 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26858", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26858", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26859.json b/2021/26xxx/CVE-2021-26859.json index 70ae8c3f0e7..22bd4092cf4 100644 --- a/2021/26xxx/CVE-2021-26859.json +++ b/2021/26xxx/CVE-2021-26859.json @@ -1,70 +1,72 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26859", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Power BI Report Server version 15.0.1103.234", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26859", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Power BI Report Server version 15.0.1103.234", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Power BI Report Server version 15.0.1104.300", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Power BI Report Server version 15.0.1104.300", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Power BI Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Power BI Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26859" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26859", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26859" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26860.json b/2021/26xxx/CVE-2021-26860.json index e73adbcd239..13f7cf5e581 100644 --- a/2021/26xxx/CVE-2021-26860.json +++ b/2021/26xxx/CVE-2021-26860.json @@ -1,199 +1,201 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26860", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1809 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26860", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows App-V Overlay Filter Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows App-V Overlay Filter Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26861.json b/2021/26xxx/CVE-2021-26861.json index ae17affef9e..42f3669f0d9 100644 --- a/2021/26xxx/CVE-2021-26861.json +++ b/2021/26xxx/CVE-2021-26861.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26861", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26861", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Graphics Component Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Graphics Component Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26862.json b/2021/26xxx/CVE-2021-26862.json index e7533148ed5..0f047c532f7 100644 --- a/2021/26xxx/CVE-2021-26862.json +++ b/2021/26xxx/CVE-2021-26862.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26862", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26862", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Installer Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Installer Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26863.json b/2021/26xxx/CVE-2021-26863.json index 605d462ca73..4913cfc39e0 100644 --- a/2021/26xxx/CVE-2021-26863.json +++ b/2021/26xxx/CVE-2021-26863.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26863", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26863", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26875, CVE-2021-26900, CVE-2021-27077." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26875, CVE-2021-26900, CVE-2021-27077." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26864.json b/2021/26xxx/CVE-2021-26864.json index b2b7eb67f59..0e82ba060d9 100644 --- a/2021/26xxx/CVE-2021-26864.json +++ b/2021/26xxx/CVE-2021-26864.json @@ -1,211 +1,213 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26864", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1809 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26864", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Virtual Registry Provider Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Virtual Registry Provider Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26865.json b/2021/26xxx/CVE-2021-26865.json index 3c3f522b2b8..fd0705f0c3f 100644 --- a/2021/26xxx/CVE-2021-26865.json +++ b/2021/26xxx/CVE-2021-26865.json @@ -1,211 +1,213 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26865", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1809 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26865", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26891." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26891." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26865" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26865", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26865" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26866.json b/2021/26xxx/CVE-2021-26866.json index 06e2182b61d..51872a21a40 100644 --- a/2021/26xxx/CVE-2021-26866.json +++ b/2021/26xxx/CVE-2021-26866.json @@ -1,226 +1,228 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26866", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26866", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Update Service Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Update Service Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26867.json b/2021/26xxx/CVE-2021-26867.json index 6480ac76242..98438781d87 100644 --- a/2021/26xxx/CVE-2021-26867.json +++ b/2021/26xxx/CVE-2021-26867.json @@ -1,110 +1,112 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26867", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26867", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Hyper-V Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Hyper-V Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26868.json b/2021/26xxx/CVE-2021-26868.json index a60a25acf65..dba925708d0 100644 --- a/2021/26xxx/CVE-2021-26868.json +++ b/2021/26xxx/CVE-2021-26868.json @@ -1,247 +1,249 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26868", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26868", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Graphics Component Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Graphics Component Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26868" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26868", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26868" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26869.json b/2021/26xxx/CVE-2021-26869.json index 0c1f4928551..a0b6d951159 100644 --- a/2021/26xxx/CVE-2021-26869.json +++ b/2021/26xxx/CVE-2021-26869.json @@ -1,259 +1,261 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26869", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26869", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows ActiveX Installer Service Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows ActiveX Installer Service Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26869" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26869", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26869" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26870.json b/2021/26xxx/CVE-2021-26870.json index 4292b84896b..1f47cbf3183 100644 --- a/2021/26xxx/CVE-2021-26870.json +++ b/2021/26xxx/CVE-2021-26870.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26870", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26870", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Projected File System Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Projected File System Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26870" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26870", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26870" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26871.json b/2021/26xxx/CVE-2021-26871.json index fb76ee7d391..d37f1b3d5ed 100644 --- a/2021/26xxx/CVE-2021-26871.json +++ b/2021/26xxx/CVE-2021-26871.json @@ -1,177 +1,179 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26871", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26871", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26885." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26885." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26871" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26871", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26871" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26872.json b/2021/26xxx/CVE-2021-26872.json index ac2e9d4985c..c6ea459e7e2 100644 --- a/2021/26xxx/CVE-2021-26872.json +++ b/2021/26xxx/CVE-2021-26872.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26872", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26872", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26898, CVE-2021-26901." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26898, CVE-2021-26901." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26872" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26872", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26872" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26873.json b/2021/26xxx/CVE-2021-26873.json index b05351d60c0..67a71ef00fa 100644 --- a/2021/26xxx/CVE-2021-26873.json +++ b/2021/26xxx/CVE-2021-26873.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26873", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26873", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows User Profile Service Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows User Profile Service Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26874.json b/2021/26xxx/CVE-2021-26874.json index 5513d77f177..38f4230664b 100644 --- a/2021/26xxx/CVE-2021-26874.json +++ b/2021/26xxx/CVE-2021-26874.json @@ -1,199 +1,201 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26874", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1809 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26874", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Overlay Filter Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Overlay Filter Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26874" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26874", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26874" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26875.json b/2021/26xxx/CVE-2021-26875.json index 000e75b085e..d7a6607feac 100644 --- a/2021/26xxx/CVE-2021-26875.json +++ b/2021/26xxx/CVE-2021-26875.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26875", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26875", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26900, CVE-2021-27077." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26900, CVE-2021-27077." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26875" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26875", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26875" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26876.json b/2021/26xxx/CVE-2021-26876.json index 72e62f80a4b..9864820e860 100644 --- a/2021/26xxx/CVE-2021-26876.json +++ b/2021/26xxx/CVE-2021-26876.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26876", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26876", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "OpenType Font Parsing Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "OpenType Font Parsing Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26876" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26876", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26876" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26877.json b/2021/26xxx/CVE-2021-26877.json index 26f40175dd4..6b4ef62dbe0 100644 --- a/2021/26xxx/CVE-2021-26877.json +++ b/2021/26xxx/CVE-2021-26877.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26877", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26877", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26893, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26893, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26877" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26877", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26877" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26878.json b/2021/26xxx/CVE-2021-26878.json index 7738ffbefdc..21be33aad82 100644 --- a/2021/26xxx/CVE-2021-26878.json +++ b/2021/26xxx/CVE-2021-26878.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26878", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26878", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" - }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] - } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26878" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26878", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26878" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26879.json b/2021/26xxx/CVE-2021-26879.json index a5c1b5d511d..e0d8a05fb7e 100644 --- a/2021/26xxx/CVE-2021-26879.json +++ b/2021/26xxx/CVE-2021-26879.json @@ -1,157 +1,159 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26879", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for x64-based Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26879", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for x64-based systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "8.1 for x64-based systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows NAT Denial of Service Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial of Service" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows NAT Denial of Service Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26879" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26879", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26879" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26880.json b/2021/26xxx/CVE-2021-26880.json index 4c2f98ec2d9..d786cf1d9f6 100644 --- a/2021/26xxx/CVE-2021-26880.json +++ b/2021/26xxx/CVE-2021-26880.json @@ -1,220 +1,222 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26880", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26880", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Storage Spaces Controller Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Storage Spaces Controller Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26880" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26880", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26880" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26881.json b/2021/26xxx/CVE-2021-26881.json index e92670e75a5..25fe76692bd 100644 --- a/2021/26xxx/CVE-2021-26881.json +++ b/2021/26xxx/CVE-2021-26881.json @@ -1,259 +1,261 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26881", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26881", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Windows Media Foundation Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Windows Media Foundation Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26881" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26881", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26881" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26882.json b/2021/26xxx/CVE-2021-26882.json index b67c44a9087..0109b0181bd 100644 --- a/2021/26xxx/CVE-2021-26882.json +++ b/2021/26xxx/CVE-2021-26882.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26882", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26882", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Remote Access API Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Remote Access API Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26882" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26882", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26882" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26884.json b/2021/26xxx/CVE-2021-26884.json index 4173f529d32..35764d2d72d 100644 --- a/2021/26xxx/CVE-2021-26884.json +++ b/2021/26xxx/CVE-2021-26884.json @@ -1,247 +1,249 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26884", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26884", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Media Photo Codec Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Media Photo Codec Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26884" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26884", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26884" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26885.json b/2021/26xxx/CVE-2021-26885.json index c5cff4b21e7..dbb690818a8 100644 --- a/2021/26xxx/CVE-2021-26885.json +++ b/2021/26xxx/CVE-2021-26885.json @@ -1,177 +1,179 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26885", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26885", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26871." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26871." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26885" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26885", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26885" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26886.json b/2021/26xxx/CVE-2021-26886.json index d8e1c4efdde..1badac3d695 100644 --- a/2021/26xxx/CVE-2021-26886.json +++ b/2021/26xxx/CVE-2021-26886.json @@ -1,247 +1,249 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26886", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26886", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "User Profile Service Denial of Service Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial of Service" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "User Profile Service Denial of Service Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26887.json b/2021/26xxx/CVE-2021-26887.json index 820e3fbd76d..0a0f9ed411c 100644 --- a/2021/26xxx/CVE-2021-26887.json +++ b/2021/26xxx/CVE-2021-26887.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26887", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26887", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" - }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] - } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26887" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26887", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26887" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26889.json b/2021/26xxx/CVE-2021-26889.json index b00cbd58fff..68f87187f45 100644 --- a/2021/26xxx/CVE-2021-26889.json +++ b/2021/26xxx/CVE-2021-26889.json @@ -1,208 +1,210 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26889", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26889", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Update Stack Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Update Stack Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26890.json b/2021/26xxx/CVE-2021-26890.json index 4556d9322da..028c6a8ae39 100644 --- a/2021/26xxx/CVE-2021-26890.json +++ b/2021/26xxx/CVE-2021-26890.json @@ -1,199 +1,201 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26890", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1809 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26890", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Application Virtualization Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Application Virtualization Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26890" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26890", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26890" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26891.json b/2021/26xxx/CVE-2021-26891.json index 6ba6e81ed9d..a87815c6185 100644 --- a/2021/26xxx/CVE-2021-26891.json +++ b/2021/26xxx/CVE-2021-26891.json @@ -1,211 +1,213 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26891", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1809 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26891", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26865." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26865." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26892.json b/2021/26xxx/CVE-2021-26892.json index 6118e03dc7a..166328f1a0f 100644 --- a/2021/26xxx/CVE-2021-26892.json +++ b/2021/26xxx/CVE-2021-26892.json @@ -1,220 +1,222 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26892", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26892", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Security Feature Bypass" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26893.json b/2021/26xxx/CVE-2021-26893.json index 66b769ecea1..132ff099811 100644 --- a/2021/26xxx/CVE-2021-26893.json +++ b/2021/26xxx/CVE-2021-26893.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26893", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26893", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26893" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26893", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26893" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26894.json b/2021/26xxx/CVE-2021-26894.json index c2476bc81e1..5e4af6c89d4 100644 --- a/2021/26xxx/CVE-2021-26894.json +++ b/2021/26xxx/CVE-2021-26894.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26894", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26894", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26895, CVE-2021-26897." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26895, CVE-2021-26897." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26894" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26894", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26894" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26895.json b/2021/26xxx/CVE-2021-26895.json index 9fd488ca99f..4163c9f5076 100644 --- a/2021/26xxx/CVE-2021-26895.json +++ b/2021/26xxx/CVE-2021-26895.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26895", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26895", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26897." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26897." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26895" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26895", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26895" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26896.json b/2021/26xxx/CVE-2021-26896.json index 7a02baf94ea..cc1d41d9d3c 100644 --- a/2021/26xxx/CVE-2021-26896.json +++ b/2021/26xxx/CVE-2021-26896.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26896", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26896", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-27063." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial of Service" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-27063." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26896" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26896", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26896" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26897.json b/2021/26xxx/CVE-2021-26897.json index 9b9f5a68855..4891e2b244f 100644 --- a/2021/26xxx/CVE-2021-26897.json +++ b/2021/26xxx/CVE-2021-26897.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26897", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26897", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26895." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26895." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26897" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26897", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26897" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26898.json b/2021/26xxx/CVE-2021-26898.json index 0c78d7fb57e..051bd9be6e2 100644 --- a/2021/26xxx/CVE-2021-26898.json +++ b/2021/26xxx/CVE-2021-26898.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26898", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26898", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26898" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26898", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26898" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26899.json b/2021/26xxx/CVE-2021-26899.json index 60115fa85e8..4dde09249c9 100644 --- a/2021/26xxx/CVE-2021-26899.json +++ b/2021/26xxx/CVE-2021-26899.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26899", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26899", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows UPnP Device Host Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows UPnP Device Host Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26899" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26899", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26899" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26900.json b/2021/26xxx/CVE-2021-26900.json index 79a8e4d8504..45752091b9d 100644 --- a/2021/26xxx/CVE-2021-26900.json +++ b/2021/26xxx/CVE-2021-26900.json @@ -1,170 +1,172 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26900", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26900", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-27077." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-27077." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26901.json b/2021/26xxx/CVE-2021-26901.json index 85a31cdb116..6d826567fc6 100644 --- a/2021/26xxx/CVE-2021-26901.json +++ b/2021/26xxx/CVE-2021-26901.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26901", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26901", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26902.json b/2021/26xxx/CVE-2021-26902.json index ead7799e96d..67604eec1f1 100644 --- a/2021/26xxx/CVE-2021-26902.json +++ b/2021/26xxx/CVE-2021-26902.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-26902", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-26902", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26902" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26902", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26902" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27047.json b/2021/27xxx/CVE-2021-27047.json index 4b60cff3a37..6d6a4e4f5b0 100644 --- a/2021/27xxx/CVE-2021-27047.json +++ b/2021/27xxx/CVE-2021-27047.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27047", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27047", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27047" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27047", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27047" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27048.json b/2021/27xxx/CVE-2021-27048.json index d5015158fc3..f0e28bb68fe 100644 --- a/2021/27xxx/CVE-2021-27048.json +++ b/2021/27xxx/CVE-2021-27048.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27048", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27048", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27048" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27048", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27048" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27049.json b/2021/27xxx/CVE-2021-27049.json index 9e5658e3219..0f34c51cad2 100644 --- a/2021/27xxx/CVE-2021-27049.json +++ b/2021/27xxx/CVE-2021-27049.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27049", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27049", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27049" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27049", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27049" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27050.json b/2021/27xxx/CVE-2021-27050.json index e9c51c3e4f8..4b5583881fe 100644 --- a/2021/27xxx/CVE-2021-27050.json +++ b/2021/27xxx/CVE-2021-27050.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27050", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27050", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27050" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27050", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27050" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27051.json b/2021/27xxx/CVE-2021-27051.json index e424ed1a068..963f9cc3bf0 100644 --- a/2021/27xxx/CVE-2021-27051.json +++ b/2021/27xxx/CVE-2021-27051.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27051", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27051", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27061, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27061, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27051" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27051", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27051" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27052.json b/2021/27xxx/CVE-2021-27052.json index 9e3a29f2ac2..3bafee4e627 100644 --- a/2021/27xxx/CVE-2021-27052.json +++ b/2021/27xxx/CVE-2021-27052.json @@ -1,70 +1,72 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27052", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft SharePoint Enterprise Server", - "version": { - "version_data": [ - { - "version_value": "2016" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27052", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft SharePoint Server", - "version": { - "version_data": [ - { - "version_value": "2019" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft SharePoint Server Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Server Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27052" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27052", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27052" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27053.json b/2021/27xxx/CVE-2021-27053.json index ef2d4898d9c..42dd29055d7 100644 --- a/2021/27xxx/CVE-2021-27053.json +++ b/2021/27xxx/CVE-2021-27053.json @@ -1,131 +1,133 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27053", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2019 for 32-bit editions" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27053", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + } + ] + } + }, + { + "product_name": "Microsoft Office Online Server", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Excel", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Web Apps", + "version": { + "version_data": [ + { + "version_value": "Server 2013 Service Pack 1" + } + ] + } + } + ] }, - { - "version_value": "2019 for 64-bit editions" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Office Online Server", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Excel", - "version": { - "version_data": [ - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] - } - }, - { - "product_name": "Microsoft Office Web Apps", - "version": { - "version_data": [ - { - "version_value": "Server 2013 Service Pack 1" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27054." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27054." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27054.json b/2021/27xxx/CVE-2021-27054.json index 32a0a58ae39..599118d0fd0 100644 --- a/2021/27xxx/CVE-2021-27054.json +++ b/2021/27xxx/CVE-2021-27054.json @@ -1,155 +1,157 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27054", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Office Web Apps", - "version": { - "version_data": [ - { - "version_value": "Server 2013 Service Pack 1" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27054", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office Web Apps", + "version": { + "version_data": [ + { + "version_value": "Server 2013 Service Pack 1" + } + ] + } + }, + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + }, + { + "version_value": "2019 for Mac" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Online Server", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Excel", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2019 for 32-bit editions" - }, - { - "version_value": "2019 for 64-bit editions" - }, - { - "version_value": "2019 for Mac" - }, - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] - } - }, - { - "product_name": "Microsoft Office Online Server", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Excel", - "version": { - "version_data": [ - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27053." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27053." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27055.json b/2021/27xxx/CVE-2021-27055.json index a1346fc76db..6efc4857d00 100644 --- a/2021/27xxx/CVE-2021-27055.json +++ b/2021/27xxx/CVE-2021-27055.json @@ -1,108 +1,110 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27055", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Visio", - "version": { - "version_data": [ - { - "version_value": "2013 Service Pack 1 (32-bit editions)" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27055", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Visio", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - }, - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2019 for 32-bit editions" - }, - { - "version_value": "2019 for 64-bit editions" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Visio Security Feature Bypass Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Security Feature Bypass" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Visio Security Feature Bypass Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27055" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27055", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27055" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27056.json b/2021/27xxx/CVE-2021-27056.json index 36b1ee246ef..a3b1cda08ee 100644 --- a/2021/27xxx/CVE-2021-27056.json +++ b/2021/27xxx/CVE-2021-27056.json @@ -1,111 +1,113 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27056", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2019 for 32-bit editions" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27056", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft PowerPoint", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + } + ] + } + } + ] }, - { - "version_value": "2019 for 64-bit editions" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft PowerPoint", - "version": { - "version_data": [ - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft PowerPoint Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft PowerPoint Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27056" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27056", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27056" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27057.json b/2021/27xxx/CVE-2021-27057.json index 7635df20c54..d018fd1f9df 100644 --- a/2021/27xxx/CVE-2021-27057.json +++ b/2021/27xxx/CVE-2021-27057.json @@ -1,155 +1,157 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27057", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2019 for 32-bit editions" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27057", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2019 for 32-bit editions" + }, + { + "version_value": "2019 for 64-bit editions" + }, + { + "version_value": "2019 for Mac" + }, + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Online Server", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Excel", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + }, + { + "product_name": "Microsoft Office Web Apps", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + } + ] }, - { - "version_value": "2019 for 64-bit editions" - }, - { - "version_value": "2019 for Mac" - }, - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Office Online Server", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Excel", - "version": { - "version_data": [ - { - "version_value": "2016 (32-bit edition)" - }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] - } - }, - { - "product_name": "Microsoft Office Web Apps", - "version": { - "version_data": [ - { - "version_value": "2013 Service Pack 1" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27057" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27057", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27057" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27058.json b/2021/27xxx/CVE-2021-27058.json index 22e038a0b89..cab2ce37d01 100644 --- a/2021/27xxx/CVE-2021-27058.json +++ b/2021/27xxx/CVE-2021-27058.json @@ -1,70 +1,72 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27058", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27058", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Office ClickToRun Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office ClickToRun Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27058" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27058", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27058" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27059.json b/2021/27xxx/CVE-2021-27059.json index ff4d9c95e2c..c2418cf192b 100644 --- a/2021/27xxx/CVE-2021-27059.json +++ b/2021/27xxx/CVE-2021-27059.json @@ -1,78 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27059", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Office", - "version": { - "version_data": [ - { - "version_value": "2016 (32-bit edition)" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27059", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Office", + "version": { + "version_data": [ + { + "version_value": "2016 (32-bit edition)" + }, + { + "version_value": "2016 (64-bit edition)" + }, + { + "version_value": "2010 Service Pack 2 (32-bit editions)" + }, + { + "version_value": "2010 Service Pack 2 (64-bit editions)" + }, + { + "version_value": "2013 RT Service Pack 1" + }, + { + "version_value": "2013 Service Pack 1 (32-bit editions)" + }, + { + "version_value": "2013 Service Pack 1 (64-bit editions)" + } + ] + } + } + ] }, - { - "version_value": "2016 (64-bit edition)" - }, - { - "version_value": "2010 Service Pack 2 (32-bit editions)" - }, - { - "version_value": "2010 Service Pack 2 (64-bit editions)" - }, - { - "version_value": "2013 RT Service Pack 1" - }, - { - "version_value": "2013 Service Pack 1 (32-bit editions)" - }, - { - "version_value": "2013 Service Pack 1 (64-bit editions)" - } - ] + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27057." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27057." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27059" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27059", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27059" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27060.json b/2021/27xxx/CVE-2021-27060.json index 48157b5b569..f104ba1ec52 100644 --- a/2021/27xxx/CVE-2021-27060.json +++ b/2021/27xxx/CVE-2021-27060.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27060", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Visual Studio Code", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27060", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Visual Studio Code", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Visual Studio Code Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Visual Studio Code Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27060" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27060", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27060" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27061.json b/2021/27xxx/CVE-2021-27061.json index e53083a67f9..a657cd74097 100644 --- a/2021/27xxx/CVE-2021-27061.json +++ b/2021/27xxx/CVE-2021-27061.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27061", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27061", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27062." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27062." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27061" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27061", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27061" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27062.json b/2021/27xxx/CVE-2021-27062.json index 2919a79cbb3..b4c3682dc40 100644 --- a/2021/27xxx/CVE-2021-27062.json +++ b/2021/27xxx/CVE-2021-27062.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27062", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HEVC Video Extensions", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27062", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HEVC Video Extensions", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27062" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27062", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27062" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27063.json b/2021/27xxx/CVE-2021-27063.json index 1a15f0048da..4984767980d 100644 --- a/2021/27xxx/CVE-2021-27063.json +++ b/2021/27xxx/CVE-2021-27063.json @@ -1,129 +1,131 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27063", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27063", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-26896." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial of Service" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-26896." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27063" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27063", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27063" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27065.json b/2021/27xxx/CVE-2021-27065.json index 0e48fc48a9d..ed0a49be7a8 100644 --- a/2021/27xxx/CVE-2021-27065.json +++ b/2021/27xxx/CVE-2021-27065.json @@ -1,160 +1,162 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27065", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27065", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 14", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 4", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 15", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 5", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 6", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 16", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27078.json b/2021/27xxx/CVE-2021-27078.json index d20a2f9c2d1..0ef388118d5 100644 --- a/2021/27xxx/CVE-2021-27078.json +++ b/2021/27xxx/CVE-2021-27078.json @@ -1,100 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27078", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27078", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 19", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2013", + "version": { + "version_data": [ + { + "version_value": "Cumulative Update 23" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 8", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2013", - "version": { - "version_data": [ - { - "version_value": "Cumulative Update 23" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2019 Cumulative Update 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Microsoft Exchange Server 2016 Cumulative Update 18", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27078" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27080.json b/2021/27xxx/CVE-2021-27080.json index 6d47c6a8515..9a4dc2d4bb2 100644 --- a/2021/27xxx/CVE-2021-27080.json +++ b/2021/27xxx/CVE-2021-27080.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27080", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Sphere", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27080", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Azure Sphere", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27074." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27074." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27080" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27080", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27080" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27081.json b/2021/27xxx/CVE-2021-27081.json index 5d36570605c..f09bfa9fea5 100644 --- a/2021/27xxx/CVE-2021-27081.json +++ b/2021/27xxx/CVE-2021-27081.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27081", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Visual Studio Code ESLint extension", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27081", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Visual Studio Code ESLint extension", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Visual Studio Code ESLint Extension Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Visual Studio Code ESLint Extension Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27081" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27081", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27081" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27082.json b/2021/27xxx/CVE-2021-27082.json index 67a40fe0ffb..0d656de2631 100644 --- a/2021/27xxx/CVE-2021-27082.json +++ b/2021/27xxx/CVE-2021-27082.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27082", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Quantum Development Kit for Visual Studio Code", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27082", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft Quantum Development Kit for Visual Studio Code", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Quantum Development Kit for Visual Studio Code Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Quantum Development Kit for Visual Studio Code Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27082" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27082", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27082" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27083.json b/2021/27xxx/CVE-2021-27083.json index e1c7b5db172..861993109fc 100644 --- a/2021/27xxx/CVE-2021-27083.json +++ b/2021/27xxx/CVE-2021-27083.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27083", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Visual Studio Code Remote - Containers Extension", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27083", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Visual Studio Code Remote - Containers Extension", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27083" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27083", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27083" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27084.json b/2021/27xxx/CVE-2021-27084.json index 8e647a18d3a..101ddce6f37 100644 --- a/2021/27xxx/CVE-2021-27084.json +++ b/2021/27xxx/CVE-2021-27084.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27084", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Visual Studio Code - Java Extension Pack", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27084", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Visual Studio Code - Java Extension Pack", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27084" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27084", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27084" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27085.json b/2021/27xxx/CVE-2021-27085.json index 2692a73c326..a37c344d2ca 100644 --- a/2021/27xxx/CVE-2021-27085.json +++ b/2021/27xxx/CVE-2021-27085.json @@ -1,168 +1,170 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27085", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Internet Explorer 11", - "version": { - "version_data": [ - { - "version_value": "Windows 10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27085", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Internet Explorer 11", + "version": { + "version_data": [ + { + "version_value": "Windows 10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1803 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "Windows 10 Version 1809 for x64-based Systems" + }, + { + "version_value": "Windows 10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "Windows Server 2019" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "Windows 10 Version 1803 for x64-based Systems" - }, - { - "version_value": "Windows 10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "Windows 10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "Windows 10 Version 1809 for x64-based Systems" - }, - { - "version_value": "Windows 10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "Windows Server 2019" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Internet Explorer 11 on Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Internet Explorer Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Internet Explorer Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27085" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27085", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27085" + } + ] + } +} \ No newline at end of file From c8a04e31ed5b638234d79450265e13815c169215 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 16:00:58 +0000 Subject: [PATCH 270/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27066.json | 112 +++---- 2021/27xxx/CVE-2021-27070.json | 252 ++++++++-------- 2021/27xxx/CVE-2021-27074.json | 112 +++---- 2021/27xxx/CVE-2021-27075.json | 172 +++++------ 2021/27xxx/CVE-2021-27076.json | 172 +++++------ 2021/27xxx/CVE-2021-27077.json | 532 +++++++++++++++++---------------- 6 files changed, 682 insertions(+), 670 deletions(-) diff --git a/2021/27xxx/CVE-2021-27066.json b/2021/27xxx/CVE-2021-27066.json index e689f50f103..13cec2744b2 100644 --- a/2021/27xxx/CVE-2021-27066.json +++ b/2021/27xxx/CVE-2021-27066.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27066", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows Admin Center", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27066", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows Admin Center", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Admin Center Security Feature Bypass Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Security Feature Bypass" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Admin Center Security Feature Bypass Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27066" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security Feature Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27066", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27066" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27070.json b/2021/27xxx/CVE-2021-27070.json index 52cbbd02dbb..a45a8ae12c0 100644 --- a/2021/27xxx/CVE-2021-27070.json +++ b/2021/27xxx/CVE-2021-27070.json @@ -1,130 +1,132 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27070", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27070", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27074.json b/2021/27xxx/CVE-2021-27074.json index 41ca9537070..a25908d1552 100644 --- a/2021/27xxx/CVE-2021-27074.json +++ b/2021/27xxx/CVE-2021-27074.json @@ -1,60 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27074", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Sphere", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27074", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Azure Sphere", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27080." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27080." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27074" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27074", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27074" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27075.json b/2021/27xxx/CVE-2021-27075.json index 8af11c2816b..12fab0fdd7c 100644 --- a/2021/27xxx/CVE-2021-27075.json +++ b/2021/27xxx/CVE-2021-27075.json @@ -1,90 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27075", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Service Fabric", - "version": { - "version_data": [ - { - "version_value": "" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27075", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Azure Service Fabric", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Azure Spring Cloud", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Azure Container Instance", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Azure Kubernetes Service", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Azure Spring Cloud", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Azure Container Instance", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Azure Kubernetes Service", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Azure Virtual Machine Information Disclosure Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Disclosure" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Azure Virtual Machine Information Disclosure Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27075" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27075", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27075" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27076.json b/2021/27xxx/CVE-2021-27076.json index e3ae24cb432..c91f5cf88b4 100644 --- a/2021/27xxx/CVE-2021-27076.json +++ b/2021/27xxx/CVE-2021-27076.json @@ -1,90 +1,92 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27076", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft SharePoint Enterprise Server", - "version": { - "version_data": [ - { - "version_value": "2016" - } - ] + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27076", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Microsoft SharePoint Enterprise Server", + "version": { + "version_data": [ + { + "version_value": "2016" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Server", + "version": { + "version_data": [ + { + "version_value": "2019" + } + ] + } + }, + { + "product_name": "Microsoft Business Productivity Servers", + "version": { + "version_data": [ + { + "version_value": "2010 Service Pack 2" + } + ] + } + }, + { + "product_name": "Microsoft SharePoint Foundation", + "version": { + "version_data": [ + { + "version_value": "2013 Service Pack 1" + } + ] + } + } + ] + }, + "vendor_name": "Microsoft" } - }, - { - "product_name": "Microsoft SharePoint Server", - "version": { - "version_data": [ - { - "version_value": "2019" - } - ] - } - }, - { - "product_name": "Microsoft Business Productivity Servers", - "version": { - "version_data": [ - { - "version_value": "2010 Service Pack 2" - } - ] - } - }, - { - "product_name": "Microsoft SharePoint Foundation", - "version": { - "version_data": [ - { - "version_value": "2013 Service Pack 1" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote Code Execution" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27076" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27076", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27076" + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27077.json b/2021/27xxx/CVE-2021-27077.json index 066ab809083..4496404120c 100644 --- a/2021/27xxx/CVE-2021-27077.json +++ b/2021/27xxx/CVE-2021-27077.json @@ -1,271 +1,273 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", - "ID": "CVE-2021-27077", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Windows", - "version": { - "version_data": [ - { - "version_value": "10 Version 1803 for 32-bit Systems" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2021-27077", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Windows", + "version": { + "version_data": [ + { + "version_value": "10 Version 1803 for 32-bit Systems" + }, + { + "version_value": "10 Version 1803 for x64-based Systems" + }, + { + "version_value": "10 Version 1803 for ARM64-based Systems" + }, + { + "version_value": "10 Version 1809 for 32-bit Systems" + }, + { + "version_value": "10 Version 1809 for x64-based Systems" + }, + { + "version_value": "10 Version 1809 for ARM64-based Systems" + }, + { + "version_value": "10 for 32-bit Systems" + }, + { + "version_value": "10 for x64-based Systems" + }, + { + "version_value": "10 Version 1607 for 32-bit Systems" + }, + { + "version_value": "10 Version 1607 for x64-based Systems" + }, + { + "version_value": "7 for 32-bit Systems Service Pack 1" + }, + { + "version_value": "7 for x64-based Systems Service Pack 1" + }, + { + "version_value": "8.1 for 32-bit systems" + }, + { + "version_value": "8.1 for x64-based systems" + }, + { + "version_value": "RT 8.1" + } + ] + } + }, + { + "product_name": "Windows Server", + "version": { + "version_data": [ + { + "version_value": "2019" + }, + { + "version_value": "2019 (Core installation)" + }, + { + "version_value": "2016" + }, + { + "version_value": "2016 (Core installation)" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2" + }, + { + "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2" + }, + { + "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1" + }, + { + "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" + }, + { + "version_value": "2012" + }, + { + "version_value": "2012 (Core installation)" + }, + { + "version_value": "2012 R2" + }, + { + "version_value": "2012 R2 (Core installation)" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 1909 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 1909 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 2004 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 2004 (Server Core installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for x64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for 32-bit Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + }, + { + "product_name": "Windows Server, version 20H2 (Server Core Installation)", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] }, - { - "version_value": "10 Version 1803 for x64-based Systems" - }, - { - "version_value": "10 Version 1803 for ARM64-based Systems" - }, - { - "version_value": "10 Version 1809 for 32-bit Systems" - }, - { - "version_value": "10 Version 1809 for x64-based Systems" - }, - { - "version_value": "10 Version 1809 for ARM64-based Systems" - }, - { - "version_value": "10 for 32-bit Systems" - }, - { - "version_value": "10 for x64-based Systems" - }, - { - "version_value": "10 Version 1607 for 32-bit Systems" - }, - { - "version_value": "10 Version 1607 for x64-based Systems" - }, - { - "version_value": "7 for 32-bit Systems Service Pack 1" - }, - { - "version_value": "7 for x64-based Systems Service Pack 1" - }, - { - "version_value": "8.1 for 32-bit systems" - }, - { - "version_value": "8.1 for x64-based systems" - }, - { - "version_value": "RT 8.1" - } - ] + "vendor_name": "Microsoft" } - }, - { - "product_name": "Windows Server", - "version": { - "version_data": [ - { - "version_value": "2019" - }, - { - "version_value": "2019 (Core installation)" - }, - { - "version_value": "2016" - }, - { - "version_value": "2016 (Core installation)" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2" - }, - { - "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2" - }, - { - "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1" - }, - { - "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)" - }, - { - "version_value": "2012" - }, - { - "version_value": "2012 (Core installation)" - }, - { - "version_value": "2012 R2" - }, - { - "version_value": "2012 R2 (Core installation)" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 1909 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 1909 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 2004 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 2004 (Server Core installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for x64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for 32-bit Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows 10 Version 20H2 for ARM64-based Systems", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Windows Server, version 20H2 (Server Core Installation)", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } ] - }, - "vendor_name": "Microsoft" } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Elevation of Privilege" - } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077" - } - ] - } -} + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077", + "refsource": "MISC", + "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077" + } + ] + } +} \ No newline at end of file From f9a44cb4f31d6e180f7184c564327ea34160dddf Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Thu, 11 Mar 2021 09:21:14 -0700 Subject: [PATCH 271/845] Add CVE-2021-21381 for GHSA-xgh4-387p-hqpp --- 2021/21xxx/CVE-2021-21381.json | 102 +++++++++++++++++++++++++++++++-- 1 file changed, 96 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21381.json b/2021/21xxx/CVE-2021-21381.json index 357c7531686..0a617d302f9 100644 --- a/2021/21xxx/CVE-2021-21381.json +++ b/2021/21xxx/CVE-2021-21381.json @@ -1,18 +1,108 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21381", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Sandbox escape via special tokens in .desktop file" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "flatpak", + "version": { + "version_data": [ + { + "version_value": ">= 0.9.4, < 1.10.2" + } + ] + } + } + ] + }, + "vendor_name": "flatpak" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the \"file forwarding\" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit \"`Disallow @@ and @@U usage in desktop files`\". The follow-up commits \"`dir: Reserve the whole @@ prefix`\" and \"`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`\" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/flatpak/flatpak/security/advisories/GHSA-xgh4-387p-hqpp", + "refsource": "CONFIRM", + "url": "https://github.com/flatpak/flatpak/security/advisories/GHSA-xgh4-387p-hqpp" + }, + { + "name": "https://github.com/flatpak/flatpak/pull/4156", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/pull/4156" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/8279c5818425b6812523e3805bbe242fb6a5d961", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/8279c5818425b6812523e3805bbe242fb6a5d961" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/a7401e638bf0c03102039e216ab1081922f140ae", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/a7401e638bf0c03102039e216ab1081922f140ae" + }, + { + "name": "https://github.com/flatpak/flatpak/commit/eb7946bb6248923d8c90fe9b84425fef97ae580d", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/commit/eb7946bb6248923d8c90fe9b84425fef97ae580d" + }, + { + "name": "https://github.com/flatpak/flatpak/releases/tag/1.10.2", + "refsource": "MISC", + "url": "https://github.com/flatpak/flatpak/releases/tag/1.10.2" + } + ] + }, + "source": { + "advisory": "GHSA-xgh4-387p-hqpp", + "discovery": "UNKNOWN" } } \ No newline at end of file From 6e36d581768e034a6c2195c7d05d35e2ea64cbc0 Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Thu, 11 Mar 2021 17:59:54 +0100 Subject: [PATCH 272/845] Commit CVE-2020-6648 --- 2020/6xxx/CVE-2020-6648.json | 27 ++++++++++++++++++++++++--- 1 file changed, 24 insertions(+), 3 deletions(-) diff --git a/2020/6xxx/CVE-2020-6648.json b/2020/6xxx/CVE-2020-6648.json index 9c31bd4f13f..3a33497a85d 100644 --- a/2020/6xxx/CVE-2020-6648.json +++ b/2020/6xxx/CVE-2020-6648.json @@ -15,11 +15,11 @@ "product": { "product_data": [ { - "product_name": "FortiGate", + "product_name": "FortiGate and FortiProxy", "version": { "version_data": [ { - "version_value": "FortiOS versions 6.2.4 and below." + "version_value": "FortiOS versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier." } ] } @@ -30,6 +30,22 @@ ] } }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 5.2, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, "problemtype": { "problemtype_data": [ { @@ -48,6 +64,11 @@ "refsource": "CONFIRM", "name": "https://www.fortiguard.com/psirt/FG-IR-20-009", "url": "https://www.fortiguard.com/psirt/FG-IR-20-009" + }, + { + "refsource": "CONFIRM", + "name": "https://www.fortiguard.com/psirt/FG-IR-20-236", + "url": "https://www.fortiguard.com/psirt/FG-IR-20-236" } ] }, @@ -55,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and below may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the \"diag sys ha checksum show\" command." + "value": "A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the \"diag sys ha checksum show\" command." } ] } From d75c4fba833e8285862f227ce8e1fa5c422f19fa Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 17:00:47 +0000 Subject: [PATCH 273/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++ 2021/26xxx/CVE-2021-26776.json | 56 +++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27677.json | 56 +++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27678.json | 56 +++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27679.json | 56 +++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28088.json | 61 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28115.json | 5 +++ 2021/28xxx/CVE-2021-28141.json | 56 +++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28144.json | 61 ++++++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3430.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3431.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3432.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3433.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3434.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3435.json | 18 ++++++++++ 15 files changed, 478 insertions(+), 42 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3430.json create mode 100644 2021/3xxx/CVE-2021-3431.json create mode 100644 2021/3xxx/CVE-2021-3432.json create mode 100644 2021/3xxx/CVE-2021-3433.json create mode 100644 2021/3xxx/CVE-2021-3434.json create mode 100644 2021/3xxx/CVE-2021-3435.json diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index aef8164c710..92a34aaf578 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -158,6 +158,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210310 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210311 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2021/26xxx/CVE-2021-26776.json b/2021/26xxx/CVE-2021-26776.json index a0fbdc835fd..cfe0eeec5dd 100644 --- a/2021/26xxx/CVE-2021-26776.json +++ b/2021/26xxx/CVE-2021-26776.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26776", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26776", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CSZ CMS 1.2.9 is affected by a cross-site scripting (XSS) vulnerability in multiple pages through the field name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cskaza/cszcms/issues/29", + "refsource": "MISC", + "name": "https://github.com/cskaza/cszcms/issues/29" } ] } diff --git a/2021/27xxx/CVE-2021-27677.json b/2021/27xxx/CVE-2021-27677.json index 6abe20dc0ad..f9cd2033a2e 100644 --- a/2021/27xxx/CVE-2021-27677.json +++ b/2021/27xxx/CVE-2021-27677.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27677", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27677", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in Galleries in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sruupl/batflat/issues/105", + "refsource": "MISC", + "name": "https://github.com/sruupl/batflat/issues/105" } ] } diff --git a/2021/27xxx/CVE-2021-27678.json b/2021/27xxx/CVE-2021-27678.json index b3184a70453..621a96afee1 100644 --- a/2021/27xxx/CVE-2021-27678.json +++ b/2021/27xxx/CVE-2021-27678.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27678", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27678", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in Snippets in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sruupl/batflat/issues/105", + "refsource": "MISC", + "name": "https://github.com/sruupl/batflat/issues/105" } ] } diff --git a/2021/27xxx/CVE-2021-27679.json b/2021/27xxx/CVE-2021-27679.json index 24463a38243..8879a22895d 100644 --- a/2021/27xxx/CVE-2021-27679.json +++ b/2021/27xxx/CVE-2021-27679.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27679", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27679", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sruupl/batflat/issues/105", + "refsource": "MISC", + "name": "https://github.com/sruupl/batflat/issues/105" } ] } diff --git a/2021/28xxx/CVE-2021-28088.json b/2021/28xxx/CVE-2021-28088.json index ab32de3b220..60b2d1a147a 100644 --- a/2021/28xxx/CVE-2021-28088.json +++ b/2021/28xxx/CVE-2021-28088.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28088", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28088", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the \"Display Name\" field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://anotepad.com/note/read/s3kkk6h7", + "refsource": "MISC", + "name": "https://anotepad.com/note/read/s3kkk6h7" + }, + { + "url": "https://hackerone.com/reports/1119296", + "refsource": "MISC", + "name": "https://hackerone.com/reports/1119296" } ] } diff --git a/2021/28xxx/CVE-2021-28115.json b/2021/28xxx/CVE-2021-28115.json index 0a667b11f1b..3475a804d78 100644 --- a/2021/28xxx/CVE-2021-28115.json +++ b/2021/28xxx/CVE-2021-28115.json @@ -56,6 +56,11 @@ "url": "https://github.com/Sama34/OUGC-Feedback/pull/31/commits/ceef7c06359e5dcbaffe90a40884265c5754068c", "refsource": "MISC", "name": "https://github.com/Sama34/OUGC-Feedback/pull/31/commits/ceef7c06359e5dcbaffe90a40884265c5754068c" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161746/MyBB-OUGC-Feedback-1.8.22-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/161746/MyBB-OUGC-Feedback-1.8.22-Cross-Site-Scripting.html" } ] } diff --git a/2021/28xxx/CVE-2021-28141.json b/2021/28xxx/CVE-2021-28141.json index 1d575f40a06..cfb3ff903ae 100644 --- a/2021/28xxx/CVE-2021-28141.json +++ b/2021/28xxx/CVE-2021-28141.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28141", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28141", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://pastebin.com/JULpfvFJ", + "url": "https://pastebin.com/JULpfvFJ" } ] } diff --git a/2021/28xxx/CVE-2021-28144.json b/2021/28xxx/CVE-2021-28144.json index b4ede06f2f2..d04805a333c 100644 --- a/2021/28xxx/CVE-2021-28144.json +++ b/2021/28xxx/CVE-2021-28144.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28144", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28144", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "prog.cgi on D-Link DIR-3060 devices before 1.11b04 HF2 allows remote authenticated users to inject arbitrary commands in an admin or root context because SetVirtualServerSettings calls CheckArpTables, which calls popen unsafely." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.iot-inspector.com/blog/advisory-d-link-dir-3060/", + "url": "https://www.iot-inspector.com/blog/advisory-d-link-dir-3060/" + }, + { + "refsource": "CONFIRM", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10208", + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10208" } ] } diff --git a/2021/3xxx/CVE-2021-3430.json b/2021/3xxx/CVE-2021-3430.json new file mode 100644 index 00000000000..f3c2691e3a7 --- /dev/null +++ b/2021/3xxx/CVE-2021-3430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3431.json b/2021/3xxx/CVE-2021-3431.json new file mode 100644 index 00000000000..e117a7c3cc6 --- /dev/null +++ b/2021/3xxx/CVE-2021-3431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3432.json b/2021/3xxx/CVE-2021-3432.json new file mode 100644 index 00000000000..463728b4372 --- /dev/null +++ b/2021/3xxx/CVE-2021-3432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3433.json b/2021/3xxx/CVE-2021-3433.json new file mode 100644 index 00000000000..258947174cd --- /dev/null +++ b/2021/3xxx/CVE-2021-3433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3434.json b/2021/3xxx/CVE-2021-3434.json new file mode 100644 index 00000000000..b1b87ae7bac --- /dev/null +++ b/2021/3xxx/CVE-2021-3434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3435.json b/2021/3xxx/CVE-2021-3435.json new file mode 100644 index 00000000000..c9c2b76f53e --- /dev/null +++ b/2021/3xxx/CVE-2021-3435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 2bf05d422be546749cc7850ce5aac4a42c30ef02 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 18:00:42 +0000 Subject: [PATCH 274/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 92a34aaf578..e492c232fc0 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -163,6 +163,16 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210311 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 opened a new pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 closed pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E" } ] }, From 48df700e3aab8a12ce6defb02fd6fa5e22bbdb97 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 18:00:56 +0000 Subject: [PATCH 275/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++ 2020/14xxx/CVE-2020-14987.json | 56 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27216.json | 5 +++ 3 files changed, 60 insertions(+), 6 deletions(-) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index e492c232fc0..ae1c66eda27 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -173,6 +173,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 closed pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/14xxx/CVE-2020-14987.json b/2020/14xxx/CVE-2020-14987.json index 5f54953cd1f..2b8fe2865de 100644 --- a/2020/14xxx/CVE-2020-14987.json +++ b/2020/14xxx/CVE-2020-14987.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14987", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14987", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows remote attackers to execute arbitrary code because there is a mishandling of the capability for administrators to write and run Groovy scripts within the updater editor. An attacker must use an AST transforming annotation such as @Grab." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://tvrbk.github.io/cve/2021/03/09/brXM.html", + "url": "https://tvrbk.github.io/cve/2021/03/09/brXM.html" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 2008a457581..7388f9c8dff 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -450,6 +450,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210310 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210311 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E" } ] } From d8a5d8f882270848d2d60354b40031948d876aba Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 19:00:39 +0000 Subject: [PATCH 276/845] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14988.json | 56 ++++++++++++++++++++++++++++++---- 2020/14xxx/CVE-2020-14989.json | 56 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27216.json | 5 +++ 3 files changed, 105 insertions(+), 12 deletions(-) diff --git a/2020/14xxx/CVE-2020-14988.json b/2020/14xxx/CVE-2020-14988.json index 32056545ad5..74552630352 100644 --- a/2020/14xxx/CVE-2020-14988.json +++ b/2020/14xxx/CVE-2020-14988.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14988", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14988", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows XSS in the login page via the loginmessage parameter, the text editor via the src attribute of HTML elements, the translations menu via the foldername parameter, the author page via the link URL, or the upload image functionality via an SVG document containing JavaScript." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://tvrbk.github.io/cve/2021/03/09/brXM.html", + "url": "https://tvrbk.github.io/cve/2021/03/09/brXM.html" } ] } diff --git a/2020/14xxx/CVE-2020-14989.json b/2020/14xxx/CVE-2020-14989.json index 53d919aa5a9..2b8d566f167 100644 --- a/2020/14xxx/CVE-2020-14989.json +++ b/2020/14xxx/CVE-2020-14989.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-14989", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-14989", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows CSRF if the attacker uses GET where POST was intended." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://tvrbk.github.io/cve/2021/03/09/brXM.html", + "url": "https://tvrbk.github.io/cve/2021/03/09/brXM.html" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 7388f9c8dff..efedbe9cd4e 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -455,6 +455,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210311 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210311 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E" } ] } From 325067066326826a7223e4673b471ccb5fa634d5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 20:00:41 +0000 Subject: [PATCH 277/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++ 2020/29xxx/CVE-2020-29045.json | 61 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28144.json | 5 +++ 2021/3xxx/CVE-2021-3436.json | 18 ++++++++++ 4 files changed, 83 insertions(+), 6 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3436.json diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index ae1c66eda27..887d1f093ff 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -178,6 +178,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210311 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/29xxx/CVE-2020-29045.json b/2020/29xxx/CVE-2020-29045.json index c3a35ea0343..37b4e37d097 100644 --- a/2020/29xxx/CVE-2020-29045.json +++ b/2020/29xxx/CVE-2020-29045.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29045", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29045", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The food-and-drink-menu plugin through 2.2.0 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the fdm_cart cookie in load_cart_from_cookie in includes/class-cart-manager.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/food-and-drink-menu/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/food-and-drink-menu/#developers" + }, + { + "refsource": "MISC", + "name": "https://appcheck-ng.com/cve-2020-29045/", + "url": "https://appcheck-ng.com/cve-2020-29045/" } ] } diff --git a/2021/28xxx/CVE-2021-28144.json b/2021/28xxx/CVE-2021-28144.json index d04805a333c..eb0b597409e 100644 --- a/2021/28xxx/CVE-2021-28144.json +++ b/2021/28xxx/CVE-2021-28144.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10208", "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10208" + }, + { + "refsource": "FULLDISC", + "name": "20210311 [CVE-2021-28144] Authenticated Command Injection in D-Link DIR-3060 Web Interface", + "url": "http://seclists.org/fulldisclosure/2021/Mar/23" } ] } diff --git a/2021/3xxx/CVE-2021-3436.json b/2021/3xxx/CVE-2021-3436.json new file mode 100644 index 00000000000..7b70e309fea --- /dev/null +++ b/2021/3xxx/CVE-2021-3436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 7a042e1a036a3010245033fb55fbdf179e3f4c6a Mon Sep 17 00:00:00 2001 From: zdi-team Date: Thu, 11 Mar 2021 14:47:31 -0600 Subject: [PATCH 278/845] ZDI assigns the following CVEs: M 2020/27xxx/CVE-2020-27860.json M 2020/27xxx/CVE-2020-27861.json M 2020/27xxx/CVE-2020-27862.json M 2020/27xxx/CVE-2020-27863.json M 2020/27xxx/CVE-2020-27864.json M 2020/27xxx/CVE-2020-27865.json M 2020/27xxx/CVE-2020-27866.json M 2020/27xxx/CVE-2020-27867.json M 2020/27xxx/CVE-2020-27868.json M 2020/27xxx/CVE-2020-27869.json M 2020/27xxx/CVE-2020-27870.json M 2020/27xxx/CVE-2020-27871.json M 2020/27xxx/CVE-2020-27874.json --- 2020/27xxx/CVE-2020-27860.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27861.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27862.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27863.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27864.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27865.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27866.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27867.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27868.json | 134 ++++++++++++++++----------------- 2020/27xxx/CVE-2020-27869.json | 126 +++++++++++++++---------------- 2020/27xxx/CVE-2020-27870.json | 126 +++++++++++++++---------------- 2020/27xxx/CVE-2020-27871.json | 126 +++++++++++++++---------------- 2020/27xxx/CVE-2020-27874.json | 126 +++++++++++++++---------------- 13 files changed, 833 insertions(+), 877 deletions(-) diff --git a/2020/27xxx/CVE-2020-27860.json b/2020/27xxx/CVE-2020-27860.json index 53929d5cc39..9c405f8d8e2 100644 --- a/2020/27xxx/CVE-2020-27860.json +++ b/2020/27xxx/CVE-2020-27860.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27860", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Reader", - "version": { - "version_data": [ - { - "version_value": "10.0.1.35811" - } - ] - } - } - ] - }, - "vendor_name": "Foxit" - } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11727." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27860", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Reader", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-787: Out-of-bounds Write" + "version_value": "10.0.1.35811" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.foxitsoftware.com/support/security-bulletins.html", - "refsource": "MISC", - "name": "https://www.foxitsoftware.com/support/security-bulletins.html" - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1415/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1415/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "Foxit" } + ] } -} \ No newline at end of file + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11727." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1415/" + }, + { + "url": "https://www.foxitsoftware.com/support/security-bulletins.html" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27861.json b/2020/27xxx/CVE-2020-27861.json index 35e68ec3a74..a14979c3cbb 100644 --- a/2020/27xxx/CVE-2020-27861.json +++ b/2020/27xxx/CVE-2020-27861.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27861", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Orbi", - "version": { - "version_data": [ - { - "version_value": "2.5.1.16" - } - ] - } - } - ] - }, - "vendor_name": "NETGEAR" - } - ] - } - }, - "credit": "Shaunak Mirani", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27861", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Orbi", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + "version_value": "2.5.1.16" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/" - }, - { - "url": "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", - "refsource": "MISC", - "name": "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } + ] } -} \ No newline at end of file + }, + "credit": "Shaunak Mirani", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/" + }, + { + "url": "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27862.json b/2020/27xxx/CVE-2020-27862.json index a2acd787a5d..8d312a51d57 100644 --- a/2020/27xxx/CVE-2020-27862.json +++ b/2020/27xxx/CVE-2020-27862.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27862", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmware version 2.3" - } - ] - } - } - ] - }, - "vendor_name": "D-Link" - } - ] - } - }, - "credit": "chung96vn ft phieulang", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DVA-2800 and DSL-2888A firmware version 2.3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. When parsing the path parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-10911." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27862", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-77: Command Injection" + "version_value": "firmware version 2.3" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1426/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1426/" - }, - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196", - "refsource": "MISC", - "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "D-Link" } + ] } -} \ No newline at end of file + }, + "credit": "chung96vn ft phieulang", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. When parsing the path parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-10911." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1426/" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27863.json b/2020/27xxx/CVE-2020-27863.json index 32c5d0e0a12..6f7f313ba6c 100644 --- a/2020/27xxx/CVE-2020-27863.json +++ b/2020/27xxx/CVE-2020-27863.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27863", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmeware version 2.3" - } - ] - } - } - ] - }, - "vendor_name": "D-Link" - } - ] - } - }, - "credit": "chung96vn ft phieulang", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DVA-2800 and DSL-2888A firmware version 2.3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10912." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27863", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + "version_value": "firmeware version 2.3" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196", - "refsource": "MISC", - "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1427/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1427/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "D-Link" } + ] } -} \ No newline at end of file + }, + "credit": "chung96vn ft phieulang", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10912." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1427/" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27864.json b/2020/27xxx/CVE-2020-27864.json index 4036c5ddb2c..fceeea17e1a 100644 --- a/2020/27xxx/CVE-2020-27864.json +++ b/2020/27xxx/CVE-2020-27864.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27864", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "DAP-1860", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.04B03" - } - ] - } - } - ] - }, - "vendor_name": "D-Link" - } - ] - } - }, - "credit": "chung96vn of Vietnam Cyber Security Center", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the Authorization request header, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10880." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27864", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "DAP-1860", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-77: Command Injection" + "version_value": "firmware version 1.04B03" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1428/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1428/" - }, - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197", - "refsource": "MISC", - "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "D-Link" } + ] } -} \ No newline at end of file + }, + "credit": "chung96vn of Vietnam Cyber Security Center", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the Authorization request header, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10880." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1428/" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27865.json b/2020/27xxx/CVE-2020-27865.json index 615aaf8396b..9301d59ff86 100644 --- a/2020/27xxx/CVE-2020-27865.json +++ b/2020/27xxx/CVE-2020-27865.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27865", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "DAP-1860", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.04B03" - } - ] - } - } - ] - }, - "vendor_name": "D-Link" - } - ] - } - }, - "credit": "chung96vn of Vietnam Cyber Security Center", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the uhttpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the device. Was ZDI-CAN-10894." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27865", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "DAP-1860", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + "version_value": "firmware version 1.04B03" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197", - "refsource": "MISC", - "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1429/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1429/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "D-Link" } + ] } -} \ No newline at end of file + }, + "credit": "chung96vn of Vietnam Cyber Security Center", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the uhttpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the device. Was ZDI-CAN-10894." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1429/" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27866.json b/2020/27xxx/CVE-2020-27866.json index 7b780e484e6..7d3979515ea 100644 --- a/2020/27xxx/CVE-2020-27866.json +++ b/2020/27xxx/CVE-2020-27866.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27866", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.2.0.62_1.0.1" - } - ] - } - } - ] - }, - "vendor_name": "NETGEAR" - } - ] - } - }, - "credit": "1sd3d of Viettel Cyber Security", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 firmware version 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11355." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27866", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + "version_value": "firmware version 1.2.0.62_1.0.1" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers", - "refsource": "MISC", - "name": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1451/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1451/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } + ] } -} \ No newline at end of file + }, + "credit": "1sd3d of Viettel Cyber Security", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.\n\n Was ZDI-CAN-11355." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1451/" + }, + { + "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27867.json b/2020/27xxx/CVE-2020-27867.json index 1c7790a33dd..ad20afede12 100644 --- a/2020/27xxx/CVE-2020-27867.json +++ b/2020/27xxx/CVE-2020-27867.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27867", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.2.0.62_1.0.1" - } - ] - } - } - ] - }, - "vendor_name": "NETGEAR" - } - ] - } - }, - "credit": "1sd3d", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 firmware version 1.2.0.62_1.0.1 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27867", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-77: Command Injection" + "version_value": "firmware version 1.2.0.62_1.0.1" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers", - "refsource": "MISC", - "name": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1423/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1423/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } + ] } -} \ No newline at end of file + }, + "credit": "1sd3d", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1423/" + }, + { + "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27868.json b/2020/27xxx/CVE-2020-27868.json index a338616c23d..9c998a145d8 100644 --- a/2020/27xxx/CVE-2020-27868.json +++ b/2020/27xxx/CVE-2020-27868.json @@ -1,74 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27868", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Ocularis", - "version": { - "version_data": [ - { - "version_value": "5.9.0.395" - } - ] - } - } - ] - }, - "vendor_name": "Qognify" - } - ] - } - }, - "credit": "Joachim Kerschbaumer (@joachimk)", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Qognify Ocularis 5.9.0.395. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of serialized objects provided to the EventCoordinator endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-11257." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27868", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Ocularis", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-502: Deserialization of Untrusted Data" + "version_value": "5.9.0.395" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1453/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1453/" - }, - { - "url": "https://onssi.ftpstream.com/download/pbkwqEBlNQLBpfywrxvR/onssi/Software/Ocularis%206.0/Special%20Build/Ocularis%20Base.exe", - "refsource": "MISC", - "name": "https://onssi.ftpstream.com/download/pbkwqEBlNQLBpfywrxvR/onssi/Software/Ocularis%206.0/Special%20Build/Ocularis%20Base.exe" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "Qognify" } + ] } -} \ No newline at end of file + }, + "credit": "Joachim Kerschbaumer (@joachimk)", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Qognify Ocularis 5.9.0.395. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of serialized objects provided to the EventCoordinator endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-11257." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502: Deserialization of Untrusted Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1453/" + }, + { + "url": "https://www.qognify.com/support-training/software-downloads/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27869.json b/2020/27xxx/CVE-2020-27869.json index 5cd15c65ad8..642b34151b0 100644 --- a/2020/27xxx/CVE-2020-27869.json +++ b/2020/27xxx/CVE-2020-27869.json @@ -1,69 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27869", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Network Performance Monitor", - "version": { - "version_data": [ - { - "version_value": "2020 HF1, NPM: 2020.2" - } - ] - } - } - ] - }, - "vendor_name": "SolarWinds" - } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27869", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Network Performance Monitor", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + "version_value": "2020 HF1, NPM: 2020.2" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-064/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-064/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "SolarWinds" } + ] } -} \ No newline at end of file + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-064/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27870.json b/2020/27xxx/CVE-2020-27870.json index 5b7a5217659..689e5c152ae 100644 --- a/2020/27xxx/CVE-2020-27870.json +++ b/2020/27xxx/CVE-2020-27870.json @@ -1,69 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27870", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Orion Platform", - "version": { - "version_data": [ - { - "version_value": "2020.2.1" - } - ] - } - } - ] - }, - "vendor_name": "SolarWinds" - } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability. The specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27870", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Orion Platform", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + "version_value": "2020.2.1" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-066/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-066/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "SolarWinds" } + ] } -} \ No newline at end of file + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-066/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27871.json b/2020/27xxx/CVE-2020-27871.json index e07db80f1e2..85504cb2dc0 100644 --- a/2020/27xxx/CVE-2020-27871.json +++ b/2020/27xxx/CVE-2020-27871.json @@ -1,69 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27871", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Orion Platform", - "version": { - "version_data": [ - { - "version_value": "2020.2.1" - } - ] - } - } - ] - }, - "vendor_name": "SolarWinds" - } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within VulnerabilitySettings.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11902." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27871", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Orion Platform", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + "version_value": "2020.2.1" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-067/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-067/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "SolarWinds" } + ] } -} \ No newline at end of file + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within VulnerabilitySettings.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11902." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-067/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} diff --git a/2020/27xxx/CVE-2020-27874.json b/2020/27xxx/CVE-2020-27874.json index 893822267b9..73e8c2a5d55 100644 --- a/2020/27xxx/CVE-2020-27874.json +++ b/2020/27xxx/CVE-2020-27874.json @@ -1,69 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27874", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "WeChat", - "version": { - "version_data": [ - { - "version_value": "7.0.18" - } - ] - } - } - ] - }, - "vendor_name": "Tencent" - } - ] - } - }, - "credit": "Wen guang Jiao", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11580." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27874", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WeChat", + "version": { + "version_data": [ { - "lang": "eng", - "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" + "version_value": "7.0.18" } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-084/", - "refsource": "MISC", - "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-084/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + ] + } + } + ] + }, + "vendor_name": "Tencent" } + ] } -} \ No newline at end of file + }, + "credit": "Wen guang Jiao", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11580." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-084/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +} From 0d57e3bfbd361f3e524700941275f0c000ef0347 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 21:00:41 +0000 Subject: [PATCH 279/845] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36277.json | 72 ++++++++++++++++++++++++++++++++++ 2020/6xxx/CVE-2020-6648.json | 2 +- 2021/20xxx/CVE-2021-20261.json | 55 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22709.json | 55 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22710.json | 55 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22711.json | 55 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22712.json | 55 ++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22713.json | 50 +++++++++++++++++++++-- 2021/22xxx/CVE-2021-22714.json | 50 +++++++++++++++++++++-- 2021/28xxx/CVE-2021-28141.json | 5 +++ 2021/28xxx/CVE-2021-28146.json | 18 +++++++++ 2021/28xxx/CVE-2021-28147.json | 18 +++++++++ 2021/28xxx/CVE-2021-28148.json | 18 +++++++++ 2021/28xxx/CVE-2021-28149.json | 18 +++++++++ 2021/28xxx/CVE-2021-28150.json | 18 +++++++++ 2021/28xxx/CVE-2021-28151.json | 18 +++++++++ 2021/28xxx/CVE-2021-28152.json | 18 +++++++++ 2021/28xxx/CVE-2021-28153.json | 18 +++++++++ 18 files changed, 576 insertions(+), 22 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36277.json create mode 100644 2021/28xxx/CVE-2021-28146.json create mode 100644 2021/28xxx/CVE-2021-28147.json create mode 100644 2021/28xxx/CVE-2021-28148.json create mode 100644 2021/28xxx/CVE-2021-28149.json create mode 100644 2021/28xxx/CVE-2021-28150.json create mode 100644 2021/28xxx/CVE-2021-28151.json create mode 100644 2021/28xxx/CVE-2021-28152.json create mode 100644 2021/28xxx/CVE-2021-28153.json diff --git a/2020/36xxx/CVE-2020-36277.json b/2020/36xxx/CVE-2020-36277.json new file mode 100644 index 00000000000..2d1380dd452 --- /dev/null +++ b/2020/36xxx/CVE-2020-36277.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36277", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Leptonica before 1.80.0 allows a denial of service (application crash) via an incorrect left shift in pixConvert2To8 in pixconv.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21997", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21997" + }, + { + "url": "https://github.com/DanBloomberg/leptonica/pull/499", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/pull/499" + }, + { + "url": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6648.json b/2020/6xxx/CVE-2020-6648.json index 3a33497a85d..3d384d7dee1 100644 --- a/2020/6xxx/CVE-2020-6648.json +++ b/2020/6xxx/CVE-2020-6648.json @@ -76,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the \"diag sys ha checksum show\" command." + "value": "A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the \"diag sys ha checksum show\" command." } ] } diff --git a/2021/20xxx/CVE-2021-20261.json b/2021/20xxx/CVE-2021-20261.json index f6a17237d4a..a562ad9a781 100644 --- a/2021/20xxx/CVE-2021-20261.json +++ b/2021/20xxx/CVE-2021-20261.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20261", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "kernel 5.12-rc2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-362" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932150", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932150" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw." } ] } diff --git a/2021/22xxx/CVE-2021-22709.json b/2021/22xxx/CVE-2021-22709.json index 4a37d0c64dc..bb6a527208f 100644 --- a/2021/22xxx/CVE-2021-22709.json +++ b/2021/22xxx/CVE-2021-22709.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22709", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior", + "version": { + "version_data": [ + { + "version_value": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01" + }, + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could result in loss of data or remote code execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition." } ] } diff --git a/2021/22xxx/CVE-2021-22710.json b/2021/22xxx/CVE-2021-22710.json index 0511b592808..ff8546be9c2 100644 --- a/2021/22xxx/CVE-2021-22710.json +++ b/2021/22xxx/CVE-2021-22710.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22710", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior", + "version": { + "version_data": [ + { + "version_value": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01" + }, + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could cause remote code execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition." } ] } diff --git a/2021/22xxx/CVE-2021-22711.json b/2021/22xxx/CVE-2021-22711.json index 5883ab3afce..618ed50203c 100644 --- a/2021/22xxx/CVE-2021-22711.json +++ b/2021/22xxx/CVE-2021-22711.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22711", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior", + "version": { + "version_data": [ + { + "version_value": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01" + }, + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could result in arbitrary read or write conditions when malicious CGF (Configuration Group File) file is imported to IGSS Definition due to missing validation of input data." } ] } diff --git a/2021/22xxx/CVE-2021-22712.json b/2021/22xxx/CVE-2021-22712.json index 1c888d1683d..f0a4f8b44a0 100644 --- a/2021/22xxx/CVE-2021-22712.json +++ b/2021/22xxx/CVE-2021-22712.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22712", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior", + "version": { + "version_data": [ + { + "version_value": "Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-068-01" + }, + { + "refsource": "MISC", + "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-068-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could result in arbitrary read or write conditions when malicious CGF (Configuration Group File) file is imported to IGSS Definition due to an unchecked pointer address." } ] } diff --git a/2021/22xxx/CVE-2021-22713.json b/2021/22xxx/CVE-2021-22713.json index 936a79a28b9..890e08523b0 100644 --- a/2021/22xxx/CVE-2021-22713.json +++ b/2021/22xxx/CVE-2021-22713.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22713", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PowerLogic ION8650, ION8800, ION7650, ION7700/73xx, and ION83xx/84xx/85xx/8600 (see security notifcation for affected versions)", + "version": { + "version_data": [ + { + "version_value": "PowerLogic ION8650, ION8800, ION7650, ION7700/73xx, and ION83xx/84xx/85xx/8600 (see security notifcation for affected versions)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-068-03", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-068-03" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-119:Improper restriction of operations within the bounds of a memory buffer vulnerability exists in PowerLogic ION8650, ION8800, ION7650, ION7700/73xx, and ION83xx/84xx/85xx/8600 (see security notifcation for affected versions), which could cause the meter to reboot." } ] } diff --git a/2021/22xxx/CVE-2021-22714.json b/2021/22xxx/CVE-2021-22714.json index bc67236a9f6..dffc9b0f443 100644 --- a/2021/22xxx/CVE-2021-22714.json +++ b/2021/22xxx/CVE-2021-22714.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22714", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PowerLogic ION7400, PM8000 and ION9000 (All versions prior to V3.0.0)", + "version": { + "version_data": [ + { + "version_value": "PowerLogic ION7400, PM8000 and ION9000 (All versions prior to V3.0.0)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.se.com/ww/en/download/document/SEVD-2021-068-02", + "url": "https://www.se.com/ww/en/download/document/SEVD-2021-068-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-119:Improper restriction of operations within the bounds of a memory buffer vulnerability exists in PowerLogic ION7400, PM8000 and ION9000 (All versions prior to V3.0.0), which could cause the meter to reboot or allow for remote code execution." } ] } diff --git a/2021/28xxx/CVE-2021-28141.json b/2021/28xxx/CVE-2021-28141.json index cfb3ff903ae..76f939af072 100644 --- a/2021/28xxx/CVE-2021-28141.json +++ b/2021/28xxx/CVE-2021-28141.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://pastebin.com/JULpfvFJ", "url": "https://pastebin.com/JULpfvFJ" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/shreyasfegade/e2480e26b2ed1d0c7175ecf7cb15f9c1", + "url": "https://gist.github.com/shreyasfegade/e2480e26b2ed1d0c7175ecf7cb15f9c1" } ] } diff --git a/2021/28xxx/CVE-2021-28146.json b/2021/28xxx/CVE-2021-28146.json new file mode 100644 index 00000000000..9ca4030123a --- /dev/null +++ b/2021/28xxx/CVE-2021-28146.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28146", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28147.json b/2021/28xxx/CVE-2021-28147.json new file mode 100644 index 00000000000..586cceafc20 --- /dev/null +++ b/2021/28xxx/CVE-2021-28147.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28147", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28148.json b/2021/28xxx/CVE-2021-28148.json new file mode 100644 index 00000000000..26d420f57a4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28148.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28148", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28149.json b/2021/28xxx/CVE-2021-28149.json new file mode 100644 index 00000000000..3e884453933 --- /dev/null +++ b/2021/28xxx/CVE-2021-28149.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28149", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28150.json b/2021/28xxx/CVE-2021-28150.json new file mode 100644 index 00000000000..5c85db9fbb1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28150.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28150", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28151.json b/2021/28xxx/CVE-2021-28151.json new file mode 100644 index 00000000000..bd47aeef95c --- /dev/null +++ b/2021/28xxx/CVE-2021-28151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28152.json b/2021/28xxx/CVE-2021-28152.json new file mode 100644 index 00000000000..ef7c0347432 --- /dev/null +++ b/2021/28xxx/CVE-2021-28152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28153.json b/2021/28xxx/CVE-2021-28153.json new file mode 100644 index 00000000000..a61bcb62811 --- /dev/null +++ b/2021/28xxx/CVE-2021-28153.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28153", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From a1b09a5a45dd01ce3ec076b8f9c0883b0e2d07a8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 22:00:40 +0000 Subject: [PATCH 280/845] "-Synchronized-Data." --- 2016/20xxx/CVE-2016-20009.json | 62 ++++++++++++++++++++++++++++++++++ 2020/24xxx/CVE-2020-24983.json | 56 ++++++++++++++++++++++++++---- 2020/24xxx/CVE-2020-24984.json | 56 ++++++++++++++++++++++++++---- 2020/26xxx/CVE-2020-26519.json | 5 +++ 2021/21xxx/CVE-2021-21290.json | 10 ++++++ 2021/28xxx/CVE-2021-28143.json | 61 +++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28153.json | 56 ++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28154.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28155.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28156.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3407.json | 5 +++ 11 files changed, 385 insertions(+), 24 deletions(-) create mode 100644 2016/20xxx/CVE-2016-20009.json create mode 100644 2021/28xxx/CVE-2021-28154.json create mode 100644 2021/28xxx/CVE-2021-28155.json create mode 100644 2021/28xxx/CVE-2021-28156.json diff --git a/2016/20xxx/CVE-2016-20009.json b/2016/20xxx/CVE-2016-20009.json new file mode 100644 index 00000000000..f243f436c31 --- /dev/null +++ b/2016/20xxx/CVE-2016-20009.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-20009", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** UNSUPPORTED WHEN ASSIGNED ** A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/", + "refsource": "MISC", + "name": "https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/" + } + ] + } +} \ No newline at end of file diff --git a/2020/24xxx/CVE-2020-24983.json b/2020/24xxx/CVE-2020-24983.json index 9f78fd72993..367b610ce25 100644 --- a/2020/24xxx/CVE-2020-24983.json +++ b/2020/24xxx/CVE-2020-24983.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24983", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24983", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated request (to change the Dashboard name) as if the victim had done so themselves, aka CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://c41nc.co.uk/cve-2020-24983/", + "url": "https://c41nc.co.uk/cve-2020-24983/" } ] } diff --git a/2020/24xxx/CVE-2020-24984.json b/2020/24xxx/CVE-2020-24984.json index 8325c1bfd3d..59052c25a51 100644 --- a/2020/24xxx/CVE-2020-24984.json +++ b/2020/24xxx/CVE-2020-24984.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24984", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24984", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Quadbase EspressReports ES 7 Update 9. It allows CSRF, whereby an attacker may be able to trick an authenticated admin level user into uploading malicious files to the web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://c41nc.co.uk/cve-2020-24984/", + "url": "https://c41nc.co.uk/cve-2020-24984/" } ] } diff --git a/2020/26xxx/CVE-2020-26519.json b/2020/26xxx/CVE-2020-26519.json index 70a39323780..f7d710a0d47 100644 --- a/2020/26xxx/CVE-2020-26519.json +++ b/2020/26xxx/CVE-2020-26519.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4794", "url": "https://www.debian.org/security/2020/dsa-4794" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210311 [SECURITY] [DLA 2589-1] mupdf security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00012.html" } ] } diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index bd03e862e2f..170311f77f4 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -151,6 +151,16 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E", "url": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-issues] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability", + "url": "https://lists.apache.org/thread.html/r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-dev] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability", + "url": "https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E" } ] }, diff --git a/2021/28xxx/CVE-2021-28143.json b/2021/28xxx/CVE-2021-28143.json index b46f3c09461..279ee2ebd0f 100644 --- a/2021/28xxx/CVE-2021-28143.json +++ b/2021/28xxx/CVE-2021-28143.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28143", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28143", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "/jsonrpc on D-Link DIR-841 3.03 and 3.04 devices allows authenticated command injection via ping, ping6, or traceroute (under System Tools)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10207", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10207" + }, + { + "url": "https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt", + "refsource": "MISC", + "name": "https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt" } ] } diff --git a/2021/28xxx/CVE-2021-28153.json b/2021/28xxx/CVE-2021-28153.json index a61bcb62811..656d5cda5c6 100644 --- a/2021/28xxx/CVE-2021-28153.json +++ b/2021/28xxx/CVE-2021-28153.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28153", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28153", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.gnome.org/GNOME/glib/-/issues/2325", + "refsource": "MISC", + "name": "https://gitlab.gnome.org/GNOME/glib/-/issues/2325" } ] } diff --git a/2021/28xxx/CVE-2021-28154.json b/2021/28xxx/CVE-2021-28154.json new file mode 100644 index 00000000000..15a06ec1d1f --- /dev/null +++ b/2021/28xxx/CVE-2021-28154.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28154", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** DISPUTED ** Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states \"The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/camunda/camunda-modeler/issues/2143", + "refsource": "MISC", + "name": "https://github.com/camunda/camunda-modeler/issues/2143" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28155.json b/2021/28xxx/CVE-2021-28155.json new file mode 100644 index 00000000000..53cee354ebd --- /dev/null +++ b/2021/28xxx/CVE-2021-28155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28156.json b/2021/28xxx/CVE-2021-28156.json new file mode 100644 index 00000000000..147592fca9b --- /dev/null +++ b/2021/28xxx/CVE-2021-28156.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28156", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3407.json b/2021/3xxx/CVE-2021-3407.json index ed7dd785a17..5763ac686ef 100644 --- a/2021/3xxx/CVE-2021-3407.json +++ b/2021/3xxx/CVE-2021-3407.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-572bb0f886", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M44PNYCBL33OD7GC75XNE6CDS4VSGVWO/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210311 [SECURITY] [DLA 2589-1] mupdf security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00012.html" } ] }, From fbb882d45d1325dda30858cc8446922701429412 Mon Sep 17 00:00:00 2001 From: Wayne Beaton Date: Thu, 11 Mar 2021 17:10:55 -0500 Subject: [PATCH 281/845] Update CVE-2020-27223 Signed-off-by: Wayne Beaton --- 2020/27xxx/CVE-2020-27223.json | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index ede16615977..b9a1bf42db4 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -51,6 +51,13 @@ } ] }, + "impact": { + "cvss": { + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, "problemtype": { "problemtype_data": [ { @@ -307,4 +314,4 @@ } ] } -} \ No newline at end of file +} From d3ad6c8c56aa801390d8d5cb9c1f1fd971ebd300 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Mar 2021 23:00:40 +0000 Subject: [PATCH 282/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 2021/27xxx/CVE-2021-27076.json | 5 +++++ 2021/3xxx/CVE-2021-3310.json | 5 +++++ 3 files changed, 15 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index efedbe9cd4e..75b9280bf27 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -460,6 +460,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210311 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210311 [jira] [Assigned] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/27xxx/CVE-2021-27076.json b/2021/27xxx/CVE-2021-27076.json index c91f5cf88b4..8bbadffd529 100644 --- a/2021/27xxx/CVE-2021-27076.json +++ b/2021/27xxx/CVE-2021-27076.json @@ -86,6 +86,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27076", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27076" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-276/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-276/" } ] } diff --git a/2021/3xxx/CVE-2021-3310.json b/2021/3xxx/CVE-2021-3310.json index 2205dc272f0..27d2b902a36 100644 --- a/2021/3xxx/CVE-2021-3310.json +++ b/2021/3xxx/CVE-2021-3310.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122", "url": "https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-277/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-277/" } ] } From 0121d1f132cefae504dd88b5e76b4086a75c76ca Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 00:00:40 +0000 Subject: [PATCH 283/845] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36278.json | 72 ++++++++++++++++++++++++++++++++++ 2020/36xxx/CVE-2020-36279.json | 72 ++++++++++++++++++++++++++++++++++ 2020/36xxx/CVE-2020-36280.json | 72 ++++++++++++++++++++++++++++++++++ 2020/36xxx/CVE-2020-36281.json | 18 +++++++++ 4 files changed, 234 insertions(+) create mode 100644 2020/36xxx/CVE-2020-36278.json create mode 100644 2020/36xxx/CVE-2020-36279.json create mode 100644 2020/36xxx/CVE-2020-36280.json create mode 100644 2020/36xxx/CVE-2020-36281.json diff --git a/2020/36xxx/CVE-2020-36278.json b/2020/36xxx/CVE-2020-36278.json new file mode 100644 index 00000000000..f4bf4944623 --- /dev/null +++ b/2020/36xxx/CVE-2020-36278.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36278", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0" + }, + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433" + }, + { + "url": "https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842" + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36279.json b/2020/36xxx/CVE-2020-36279.json new file mode 100644 index 00000000000..0bcae086db6 --- /dev/null +++ b/2020/36xxx/CVE-2020-36279.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36279", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Leptonica before 1.80.0 allows a heap-based buffer over-read in rasteropGeneralLow, related to adaptmap_reg.c and adaptmap.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0" + }, + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512" + }, + { + "url": "https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4" + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36280.json b/2020/36xxx/CVE-2020-36280.json new file mode 100644 index 00000000000..f9830ee6bd1 --- /dev/null +++ b/2020/36xxx/CVE-2020-36280.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36280", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0" + }, + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654" + }, + { + "url": "https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c" + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36281.json b/2020/36xxx/CVE-2020-36281.json new file mode 100644 index 00000000000..6d75bf600da --- /dev/null +++ b/2020/36xxx/CVE-2020-36281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 6c593c899e11c456f0ba42ceade6ebc5099f3bfe Mon Sep 17 00:00:00 2001 From: Ikuya Fukumoto Date: Fri, 12 Mar 2021 09:41:22 +0900 Subject: [PATCH 284/845] JPCERT/CC 2021-03-12-09-40 --- 2021/20xxx/CVE-2021-20674.json | 50 ++++++++++++++++++++++++++++++++-- 1 file changed, 47 insertions(+), 3 deletions(-) diff --git a/2021/20xxx/CVE-2021-20674.json b/2021/20xxx/CVE-2021-20674.json index e3a835f2262..f0d751f7574 100644 --- a/2021/20xxx/CVE-2021-20674.json +++ b/2021/20xxx/CVE-2021-20674.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20674", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NTT TechnoCross Corporation", + "product": { + "product_data": [ + { + "product_name": "Installer of MagicConnect Client program", + "version": { + "version_data": [ + { + "version_value": "distributed before 2021 March 1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Untrusted search path vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.magicconnect.net/information/202103110900-2" + }, + { + "url": "https://jvn.jp/en/jp/JVN18056666/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Untrusted search path vulnerability in Installer of MagicConnect Client program distributed before 2021 March 1 allows an attacker to gain privileges and via a Trojan horse DLL in an unspecified directory and to execute arbitrary code with the privilege of the user invoking the installer when a terminal is connected remotely using Remote desktop." } ] } From dbc72922fc9a27ff83bbdb471fbac67afc631aa8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 01:00:44 +0000 Subject: [PATCH 285/845] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36281.json | 66 ++++++++++++++++++++++++++--- 2020/36xxx/CVE-2020-36282.json | 77 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28157.json | 18 ++++++++ 2021/28xxx/CVE-2021-28158.json | 18 ++++++++ 2021/28xxx/CVE-2021-28159.json | 18 ++++++++ 2021/28xxx/CVE-2021-28160.json | 18 ++++++++ 2021/28xxx/CVE-2021-28161.json | 18 ++++++++ 2021/28xxx/CVE-2021-28162.json | 18 ++++++++ 2021/28xxx/CVE-2021-28163.json | 18 ++++++++ 2021/28xxx/CVE-2021-28164.json | 18 ++++++++ 2021/28xxx/CVE-2021-28165.json | 18 ++++++++ 2021/28xxx/CVE-2021-28166.json | 18 ++++++++ 2021/28xxx/CVE-2021-28167.json | 18 ++++++++ 2021/28xxx/CVE-2021-28168.json | 18 ++++++++ 2021/28xxx/CVE-2021-28169.json | 18 ++++++++ 2021/28xxx/CVE-2021-28170.json | 18 ++++++++ 16 files changed, 389 insertions(+), 6 deletions(-) create mode 100644 2020/36xxx/CVE-2020-36282.json create mode 100644 2021/28xxx/CVE-2021-28157.json create mode 100644 2021/28xxx/CVE-2021-28158.json create mode 100644 2021/28xxx/CVE-2021-28159.json create mode 100644 2021/28xxx/CVE-2021-28160.json create mode 100644 2021/28xxx/CVE-2021-28161.json create mode 100644 2021/28xxx/CVE-2021-28162.json create mode 100644 2021/28xxx/CVE-2021-28163.json create mode 100644 2021/28xxx/CVE-2021-28164.json create mode 100644 2021/28xxx/CVE-2021-28165.json create mode 100644 2021/28xxx/CVE-2021-28166.json create mode 100644 2021/28xxx/CVE-2021-28167.json create mode 100644 2021/28xxx/CVE-2021-28168.json create mode 100644 2021/28xxx/CVE-2021-28169.json create mode 100644 2021/28xxx/CVE-2021-28170.json diff --git a/2020/36xxx/CVE-2020-36281.json b/2020/36xxx/CVE-2020-36281.json index 6d75bf600da..87e804e4282 100644 --- a/2020/36xxx/CVE-2020-36281.json +++ b/2020/36xxx/CVE-2020-36281.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36281", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36281", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Leptonica before 1.80.0 allows a heap-based buffer over-read in pixFewColorsOctcubeQuantMixed in colorquant1.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0" + }, + { + "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140" + }, + { + "url": "https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5", + "refsource": "MISC", + "name": "https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5" } ] } diff --git a/2020/36xxx/CVE-2020-36282.json b/2020/36xxx/CVE-2020-36282.json new file mode 100644 index 00000000000..49b67dce86a --- /dev/null +++ b/2020/36xxx/CVE-2020-36282.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-36282", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://medium.com/@ramon93i7/a99645d0448b", + "refsource": "MISC", + "name": "https://medium.com/@ramon93i7/a99645d0448b" + }, + { + "url": "https://github.com/rabbitmq/rabbitmq-jms-client/issues/135", + "refsource": "MISC", + "name": "https://github.com/rabbitmq/rabbitmq-jms-client/issues/135" + }, + { + "url": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2", + "refsource": "MISC", + "name": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2" + }, + { + "url": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0", + "refsource": "MISC", + "name": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28157.json b/2021/28xxx/CVE-2021-28157.json new file mode 100644 index 00000000000..4cefcbe1da8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28158.json b/2021/28xxx/CVE-2021-28158.json new file mode 100644 index 00000000000..fce46b9b8a5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28159.json b/2021/28xxx/CVE-2021-28159.json new file mode 100644 index 00000000000..2dbba06481d --- /dev/null +++ b/2021/28xxx/CVE-2021-28159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28160.json b/2021/28xxx/CVE-2021-28160.json new file mode 100644 index 00000000000..6ccd1e9f695 --- /dev/null +++ b/2021/28xxx/CVE-2021-28160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28161.json b/2021/28xxx/CVE-2021-28161.json new file mode 100644 index 00000000000..6e1dcc0ce81 --- /dev/null +++ b/2021/28xxx/CVE-2021-28161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28162.json b/2021/28xxx/CVE-2021-28162.json new file mode 100644 index 00000000000..d01c9985692 --- /dev/null +++ b/2021/28xxx/CVE-2021-28162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28163.json b/2021/28xxx/CVE-2021-28163.json new file mode 100644 index 00000000000..a292a38e67f --- /dev/null +++ b/2021/28xxx/CVE-2021-28163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28164.json b/2021/28xxx/CVE-2021-28164.json new file mode 100644 index 00000000000..da354877331 --- /dev/null +++ b/2021/28xxx/CVE-2021-28164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28165.json b/2021/28xxx/CVE-2021-28165.json new file mode 100644 index 00000000000..e5f43adfe7e --- /dev/null +++ b/2021/28xxx/CVE-2021-28165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28166.json b/2021/28xxx/CVE-2021-28166.json new file mode 100644 index 00000000000..ef16d151c6a --- /dev/null +++ b/2021/28xxx/CVE-2021-28166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28167.json b/2021/28xxx/CVE-2021-28167.json new file mode 100644 index 00000000000..09b483c4e30 --- /dev/null +++ b/2021/28xxx/CVE-2021-28167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28168.json b/2021/28xxx/CVE-2021-28168.json new file mode 100644 index 00000000000..8135d003543 --- /dev/null +++ b/2021/28xxx/CVE-2021-28168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28169.json b/2021/28xxx/CVE-2021-28169.json new file mode 100644 index 00000000000..98cadc6fb74 --- /dev/null +++ b/2021/28xxx/CVE-2021-28169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28170.json b/2021/28xxx/CVE-2021-28170.json new file mode 100644 index 00000000000..220aa3b5a7e --- /dev/null +++ b/2021/28xxx/CVE-2021-28170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From db8ca3a75035c925bdd05b679efdbc939a1d60c2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 02:00:40 +0000 Subject: [PATCH 286/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20674.json | 11 ++++++++--- 2021/21xxx/CVE-2021-21300.json | 5 +++++ 2021/22xxx/CVE-2021-22883.json | 10 ++++++++++ 2021/22xxx/CVE-2021-22884.json | 10 ++++++++++ 2021/23xxx/CVE-2021-23336.json | 10 ++++++++++ 2021/28xxx/CVE-2021-28171.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28172.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28173.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28174.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28175.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28176.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28177.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28178.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28179.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28180.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28181.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28182.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28183.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28184.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28185.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28186.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28187.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28188.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28189.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28190.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28191.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28192.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28193.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28194.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28195.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28196.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28197.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28198.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28199.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28200.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28201.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28202.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28203.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28204.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28205.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28206.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28207.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28208.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28209.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28210.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28211.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28212.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28213.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28214.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28215.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28216.json | 18 ++++++++++++++++++ 2021/3xxx/CVE-2021-3420.json | 10 ++++++++++ 2021/3xxx/CVE-2021-3437.json | 18 ++++++++++++++++++ 2021/3xxx/CVE-2021-3438.json | 18 ++++++++++++++++++ 2021/3xxx/CVE-2021-3439.json | 18 ++++++++++++++++++ 2021/3xxx/CVE-2021-3440.json | 18 ++++++++++++++++++ 2021/3xxx/CVE-2021-3441.json | 18 ++++++++++++++++++ 57 files changed, 971 insertions(+), 3 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28171.json create mode 100644 2021/28xxx/CVE-2021-28172.json create mode 100644 2021/28xxx/CVE-2021-28173.json create mode 100644 2021/28xxx/CVE-2021-28174.json create mode 100644 2021/28xxx/CVE-2021-28175.json create mode 100644 2021/28xxx/CVE-2021-28176.json create mode 100644 2021/28xxx/CVE-2021-28177.json create mode 100644 2021/28xxx/CVE-2021-28178.json create mode 100644 2021/28xxx/CVE-2021-28179.json create mode 100644 2021/28xxx/CVE-2021-28180.json create mode 100644 2021/28xxx/CVE-2021-28181.json create mode 100644 2021/28xxx/CVE-2021-28182.json create mode 100644 2021/28xxx/CVE-2021-28183.json create mode 100644 2021/28xxx/CVE-2021-28184.json create mode 100644 2021/28xxx/CVE-2021-28185.json create mode 100644 2021/28xxx/CVE-2021-28186.json create mode 100644 2021/28xxx/CVE-2021-28187.json create mode 100644 2021/28xxx/CVE-2021-28188.json create mode 100644 2021/28xxx/CVE-2021-28189.json create mode 100644 2021/28xxx/CVE-2021-28190.json create mode 100644 2021/28xxx/CVE-2021-28191.json create mode 100644 2021/28xxx/CVE-2021-28192.json create mode 100644 2021/28xxx/CVE-2021-28193.json create mode 100644 2021/28xxx/CVE-2021-28194.json create mode 100644 2021/28xxx/CVE-2021-28195.json create mode 100644 2021/28xxx/CVE-2021-28196.json create mode 100644 2021/28xxx/CVE-2021-28197.json create mode 100644 2021/28xxx/CVE-2021-28198.json create mode 100644 2021/28xxx/CVE-2021-28199.json create mode 100644 2021/28xxx/CVE-2021-28200.json create mode 100644 2021/28xxx/CVE-2021-28201.json create mode 100644 2021/28xxx/CVE-2021-28202.json create mode 100644 2021/28xxx/CVE-2021-28203.json create mode 100644 2021/28xxx/CVE-2021-28204.json create mode 100644 2021/28xxx/CVE-2021-28205.json create mode 100644 2021/28xxx/CVE-2021-28206.json create mode 100644 2021/28xxx/CVE-2021-28207.json create mode 100644 2021/28xxx/CVE-2021-28208.json create mode 100644 2021/28xxx/CVE-2021-28209.json create mode 100644 2021/28xxx/CVE-2021-28210.json create mode 100644 2021/28xxx/CVE-2021-28211.json create mode 100644 2021/28xxx/CVE-2021-28212.json create mode 100644 2021/28xxx/CVE-2021-28213.json create mode 100644 2021/28xxx/CVE-2021-28214.json create mode 100644 2021/28xxx/CVE-2021-28215.json create mode 100644 2021/28xxx/CVE-2021-28216.json create mode 100644 2021/3xxx/CVE-2021-3437.json create mode 100644 2021/3xxx/CVE-2021-3438.json create mode 100644 2021/3xxx/CVE-2021-3439.json create mode 100644 2021/3xxx/CVE-2021-3440.json create mode 100644 2021/3xxx/CVE-2021-3441.json diff --git a/2021/20xxx/CVE-2021-20674.json b/2021/20xxx/CVE-2021-20674.json index f0d751f7574..33cf1f0fd2b 100644 --- a/2021/20xxx/CVE-2021-20674.json +++ b/2021/20xxx/CVE-2021-20674.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20674", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.magicconnect.net/information/202103110900-2" + "url": "https://www.magicconnect.net/information/202103110900-2", + "refsource": "MISC", + "name": "https://www.magicconnect.net/information/202103110900-2" }, { - "url": "https://jvn.jp/en/jp/JVN18056666/index.html" + "url": "https://jvn.jp/en/jp/JVN18056666/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18056666/index.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21300.json b/2021/21xxx/CVE-2021-21300.json index d5eb9417727..6bff58528b7 100644 --- a/2021/21xxx/CVE-2021-21300.json +++ b/2021/21xxx/CVE-2021-21300.json @@ -137,6 +137,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210309 git: malicious repositories can execute remote code while cloning", "url": "http://www.openwall.com/lists/oss-security/2021/03/09/3" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-63fcbd126e", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/" } ] }, diff --git a/2021/22xxx/CVE-2021-22883.json b/2021/22xxx/CVE-2021-22883.json index 2cf8e4ebc5c..c48f7905cec 100644 --- a/2021/22xxx/CVE-2021-22883.json +++ b/2021/22xxx/CVE-2021-22883.json @@ -53,6 +53,16 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1043360", "url": "https://hackerone.com/reports/1043360" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-a760169c3c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f6bd75e9d4", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" } ] }, diff --git a/2021/22xxx/CVE-2021-22884.json b/2021/22xxx/CVE-2021-22884.json index cc788ae965e..f7c89740cc4 100644 --- a/2021/22xxx/CVE-2021-22884.json +++ b/2021/22xxx/CVE-2021-22884.json @@ -58,6 +58,16 @@ "refsource": "MISC", "name": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-a760169c3c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f6bd75e9d4", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" } ] }, diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index bb70f9c1981..23753f80f4c 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -139,6 +139,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-b1843407ca", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-2897f5366c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b326fcb83f", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/" } ] }, diff --git a/2021/28xxx/CVE-2021-28171.json b/2021/28xxx/CVE-2021-28171.json new file mode 100644 index 00000000000..2fd6514259a --- /dev/null +++ b/2021/28xxx/CVE-2021-28171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28172.json b/2021/28xxx/CVE-2021-28172.json new file mode 100644 index 00000000000..57fa1e47e3f --- /dev/null +++ b/2021/28xxx/CVE-2021-28172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28173.json b/2021/28xxx/CVE-2021-28173.json new file mode 100644 index 00000000000..c278e67993d --- /dev/null +++ b/2021/28xxx/CVE-2021-28173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28174.json b/2021/28xxx/CVE-2021-28174.json new file mode 100644 index 00000000000..1c6fbb23e8b --- /dev/null +++ b/2021/28xxx/CVE-2021-28174.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28174", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28175.json b/2021/28xxx/CVE-2021-28175.json new file mode 100644 index 00000000000..61f616a9433 --- /dev/null +++ b/2021/28xxx/CVE-2021-28175.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28175", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28176.json b/2021/28xxx/CVE-2021-28176.json new file mode 100644 index 00000000000..9333a097c96 --- /dev/null +++ b/2021/28xxx/CVE-2021-28176.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28176", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28177.json b/2021/28xxx/CVE-2021-28177.json new file mode 100644 index 00000000000..c4d29602038 --- /dev/null +++ b/2021/28xxx/CVE-2021-28177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28178.json b/2021/28xxx/CVE-2021-28178.json new file mode 100644 index 00000000000..17f5e167328 --- /dev/null +++ b/2021/28xxx/CVE-2021-28178.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28178", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28179.json b/2021/28xxx/CVE-2021-28179.json new file mode 100644 index 00000000000..398b5087e54 --- /dev/null +++ b/2021/28xxx/CVE-2021-28179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28180.json b/2021/28xxx/CVE-2021-28180.json new file mode 100644 index 00000000000..83f5607f567 --- /dev/null +++ b/2021/28xxx/CVE-2021-28180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28181.json b/2021/28xxx/CVE-2021-28181.json new file mode 100644 index 00000000000..c02ec283c59 --- /dev/null +++ b/2021/28xxx/CVE-2021-28181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28182.json b/2021/28xxx/CVE-2021-28182.json new file mode 100644 index 00000000000..68ae11c399a --- /dev/null +++ b/2021/28xxx/CVE-2021-28182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28183.json b/2021/28xxx/CVE-2021-28183.json new file mode 100644 index 00000000000..8319350bc5a --- /dev/null +++ b/2021/28xxx/CVE-2021-28183.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28183", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28184.json b/2021/28xxx/CVE-2021-28184.json new file mode 100644 index 00000000000..c1b227023f9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28184.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28184", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28185.json b/2021/28xxx/CVE-2021-28185.json new file mode 100644 index 00000000000..afca36eb31d --- /dev/null +++ b/2021/28xxx/CVE-2021-28185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28186.json b/2021/28xxx/CVE-2021-28186.json new file mode 100644 index 00000000000..9323d36b84c --- /dev/null +++ b/2021/28xxx/CVE-2021-28186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28187.json b/2021/28xxx/CVE-2021-28187.json new file mode 100644 index 00000000000..bf29b03c196 --- /dev/null +++ b/2021/28xxx/CVE-2021-28187.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28187", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28188.json b/2021/28xxx/CVE-2021-28188.json new file mode 100644 index 00000000000..126c4878e77 --- /dev/null +++ b/2021/28xxx/CVE-2021-28188.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28188", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28189.json b/2021/28xxx/CVE-2021-28189.json new file mode 100644 index 00000000000..7ffb49e7823 --- /dev/null +++ b/2021/28xxx/CVE-2021-28189.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28189", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28190.json b/2021/28xxx/CVE-2021-28190.json new file mode 100644 index 00000000000..10946bde187 --- /dev/null +++ b/2021/28xxx/CVE-2021-28190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28191.json b/2021/28xxx/CVE-2021-28191.json new file mode 100644 index 00000000000..2c6bdce8509 --- /dev/null +++ b/2021/28xxx/CVE-2021-28191.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28191", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28192.json b/2021/28xxx/CVE-2021-28192.json new file mode 100644 index 00000000000..3ee8e367b82 --- /dev/null +++ b/2021/28xxx/CVE-2021-28192.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28192", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28193.json b/2021/28xxx/CVE-2021-28193.json new file mode 100644 index 00000000000..7b1fb8a862f --- /dev/null +++ b/2021/28xxx/CVE-2021-28193.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28193", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28194.json b/2021/28xxx/CVE-2021-28194.json new file mode 100644 index 00000000000..9ac3e5bb3e5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28194.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28194", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28195.json b/2021/28xxx/CVE-2021-28195.json new file mode 100644 index 00000000000..2cf49c65009 --- /dev/null +++ b/2021/28xxx/CVE-2021-28195.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28195", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28196.json b/2021/28xxx/CVE-2021-28196.json new file mode 100644 index 00000000000..9ba0eb3f1dc --- /dev/null +++ b/2021/28xxx/CVE-2021-28196.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28196", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28197.json b/2021/28xxx/CVE-2021-28197.json new file mode 100644 index 00000000000..f370994a790 --- /dev/null +++ b/2021/28xxx/CVE-2021-28197.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28197", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28198.json b/2021/28xxx/CVE-2021-28198.json new file mode 100644 index 00000000000..befa0eb957f --- /dev/null +++ b/2021/28xxx/CVE-2021-28198.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28198", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28199.json b/2021/28xxx/CVE-2021-28199.json new file mode 100644 index 00000000000..3bd696e4c7a --- /dev/null +++ b/2021/28xxx/CVE-2021-28199.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28199", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28200.json b/2021/28xxx/CVE-2021-28200.json new file mode 100644 index 00000000000..79bb8fa43f7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28200.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28200", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28201.json b/2021/28xxx/CVE-2021-28201.json new file mode 100644 index 00000000000..3e02026d173 --- /dev/null +++ b/2021/28xxx/CVE-2021-28201.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28201", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28202.json b/2021/28xxx/CVE-2021-28202.json new file mode 100644 index 00000000000..6d15fdd847c --- /dev/null +++ b/2021/28xxx/CVE-2021-28202.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28202", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28203.json b/2021/28xxx/CVE-2021-28203.json new file mode 100644 index 00000000000..ad485c5c77b --- /dev/null +++ b/2021/28xxx/CVE-2021-28203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28204.json b/2021/28xxx/CVE-2021-28204.json new file mode 100644 index 00000000000..90bbee49b5a --- /dev/null +++ b/2021/28xxx/CVE-2021-28204.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28204", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28205.json b/2021/28xxx/CVE-2021-28205.json new file mode 100644 index 00000000000..39dc5433fa7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28206.json b/2021/28xxx/CVE-2021-28206.json new file mode 100644 index 00000000000..60fd1c75a2e --- /dev/null +++ b/2021/28xxx/CVE-2021-28206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28207.json b/2021/28xxx/CVE-2021-28207.json new file mode 100644 index 00000000000..ad68d0b8a40 --- /dev/null +++ b/2021/28xxx/CVE-2021-28207.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28207", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28208.json b/2021/28xxx/CVE-2021-28208.json new file mode 100644 index 00000000000..2123237af3a --- /dev/null +++ b/2021/28xxx/CVE-2021-28208.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28208", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28209.json b/2021/28xxx/CVE-2021-28209.json new file mode 100644 index 00000000000..63bef6527c3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28209.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28209", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28210.json b/2021/28xxx/CVE-2021-28210.json new file mode 100644 index 00000000000..98b1e94a4cc --- /dev/null +++ b/2021/28xxx/CVE-2021-28210.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28210", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28211.json b/2021/28xxx/CVE-2021-28211.json new file mode 100644 index 00000000000..f26e7991ce8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28211.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28211", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28212.json b/2021/28xxx/CVE-2021-28212.json new file mode 100644 index 00000000000..33ee6f7997e --- /dev/null +++ b/2021/28xxx/CVE-2021-28212.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28212", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28213.json b/2021/28xxx/CVE-2021-28213.json new file mode 100644 index 00000000000..6ea33fe1d01 --- /dev/null +++ b/2021/28xxx/CVE-2021-28213.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28213", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28214.json b/2021/28xxx/CVE-2021-28214.json new file mode 100644 index 00000000000..eff59583d8a --- /dev/null +++ b/2021/28xxx/CVE-2021-28214.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28214", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28215.json b/2021/28xxx/CVE-2021-28215.json new file mode 100644 index 00000000000..ac8b7ec30de --- /dev/null +++ b/2021/28xxx/CVE-2021-28215.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28215", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28216.json b/2021/28xxx/CVE-2021-28216.json new file mode 100644 index 00000000000..c7627039064 --- /dev/null +++ b/2021/28xxx/CVE-2021-28216.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28216", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3420.json b/2021/3xxx/CVE-2021-3420.json index bbb49ae954c..193d49638d7 100644 --- a/2021/3xxx/CVE-2021-3420.json +++ b/2021/3xxx/CVE-2021-3420.json @@ -48,6 +48,16 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1934088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934088" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-332fb9c796", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEBF6YHWFNCBW5A2ENSQ3Z56ELF4MTRE/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-267c08cc40", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSQZEUANAWBBAOC4TF5PTPJVLMUR7SFD/" } ] }, diff --git a/2021/3xxx/CVE-2021-3437.json b/2021/3xxx/CVE-2021-3437.json new file mode 100644 index 00000000000..22219b5ee7c --- /dev/null +++ b/2021/3xxx/CVE-2021-3437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3438.json b/2021/3xxx/CVE-2021-3438.json new file mode 100644 index 00000000000..bcfb4882aed --- /dev/null +++ b/2021/3xxx/CVE-2021-3438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3439.json b/2021/3xxx/CVE-2021-3439.json new file mode 100644 index 00000000000..6dc79bf21f4 --- /dev/null +++ b/2021/3xxx/CVE-2021-3439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3440.json b/2021/3xxx/CVE-2021-3440.json new file mode 100644 index 00000000000..a0e27bb61e8 --- /dev/null +++ b/2021/3xxx/CVE-2021-3440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3441.json b/2021/3xxx/CVE-2021-3441.json new file mode 100644 index 00000000000..147939c0a4d --- /dev/null +++ b/2021/3xxx/CVE-2021-3441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From ff0c97b13293a988879e2bb364eae3d03b3b8fcb Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Fri, 12 Mar 2021 06:01:35 +0000 Subject: [PATCH 287/845] Add CVE-2021-26569 --- 2021/26xxx/CVE-2021-26569.json | 58 ++++++++++++++++++++++++++++++++-- 1 file changed, 55 insertions(+), 3 deletions(-) diff --git a/2021/26xxx/CVE-2021-26569.json b/2021/26xxx/CVE-2021-26569.json index 4163590fdb2..f16274b751f 100644 --- a/2021/26xxx/CVE-2021-26569.json +++ b/2021/26xxx/CVE-2021-26569.json @@ -3,15 +3,67 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "STATE": "PUBLIC", "ID": "CVE-2021-26569", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@synology.com", + "DATE_PUBLIC": "2021-03-12T06:01:35.532754" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "affected": "<", + "version_value": "6.2.3-25426-3" + } + ] + }, + "product_name": "Synology DiskStation Manager (DSM)" + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." + } + ] + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "baseScore": "9.8" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-366: Race Condition within a Thread" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.synology.com/security/advisory/Synology_SA_20_26", + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_26" } ] } From 28586e96eaec59059956f1e910144ad966b020ac Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Fri, 12 Mar 2021 06:01:55 +0000 Subject: [PATCH 288/845] Add CVE-2021-27646 --- 2021/27xxx/CVE-2021-27646.json | 58 ++++++++++++++++++++++++++++++++-- 1 file changed, 55 insertions(+), 3 deletions(-) diff --git a/2021/27xxx/CVE-2021-27646.json b/2021/27xxx/CVE-2021-27646.json index c6f8525d1aa..5b4eb4d426e 100644 --- a/2021/27xxx/CVE-2021-27646.json +++ b/2021/27xxx/CVE-2021-27646.json @@ -3,15 +3,67 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "STATE": "PUBLIC", "ID": "CVE-2021-27646", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@synology.com", + "DATE_PUBLIC": "2021-03-12T06:01:55.451382" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "affected": "<", + "version_value": "6.2.3-25426-3" + } + ] + }, + "product_name": "Synology DiskStation Manager (DSM)" + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use After Free vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." + } + ] + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "baseScore": "9.8" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416: Use After Free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.synology.com/security/advisory/Synology_SA_20_26", + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_26" } ] } From d68e6df3742c8a126ef2a4e5ff45740c95e93fc4 Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Fri, 12 Mar 2021 06:02:06 +0000 Subject: [PATCH 289/845] Add CVE-2021-27647 --- 2021/27xxx/CVE-2021-27647.json | 58 ++++++++++++++++++++++++++++++++-- 1 file changed, 55 insertions(+), 3 deletions(-) diff --git a/2021/27xxx/CVE-2021-27647.json b/2021/27xxx/CVE-2021-27647.json index e50020232a7..6062519798e 100644 --- a/2021/27xxx/CVE-2021-27647.json +++ b/2021/27xxx/CVE-2021-27647.json @@ -3,15 +3,67 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "STATE": "PUBLIC", "ID": "CVE-2021-27647", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@synology.com", + "DATE_PUBLIC": "2021-03-12T06:02:06.522873" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "affected": "<", + "version_value": "6.2.3-25426-3" + } + ] + }, + "product_name": "Synology DiskStation Manager (DSM)" + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Out-of-bounds Read vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." + } + ] + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "baseScore": "9.8" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.synology.com/security/advisory/Synology_SA_20_26", + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_26" } ] } From e54f95bdea3326bcdf324afd58a9a5e8f40e108d Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Fri, 12 Mar 2021 14:35:03 +0800 Subject: [PATCH 290/845] Update CVE-2021-27647 Fix missing vendor_name --- 2021/27xxx/CVE-2021-27647.json | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/2021/27xxx/CVE-2021-27647.json b/2021/27xxx/CVE-2021-27647.json index 6062519798e..5cc0025aa38 100644 --- a/2021/27xxx/CVE-2021-27647.json +++ b/2021/27xxx/CVE-2021-27647.json @@ -26,7 +26,8 @@ "product_name": "Synology DiskStation Manager (DSM)" } ] - } + }, + "vendor_name": "Synology" } ] } @@ -67,4 +68,4 @@ } ] } -} \ No newline at end of file +} From ecd71e396018e4867258510e9b96e2372d1e2133 Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Fri, 12 Mar 2021 14:37:57 +0800 Subject: [PATCH 291/845] Update CVE-2021-26569.json Fix missing vendor_name --- 2021/26xxx/CVE-2021-26569.json | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/2021/26xxx/CVE-2021-26569.json b/2021/26xxx/CVE-2021-26569.json index f16274b751f..4618290bd47 100644 --- a/2021/26xxx/CVE-2021-26569.json +++ b/2021/26xxx/CVE-2021-26569.json @@ -26,8 +26,9 @@ "product_name": "Synology DiskStation Manager (DSM)" } ] - } - } + }, + "vendor_name": "Synology" + } ] } }, @@ -67,4 +68,4 @@ } ] } -} \ No newline at end of file +} From a8341c0ce138f1803cada9c70dc4ce83c51d0877 Mon Sep 17 00:00:00 2001 From: SynologyCVE Date: Fri, 12 Mar 2021 14:40:24 +0800 Subject: [PATCH 292/845] Update CVE-2021-27646.json Fix Missing vendor_name --- 2021/27xxx/CVE-2021-27646.json | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/2021/27xxx/CVE-2021-27646.json b/2021/27xxx/CVE-2021-27646.json index 5b4eb4d426e..6ba2a5dc184 100644 --- a/2021/27xxx/CVE-2021-27646.json +++ b/2021/27xxx/CVE-2021-27646.json @@ -26,7 +26,8 @@ "product_name": "Synology DiskStation Manager (DSM)" } ] - } + }, + "vendor_name": "Synology" } ] } @@ -67,4 +68,4 @@ } ] } -} \ No newline at end of file +} From e5b311053e33c479fae2514c93511d72d371fcb3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 08:00:42 +0000 Subject: [PATCH 293/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 2021/28xxx/CVE-2021-28217.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28218.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28219.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28220.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28221.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28222.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28223.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28224.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28225.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28226.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28227.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28228.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28229.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28230.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28231.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28232.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28233.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28234.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28235.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28236.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28237.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28238.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28239.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28240.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28241.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28242.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28243.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28244.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28245.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28246.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28247.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28248.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28249.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28250.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28251.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28252.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28253.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28254.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28255.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28256.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28257.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28258.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28259.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28260.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28261.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28262.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28263.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28264.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28265.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28266.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28267.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28268.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28269.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28270.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28271.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28272.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28273.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28274.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28275.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28276.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28277.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28278.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28279.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28280.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28281.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28282.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28283.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28284.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28285.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28286.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28287.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28288.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28289.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28290.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28291.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28292.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28293.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28294.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28295.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28296.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28297.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28298.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28299.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28300.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28301.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28302.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28303.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28304.json | 18 ++++++++++++++++++ 89 files changed, 1589 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28217.json create mode 100644 2021/28xxx/CVE-2021-28218.json create mode 100644 2021/28xxx/CVE-2021-28219.json create mode 100644 2021/28xxx/CVE-2021-28220.json create mode 100644 2021/28xxx/CVE-2021-28221.json create mode 100644 2021/28xxx/CVE-2021-28222.json create mode 100644 2021/28xxx/CVE-2021-28223.json create mode 100644 2021/28xxx/CVE-2021-28224.json create mode 100644 2021/28xxx/CVE-2021-28225.json create mode 100644 2021/28xxx/CVE-2021-28226.json create mode 100644 2021/28xxx/CVE-2021-28227.json create mode 100644 2021/28xxx/CVE-2021-28228.json create mode 100644 2021/28xxx/CVE-2021-28229.json create mode 100644 2021/28xxx/CVE-2021-28230.json create mode 100644 2021/28xxx/CVE-2021-28231.json create mode 100644 2021/28xxx/CVE-2021-28232.json create mode 100644 2021/28xxx/CVE-2021-28233.json create mode 100644 2021/28xxx/CVE-2021-28234.json create mode 100644 2021/28xxx/CVE-2021-28235.json create mode 100644 2021/28xxx/CVE-2021-28236.json create mode 100644 2021/28xxx/CVE-2021-28237.json create mode 100644 2021/28xxx/CVE-2021-28238.json create mode 100644 2021/28xxx/CVE-2021-28239.json create mode 100644 2021/28xxx/CVE-2021-28240.json create mode 100644 2021/28xxx/CVE-2021-28241.json create mode 100644 2021/28xxx/CVE-2021-28242.json create mode 100644 2021/28xxx/CVE-2021-28243.json create mode 100644 2021/28xxx/CVE-2021-28244.json create mode 100644 2021/28xxx/CVE-2021-28245.json create mode 100644 2021/28xxx/CVE-2021-28246.json create mode 100644 2021/28xxx/CVE-2021-28247.json create mode 100644 2021/28xxx/CVE-2021-28248.json create mode 100644 2021/28xxx/CVE-2021-28249.json create mode 100644 2021/28xxx/CVE-2021-28250.json create mode 100644 2021/28xxx/CVE-2021-28251.json create mode 100644 2021/28xxx/CVE-2021-28252.json create mode 100644 2021/28xxx/CVE-2021-28253.json create mode 100644 2021/28xxx/CVE-2021-28254.json create mode 100644 2021/28xxx/CVE-2021-28255.json create mode 100644 2021/28xxx/CVE-2021-28256.json create mode 100644 2021/28xxx/CVE-2021-28257.json create mode 100644 2021/28xxx/CVE-2021-28258.json create mode 100644 2021/28xxx/CVE-2021-28259.json create mode 100644 2021/28xxx/CVE-2021-28260.json create mode 100644 2021/28xxx/CVE-2021-28261.json create mode 100644 2021/28xxx/CVE-2021-28262.json create mode 100644 2021/28xxx/CVE-2021-28263.json create mode 100644 2021/28xxx/CVE-2021-28264.json create mode 100644 2021/28xxx/CVE-2021-28265.json create mode 100644 2021/28xxx/CVE-2021-28266.json create mode 100644 2021/28xxx/CVE-2021-28267.json create mode 100644 2021/28xxx/CVE-2021-28268.json create mode 100644 2021/28xxx/CVE-2021-28269.json create mode 100644 2021/28xxx/CVE-2021-28270.json create mode 100644 2021/28xxx/CVE-2021-28271.json create mode 100644 2021/28xxx/CVE-2021-28272.json create mode 100644 2021/28xxx/CVE-2021-28273.json create mode 100644 2021/28xxx/CVE-2021-28274.json create mode 100644 2021/28xxx/CVE-2021-28275.json create mode 100644 2021/28xxx/CVE-2021-28276.json create mode 100644 2021/28xxx/CVE-2021-28277.json create mode 100644 2021/28xxx/CVE-2021-28278.json create mode 100644 2021/28xxx/CVE-2021-28279.json create mode 100644 2021/28xxx/CVE-2021-28280.json create mode 100644 2021/28xxx/CVE-2021-28281.json create mode 100644 2021/28xxx/CVE-2021-28282.json create mode 100644 2021/28xxx/CVE-2021-28283.json create mode 100644 2021/28xxx/CVE-2021-28284.json create mode 100644 2021/28xxx/CVE-2021-28285.json create mode 100644 2021/28xxx/CVE-2021-28286.json create mode 100644 2021/28xxx/CVE-2021-28287.json create mode 100644 2021/28xxx/CVE-2021-28288.json create mode 100644 2021/28xxx/CVE-2021-28289.json create mode 100644 2021/28xxx/CVE-2021-28290.json create mode 100644 2021/28xxx/CVE-2021-28291.json create mode 100644 2021/28xxx/CVE-2021-28292.json create mode 100644 2021/28xxx/CVE-2021-28293.json create mode 100644 2021/28xxx/CVE-2021-28294.json create mode 100644 2021/28xxx/CVE-2021-28295.json create mode 100644 2021/28xxx/CVE-2021-28296.json create mode 100644 2021/28xxx/CVE-2021-28297.json create mode 100644 2021/28xxx/CVE-2021-28298.json create mode 100644 2021/28xxx/CVE-2021-28299.json create mode 100644 2021/28xxx/CVE-2021-28300.json create mode 100644 2021/28xxx/CVE-2021-28301.json create mode 100644 2021/28xxx/CVE-2021-28302.json create mode 100644 2021/28xxx/CVE-2021-28303.json create mode 100644 2021/28xxx/CVE-2021-28304.json diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 75b9280bf27..c7f190f52d1 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -465,6 +465,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210311 [jira] [Assigned] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210312 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/28xxx/CVE-2021-28217.json b/2021/28xxx/CVE-2021-28217.json new file mode 100644 index 00000000000..e3d01653ea6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28217.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28217", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28218.json b/2021/28xxx/CVE-2021-28218.json new file mode 100644 index 00000000000..220d16051e7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28219.json b/2021/28xxx/CVE-2021-28219.json new file mode 100644 index 00000000000..c00e08aada5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28220.json b/2021/28xxx/CVE-2021-28220.json new file mode 100644 index 00000000000..bd005a8f6f8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28221.json b/2021/28xxx/CVE-2021-28221.json new file mode 100644 index 00000000000..baa3f5d031c --- /dev/null +++ b/2021/28xxx/CVE-2021-28221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28222.json b/2021/28xxx/CVE-2021-28222.json new file mode 100644 index 00000000000..96c23f5d808 --- /dev/null +++ b/2021/28xxx/CVE-2021-28222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28223.json b/2021/28xxx/CVE-2021-28223.json new file mode 100644 index 00000000000..84f440bd3e8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28223.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28223", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28224.json b/2021/28xxx/CVE-2021-28224.json new file mode 100644 index 00000000000..0af12928a5c --- /dev/null +++ b/2021/28xxx/CVE-2021-28224.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28224", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28225.json b/2021/28xxx/CVE-2021-28225.json new file mode 100644 index 00000000000..68f76a229ae --- /dev/null +++ b/2021/28xxx/CVE-2021-28225.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28225", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28226.json b/2021/28xxx/CVE-2021-28226.json new file mode 100644 index 00000000000..11ffb6e4e18 --- /dev/null +++ b/2021/28xxx/CVE-2021-28226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28227.json b/2021/28xxx/CVE-2021-28227.json new file mode 100644 index 00000000000..716e9203a5d --- /dev/null +++ b/2021/28xxx/CVE-2021-28227.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28227", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28228.json b/2021/28xxx/CVE-2021-28228.json new file mode 100644 index 00000000000..ef2a6081049 --- /dev/null +++ b/2021/28xxx/CVE-2021-28228.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28228", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28229.json b/2021/28xxx/CVE-2021-28229.json new file mode 100644 index 00000000000..9b1956b4d13 --- /dev/null +++ b/2021/28xxx/CVE-2021-28229.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28229", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28230.json b/2021/28xxx/CVE-2021-28230.json new file mode 100644 index 00000000000..21833967115 --- /dev/null +++ b/2021/28xxx/CVE-2021-28230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28231.json b/2021/28xxx/CVE-2021-28231.json new file mode 100644 index 00000000000..98a3d252cbd --- /dev/null +++ b/2021/28xxx/CVE-2021-28231.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28231", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28232.json b/2021/28xxx/CVE-2021-28232.json new file mode 100644 index 00000000000..0cfc93df806 --- /dev/null +++ b/2021/28xxx/CVE-2021-28232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28233.json b/2021/28xxx/CVE-2021-28233.json new file mode 100644 index 00000000000..5f6b752df7f --- /dev/null +++ b/2021/28xxx/CVE-2021-28233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28234.json b/2021/28xxx/CVE-2021-28234.json new file mode 100644 index 00000000000..228b80c56f6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28235.json b/2021/28xxx/CVE-2021-28235.json new file mode 100644 index 00000000000..7bb5784fd90 --- /dev/null +++ b/2021/28xxx/CVE-2021-28235.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28235", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28236.json b/2021/28xxx/CVE-2021-28236.json new file mode 100644 index 00000000000..0b7585ef734 --- /dev/null +++ b/2021/28xxx/CVE-2021-28236.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28236", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28237.json b/2021/28xxx/CVE-2021-28237.json new file mode 100644 index 00000000000..5f5e3a0ae13 --- /dev/null +++ b/2021/28xxx/CVE-2021-28237.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28237", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28238.json b/2021/28xxx/CVE-2021-28238.json new file mode 100644 index 00000000000..f2ec782636e --- /dev/null +++ b/2021/28xxx/CVE-2021-28238.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28238", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28239.json b/2021/28xxx/CVE-2021-28239.json new file mode 100644 index 00000000000..f15f6fc0b87 --- /dev/null +++ b/2021/28xxx/CVE-2021-28239.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28239", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28240.json b/2021/28xxx/CVE-2021-28240.json new file mode 100644 index 00000000000..bbc1622a485 --- /dev/null +++ b/2021/28xxx/CVE-2021-28240.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28240", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28241.json b/2021/28xxx/CVE-2021-28241.json new file mode 100644 index 00000000000..4d354bb6074 --- /dev/null +++ b/2021/28xxx/CVE-2021-28241.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28241", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28242.json b/2021/28xxx/CVE-2021-28242.json new file mode 100644 index 00000000000..415cd403afc --- /dev/null +++ b/2021/28xxx/CVE-2021-28242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28243.json b/2021/28xxx/CVE-2021-28243.json new file mode 100644 index 00000000000..71b5b89031b --- /dev/null +++ b/2021/28xxx/CVE-2021-28243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28244.json b/2021/28xxx/CVE-2021-28244.json new file mode 100644 index 00000000000..97d4b1934e9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28245.json b/2021/28xxx/CVE-2021-28245.json new file mode 100644 index 00000000000..8c01e28f634 --- /dev/null +++ b/2021/28xxx/CVE-2021-28245.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28245", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28246.json b/2021/28xxx/CVE-2021-28246.json new file mode 100644 index 00000000000..08eec6a8930 --- /dev/null +++ b/2021/28xxx/CVE-2021-28246.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28246", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28247.json b/2021/28xxx/CVE-2021-28247.json new file mode 100644 index 00000000000..a41a8dc399c --- /dev/null +++ b/2021/28xxx/CVE-2021-28247.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28247", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28248.json b/2021/28xxx/CVE-2021-28248.json new file mode 100644 index 00000000000..cc07ba42765 --- /dev/null +++ b/2021/28xxx/CVE-2021-28248.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28248", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28249.json b/2021/28xxx/CVE-2021-28249.json new file mode 100644 index 00000000000..033da72fa5e --- /dev/null +++ b/2021/28xxx/CVE-2021-28249.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28249", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28250.json b/2021/28xxx/CVE-2021-28250.json new file mode 100644 index 00000000000..73c397e49bd --- /dev/null +++ b/2021/28xxx/CVE-2021-28250.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28250", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28251.json b/2021/28xxx/CVE-2021-28251.json new file mode 100644 index 00000000000..2493bd4037e --- /dev/null +++ b/2021/28xxx/CVE-2021-28251.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28251", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28252.json b/2021/28xxx/CVE-2021-28252.json new file mode 100644 index 00000000000..983ee8558ad --- /dev/null +++ b/2021/28xxx/CVE-2021-28252.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28252", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28253.json b/2021/28xxx/CVE-2021-28253.json new file mode 100644 index 00000000000..2cbf17de95a --- /dev/null +++ b/2021/28xxx/CVE-2021-28253.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28253", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28254.json b/2021/28xxx/CVE-2021-28254.json new file mode 100644 index 00000000000..57a25d391c6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28254.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28254", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28255.json b/2021/28xxx/CVE-2021-28255.json new file mode 100644 index 00000000000..33bc2439ff3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28255.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28255", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28256.json b/2021/28xxx/CVE-2021-28256.json new file mode 100644 index 00000000000..50aa9a4d27a --- /dev/null +++ b/2021/28xxx/CVE-2021-28256.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28256", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28257.json b/2021/28xxx/CVE-2021-28257.json new file mode 100644 index 00000000000..3295c3e606d --- /dev/null +++ b/2021/28xxx/CVE-2021-28257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28258.json b/2021/28xxx/CVE-2021-28258.json new file mode 100644 index 00000000000..5e758680e92 --- /dev/null +++ b/2021/28xxx/CVE-2021-28258.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28258", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28259.json b/2021/28xxx/CVE-2021-28259.json new file mode 100644 index 00000000000..822b07ec161 --- /dev/null +++ b/2021/28xxx/CVE-2021-28259.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28259", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28260.json b/2021/28xxx/CVE-2021-28260.json new file mode 100644 index 00000000000..2ad9c7bee02 --- /dev/null +++ b/2021/28xxx/CVE-2021-28260.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28260", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28261.json b/2021/28xxx/CVE-2021-28261.json new file mode 100644 index 00000000000..da58b02ab9b --- /dev/null +++ b/2021/28xxx/CVE-2021-28261.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28261", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28262.json b/2021/28xxx/CVE-2021-28262.json new file mode 100644 index 00000000000..725ad4a8703 --- /dev/null +++ b/2021/28xxx/CVE-2021-28262.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28262", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28263.json b/2021/28xxx/CVE-2021-28263.json new file mode 100644 index 00000000000..28dbe8354cb --- /dev/null +++ b/2021/28xxx/CVE-2021-28263.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28263", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28264.json b/2021/28xxx/CVE-2021-28264.json new file mode 100644 index 00000000000..0fb449a791a --- /dev/null +++ b/2021/28xxx/CVE-2021-28264.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28264", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28265.json b/2021/28xxx/CVE-2021-28265.json new file mode 100644 index 00000000000..c8922f9fa51 --- /dev/null +++ b/2021/28xxx/CVE-2021-28265.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28265", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28266.json b/2021/28xxx/CVE-2021-28266.json new file mode 100644 index 00000000000..aae2c31838a --- /dev/null +++ b/2021/28xxx/CVE-2021-28266.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28266", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28267.json b/2021/28xxx/CVE-2021-28267.json new file mode 100644 index 00000000000..a32cb86a4f4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28267.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28267", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28268.json b/2021/28xxx/CVE-2021-28268.json new file mode 100644 index 00000000000..e065ce1dfe4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28268.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28268", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28269.json b/2021/28xxx/CVE-2021-28269.json new file mode 100644 index 00000000000..c6912298eb8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28269.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28269", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28270.json b/2021/28xxx/CVE-2021-28270.json new file mode 100644 index 00000000000..780d609bdb0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28271.json b/2021/28xxx/CVE-2021-28271.json new file mode 100644 index 00000000000..eabc8fc357d --- /dev/null +++ b/2021/28xxx/CVE-2021-28271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28272.json b/2021/28xxx/CVE-2021-28272.json new file mode 100644 index 00000000000..0c83a886b86 --- /dev/null +++ b/2021/28xxx/CVE-2021-28272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28273.json b/2021/28xxx/CVE-2021-28273.json new file mode 100644 index 00000000000..7033e7ade92 --- /dev/null +++ b/2021/28xxx/CVE-2021-28273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28274.json b/2021/28xxx/CVE-2021-28274.json new file mode 100644 index 00000000000..2bea4e20e8c --- /dev/null +++ b/2021/28xxx/CVE-2021-28274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28275.json b/2021/28xxx/CVE-2021-28275.json new file mode 100644 index 00000000000..810edbe952c --- /dev/null +++ b/2021/28xxx/CVE-2021-28275.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28275", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28276.json b/2021/28xxx/CVE-2021-28276.json new file mode 100644 index 00000000000..f602c2062ee --- /dev/null +++ b/2021/28xxx/CVE-2021-28276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28277.json b/2021/28xxx/CVE-2021-28277.json new file mode 100644 index 00000000000..c644c07349a --- /dev/null +++ b/2021/28xxx/CVE-2021-28277.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28277", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28278.json b/2021/28xxx/CVE-2021-28278.json new file mode 100644 index 00000000000..2e53021fcc3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28278.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28278", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28279.json b/2021/28xxx/CVE-2021-28279.json new file mode 100644 index 00000000000..318116c683f --- /dev/null +++ b/2021/28xxx/CVE-2021-28279.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28279", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28280.json b/2021/28xxx/CVE-2021-28280.json new file mode 100644 index 00000000000..28deec1e6a6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28281.json b/2021/28xxx/CVE-2021-28281.json new file mode 100644 index 00000000000..757bd7c50ec --- /dev/null +++ b/2021/28xxx/CVE-2021-28281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28282.json b/2021/28xxx/CVE-2021-28282.json new file mode 100644 index 00000000000..abe20a386aa --- /dev/null +++ b/2021/28xxx/CVE-2021-28282.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28282", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28283.json b/2021/28xxx/CVE-2021-28283.json new file mode 100644 index 00000000000..e06db4073f0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28283.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28283", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28284.json b/2021/28xxx/CVE-2021-28284.json new file mode 100644 index 00000000000..b87da286542 --- /dev/null +++ b/2021/28xxx/CVE-2021-28284.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28284", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28285.json b/2021/28xxx/CVE-2021-28285.json new file mode 100644 index 00000000000..6560899b9d4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28286.json b/2021/28xxx/CVE-2021-28286.json new file mode 100644 index 00000000000..931c294a957 --- /dev/null +++ b/2021/28xxx/CVE-2021-28286.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28286", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28287.json b/2021/28xxx/CVE-2021-28287.json new file mode 100644 index 00000000000..1120b93d488 --- /dev/null +++ b/2021/28xxx/CVE-2021-28287.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28287", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28288.json b/2021/28xxx/CVE-2021-28288.json new file mode 100644 index 00000000000..0643879b3cd --- /dev/null +++ b/2021/28xxx/CVE-2021-28288.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28288", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28289.json b/2021/28xxx/CVE-2021-28289.json new file mode 100644 index 00000000000..515608d64a2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28289.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28289", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28290.json b/2021/28xxx/CVE-2021-28290.json new file mode 100644 index 00000000000..e0a0e913c51 --- /dev/null +++ b/2021/28xxx/CVE-2021-28290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28291.json b/2021/28xxx/CVE-2021-28291.json new file mode 100644 index 00000000000..96d6b7d4310 --- /dev/null +++ b/2021/28xxx/CVE-2021-28291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28292.json b/2021/28xxx/CVE-2021-28292.json new file mode 100644 index 00000000000..2fe0611b00b --- /dev/null +++ b/2021/28xxx/CVE-2021-28292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28293.json b/2021/28xxx/CVE-2021-28293.json new file mode 100644 index 00000000000..bb70aba3d20 --- /dev/null +++ b/2021/28xxx/CVE-2021-28293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28294.json b/2021/28xxx/CVE-2021-28294.json new file mode 100644 index 00000000000..293e6730245 --- /dev/null +++ b/2021/28xxx/CVE-2021-28294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28295.json b/2021/28xxx/CVE-2021-28295.json new file mode 100644 index 00000000000..04f14bb32d7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28296.json b/2021/28xxx/CVE-2021-28296.json new file mode 100644 index 00000000000..74bc4b2a394 --- /dev/null +++ b/2021/28xxx/CVE-2021-28296.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28296", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28297.json b/2021/28xxx/CVE-2021-28297.json new file mode 100644 index 00000000000..44996b0364f --- /dev/null +++ b/2021/28xxx/CVE-2021-28297.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28297", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28298.json b/2021/28xxx/CVE-2021-28298.json new file mode 100644 index 00000000000..a2437185307 --- /dev/null +++ b/2021/28xxx/CVE-2021-28298.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28298", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28299.json b/2021/28xxx/CVE-2021-28299.json new file mode 100644 index 00000000000..867329b9d6d --- /dev/null +++ b/2021/28xxx/CVE-2021-28299.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28299", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28300.json b/2021/28xxx/CVE-2021-28300.json new file mode 100644 index 00000000000..a205574e5eb --- /dev/null +++ b/2021/28xxx/CVE-2021-28300.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28300", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28301.json b/2021/28xxx/CVE-2021-28301.json new file mode 100644 index 00000000000..afb562549a6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28302.json b/2021/28xxx/CVE-2021-28302.json new file mode 100644 index 00000000000..06788e93391 --- /dev/null +++ b/2021/28xxx/CVE-2021-28302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28303.json b/2021/28xxx/CVE-2021-28303.json new file mode 100644 index 00000000000..97a10fc2928 --- /dev/null +++ b/2021/28xxx/CVE-2021-28303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28304.json b/2021/28xxx/CVE-2021-28304.json new file mode 100644 index 00000000000..89495f237e8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28304.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28304", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 7de1628607c7cd175cb4dbd4cdf1d79f72b6f135 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 09:00:39 +0000 Subject: [PATCH 294/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28305.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28306.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28307.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28308.json | 62 ++++++++++++++++++++++++++++++++++ 4 files changed, 248 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28305.json create mode 100644 2021/28xxx/CVE-2021-28306.json create mode 100644 2021/28xxx/CVE-2021-28307.json create mode 100644 2021/28xxx/CVE-2021-28308.json diff --git a/2021/28xxx/CVE-2021-28305.json b/2021/28xxx/CVE-2021-28305.json new file mode 100644 index 00000000000..a0f48aef1fd --- /dev/null +++ b/2021/28xxx/CVE-2021-28305.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28305", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the diesel crate before 1.4.6 for Rust. There is a use-after-free in the SQLite backend because the semantics of sqlite3_column_name are not followed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0037.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0037.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28306.json b/2021/28xxx/CVE-2021-28306.json new file mode 100644 index 00000000000..e526d12186c --- /dev/null +++ b/2021/28xxx/CVE-2021-28306.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28306", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the fltk crate before 0.15.3 for Rust. There is a NULL pointer dereference during attempted use of a multi label type if the image is nonexistent." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0038.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0038.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28307.json b/2021/28xxx/CVE-2021-28307.json new file mode 100644 index 00000000000..4877a15f64b --- /dev/null +++ b/2021/28xxx/CVE-2021-28307.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28307", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the fltk crate before 0.15.3 for Rust. There is a NULL pointer dereference during attempted use of a non-raster image for a window icon." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0038.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0038.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28308.json b/2021/28xxx/CVE-2021-28308.json new file mode 100644 index 00000000000..a6eb96d7509 --- /dev/null +++ b/2021/28xxx/CVE-2021-28308.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28308", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the fltk crate before 0.15.3 for Rust. There is an out-of bounds read because the pixmap constructor lacks pixmap input validation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0038.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0038.html" + } + ] + } +} \ No newline at end of file From 19a5cc58e3d80bbffcb48beae3444c3f8b712e00 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 12:00:41 +0000 Subject: [PATCH 295/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 887d1f093ff..1abb7ebd5fc 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -183,6 +183,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210311 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210312 [GitHub] [hbase] pankaj72981 commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E" } ] }, From 9caa5974f8ead80f89267f612d927f91494e2d4a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 13:00:46 +0000 Subject: [PATCH 296/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2020/14xxx/CVE-2020-14058.json | 5 +++++ 2020/14xxx/CVE-2020-14059.json | 5 +++++ 2020/15xxx/CVE-2020-15049.json | 5 +++++ 2020/15xxx/CVE-2020-15523.json | 5 +++++ 2020/17xxx/CVE-2020-17380.json | 5 +++++ 2020/28xxx/CVE-2020-28500.json | 5 +++++ 2020/35xxx/CVE-2020-35517.json | 5 +++++ 2020/7xxx/CVE-2020-7071.json | 5 +++++ 2021/21xxx/CVE-2021-21315.json | 5 +++++ 2021/21xxx/CVE-2021-21702.json | 5 +++++ 2021/23xxx/CVE-2021-23337.json | 5 +++++ 2021/26xxx/CVE-2021-26708.json | 5 +++++ 13 files changed, 65 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 1abb7ebd5fc..1daa5c51aa7 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -188,6 +188,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210312 [GitHub] [hbase] pankaj72981 commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210312 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/14xxx/CVE-2020-14058.json b/2020/14xxx/CVE-2020-14058.json index 4ac357a41c8..da6a6c32596 100644 --- a/2020/14xxx/CVE-2020-14058.json +++ b/2020/14xxx/CVE-2020-14058.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-cbebc5617e", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0001/" } ] } diff --git a/2020/14xxx/CVE-2020-14059.json b/2020/14xxx/CVE-2020-14059.json index f78a6071bcd..d7976bc8647 100644 --- a/2020/14xxx/CVE-2020-14059.json +++ b/2020/14xxx/CVE-2020-14059.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "http://www.squid-cache.org/Advisories/SQUID-2020_5.txt", "url": "http://www.squid-cache.org/Advisories/SQUID-2020_5.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0001/" } ] } diff --git a/2020/15xxx/CVE-2020-15049.json b/2020/15xxx/CVE-2020-15049.json index 09138ce03cc..06cd29cbc6f 100644 --- a/2020/15xxx/CVE-2020-15049.json +++ b/2020/15xxx/CVE-2020-15049.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0001/" } ] }, diff --git a/2020/15xxx/CVE-2020-15523.json b/2020/15xxx/CVE-2020-15523.json index 5f56ba87f97..09fd77e8eff 100644 --- a/2020/15xxx/CVE-2020-15523.json +++ b/2020/15xxx/CVE-2020-15523.json @@ -61,6 +61,11 @@ "url": "https://github.com/python/cpython/pull/21297", "refsource": "MISC", "name": "https://github.com/python/cpython/pull/21297" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0004/" } ] } diff --git a/2020/17xxx/CVE-2020-17380.json b/2020/17xxx/CVE-2020-17380.json index 941afa0c99a..0eba6f0fe9f 100644 --- a/2020/17xxx/CVE-2020-17380.json +++ b/2020/17xxx/CVE-2020-17380.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210309 CVE-2021-3409 QEMU: sdhci: incomplete fix for CVE-2020-17380/CVE-2020-25085", "url": "http://www.openwall.com/lists/oss-security/2021/03/09/1" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0003/" } ] } diff --git a/2020/28xxx/CVE-2020-28500.json b/2020/28xxx/CVE-2020-28500.json index efefd7256b6..01a663347d7 100644 --- a/2020/28xxx/CVE-2020-28500.json +++ b/2020/28xxx/CVE-2020-28500.json @@ -104,6 +104,11 @@ "refsource": "MISC", "url": "https://github.com/lodash/lodash/pull/5065", "name": "https://github.com/lodash/lodash/pull/5065" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0006/" } ] }, diff --git a/2020/35xxx/CVE-2020-35517.json b/2020/35xxx/CVE-2020-35517.json index ce1ba582d0c..c0913545ab7 100644 --- a/2020/35xxx/CVE-2020-35517.json +++ b/2020/35xxx/CVE-2020-35517.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://github.com/qemu/qemu/commit/ebf101955ce8f8d72fba103b5151115a4335de2c", "url": "https://github.com/qemu/qemu/commit/ebf101955ce8f8d72fba103b5151115a4335de2c" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0002/" } ] }, diff --git a/2020/7xxx/CVE-2020-7071.json b/2020/7xxx/CVE-2020-7071.json index 58cb6e2011a..bf8d66a5cfe 100644 --- a/2020/7xxx/CVE-2020-7071.json +++ b/2020/7xxx/CVE-2020-7071.json @@ -100,6 +100,11 @@ "refsource": "DEBIAN", "name": "DSA-4856", "url": "https://www.debian.org/security/2021/dsa-4856" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0005/" } ] }, diff --git a/2021/21xxx/CVE-2021-21315.json b/2021/21xxx/CVE-2021-21315.json index 9ecf1b3b70b..62a0f1e88cd 100644 --- a/2021/21xxx/CVE-2021-21315.json +++ b/2021/21xxx/CVE-2021-21315.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[cordova-issues] 20210224 [GitHub] [cordova-cli] iva2k opened a new issue #549: update systeminformation package to >=5.3.1", "url": "https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0007/" } ] }, diff --git a/2021/21xxx/CVE-2021-21702.json b/2021/21xxx/CVE-2021-21702.json index e47a1c706dc..b99c28d81cd 100644 --- a/2021/21xxx/CVE-2021-21702.json +++ b/2021/21xxx/CVE-2021-21702.json @@ -100,6 +100,11 @@ "refsource": "DEBIAN", "name": "DSA-4856", "url": "https://www.debian.org/security/2021/dsa-4856" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0005/" } ] }, diff --git a/2021/23xxx/CVE-2021-23337.json b/2021/23xxx/CVE-2021-23337.json index c7ba6a5a54b..0e314209086 100644 --- a/2021/23xxx/CVE-2021-23337.json +++ b/2021/23xxx/CVE-2021-23337.json @@ -99,6 +99,11 @@ "refsource": "MISC", "url": "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851", "name": "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0006/" } ] }, diff --git a/2021/26xxx/CVE-2021-26708.json b/2021/26xxx/CVE-2021-26708.json index 9a711d8a604..4de81e44a8e 100644 --- a/2021/26xxx/CVE-2021-26708.json +++ b/2021/26xxx/CVE-2021-26708.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation", "url": "http://www.openwall.com/lists/oss-security/2021/02/05/6" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210312-0008/", + "url": "https://security.netapp.com/advisory/ntap-20210312-0008/" } ] } From 0ab7c3d715c049a5966689279c81b05626aa3e23 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 14:00:43 +0000 Subject: [PATCH 297/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 2020/27xxx/CVE-2020-27223.json | 22 +++++++++++----------- 2021/23xxx/CVE-2021-23926.json | 5 +++++ 3 files changed, 21 insertions(+), 11 deletions(-) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 1daa5c51aa7..cf8a3a4a4bd 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -193,6 +193,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210312 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[thrift-user] 20210312 Thrift 0.13 micro for CVE-2020-13949?", + "url": "https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index b9a1bf42db4..46be0b0e5f3 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -147,16 +147,6 @@ "name": "[kafka-commits] 20210302 [kafka] branch 2.6 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223", "url": "https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E" }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E" - }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E" - }, { "refsource": "MLIST", "name": "[activemq-gitbox] 20210303 [GitHub] [activemq] ehossack-aws opened a new pull request #616: Upgrade to Jetty 9.4.38.v20210224", @@ -311,7 +301,17 @@ "refsource": "MLIST", "name": "[nifi-issues] 20210310 [jira] [Commented] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E" } ] } -} +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23926.json b/2021/23xxx/CVE-2021-23926.json index dc3ffa25cbb..2ace09a3ff1 100644 --- a/2021/23xxx/CVE-2021-23926.json +++ b/2021/23xxx/CVE-2021-23926.json @@ -68,6 +68,11 @@ "refsource": "MISC", "url": "https://issues.apache.org/jira/browse/XMLBEANS-517", "name": "https://issues.apache.org/jira/browse/XMLBEANS-517" + }, + { + "refsource": "MLIST", + "name": "[axis-java-dev] 20210312 xmlbeans 2.6.0 and CVE-2021-23926", + "url": "https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E" } ] }, From 93cf89fa86f69d644dab9056092c7a1094c600d2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 15:00:45 +0000 Subject: [PATCH 298/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 ++ 2020/24xxx/CVE-2020-24036.json | 5 ++ 2020/24xxx/CVE-2020-24912.json | 5 ++ 2020/24xxx/CVE-2020-24913.json | 10 +++ 2020/24xxx/CVE-2020-24914.json | 5 ++ 2020/27xxx/CVE-2020-27860.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27861.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27862.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27863.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27864.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27865.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27866.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27867.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27868.json | 132 +++++++++++++++++---------------- 2020/27xxx/CVE-2020-27869.json | 124 ++++++++++++++++--------------- 2020/27xxx/CVE-2020-27870.json | 124 ++++++++++++++++--------------- 2020/27xxx/CVE-2020-27871.json | 124 ++++++++++++++++--------------- 2020/27xxx/CVE-2020-27874.json | 124 ++++++++++++++++--------------- 2021/28xxx/CVE-2021-28141.json | 2 +- 2021/28xxx/CVE-2021-28302.json | 56 ++++++++++++-- 20 files changed, 945 insertions(+), 827 deletions(-) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index cf8a3a4a4bd..bb79fea8488 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -198,6 +198,11 @@ "refsource": "MLIST", "name": "[thrift-user] 20210312 Thrift 0.13 micro for CVE-2020-13949?", "url": "https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[thrift-user] 20210312 RE: Thrift 0.13 micro for CVE-2020-13949?", + "url": "https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E" } ] }, diff --git a/2020/24xxx/CVE-2020-24036.json b/2020/24xxx/CVE-2020-24036.json index 2e1d50919b3..3e7773987fa 100644 --- a/2020/24xxx/CVE-2020-24036.json +++ b/2020/24xxx/CVE-2020-24036.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036", "url": "https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036" + }, + { + "refsource": "FULLDISC", + "name": "20210312 [AIT-SA-20210215-04] CVE-2020-24036: ForkCMS PHP Object Injection", + "url": "http://seclists.org/fulldisclosure/2021/Mar/31" } ] } diff --git a/2020/24xxx/CVE-2020-24912.json b/2020/24xxx/CVE-2020-24912.json index 3f9afd9f5bf..2fd64dca1fa 100644 --- a/2020/24xxx/CVE-2020-24912.json +++ b/2020/24xxx/CVE-2020-24912.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912", "url": "https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912" + }, + { + "refsource": "FULLDISC", + "name": "20210312 [AIT-SA-20210215-03] CVE-2020-24912: QCube Cross-Site-Scripting", + "url": "http://seclists.org/fulldisclosure/2021/Mar/30" } ] } diff --git a/2020/24xxx/CVE-2020-24913.json b/2020/24xxx/CVE-2020-24913.json index 8d254faa576..8856b3dbb8c 100644 --- a/2020/24xxx/CVE-2020-24913.json +++ b/2020/24xxx/CVE-2020-24913.json @@ -66,6 +66,16 @@ "refsource": "MISC", "name": "https://tech.feedyourhead.at/content/QCubed-SQL-Injection-CVE-2020-24913", "url": "https://tech.feedyourhead.at/content/QCubed-SQL-Injection-CVE-2020-24913" + }, + { + "refsource": "FULLDISC", + "name": "20210312 [AIT-SA-20210215-03] CVE-2020-24912: QCube Cross-Site-Scripting", + "url": "http://seclists.org/fulldisclosure/2021/Mar/30" + }, + { + "refsource": "FULLDISC", + "name": "20210312 [AIT-SA-20210215-02] CVE-2020-24913: QCubed SQL Injection", + "url": "http://seclists.org/fulldisclosure/2021/Mar/29" } ] } diff --git a/2020/24xxx/CVE-2020-24914.json b/2020/24xxx/CVE-2020-24914.json index e1f2697b752..a9417295938 100644 --- a/2020/24xxx/CVE-2020-24914.json +++ b/2020/24xxx/CVE-2020-24914.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://tech.feedyourhead.at/content/QCubed-PHP-Object-Injection-CVE-2020-24914", "url": "https://tech.feedyourhead.at/content/QCubed-PHP-Object-Injection-CVE-2020-24914" + }, + { + "refsource": "FULLDISC", + "name": "20210312 [AIT-SA-20210215-01] CVE-2020-24914: QCubed PHP Object Injection", + "url": "http://seclists.org/fulldisclosure/2021/Mar/28" } ] } diff --git a/2020/27xxx/CVE-2020-27860.json b/2020/27xxx/CVE-2020-27860.json index 9c405f8d8e2..53929d5cc39 100644 --- a/2020/27xxx/CVE-2020-27860.json +++ b/2020/27xxx/CVE-2020-27860.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27860", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Reader", - "version": { - "version_data": [ - { - "version_value": "10.0.1.35811" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27860", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Reader", + "version": { + "version_data": [ + { + "version_value": "10.0.1.35811" + } + ] + } + } + ] + }, + "vendor_name": "Foxit" } - } ] - }, - "vendor_name": "Foxit" } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11727." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-787: Out-of-bounds Write" - } + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11727." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1415/" - }, - { - "url": "https://www.foxitsoftware.com/support/security-bulletins.html" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.foxitsoftware.com/support/security-bulletins.html", + "refsource": "MISC", + "name": "https://www.foxitsoftware.com/support/security-bulletins.html" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1415/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1415/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27861.json b/2020/27xxx/CVE-2020-27861.json index a14979c3cbb..35e68ec3a74 100644 --- a/2020/27xxx/CVE-2020-27861.json +++ b/2020/27xxx/CVE-2020-27861.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27861", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Orbi", - "version": { - "version_data": [ - { - "version_value": "2.5.1.16" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27861", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Orbi", + "version": { + "version_data": [ + { + "version_value": "2.5.1.16" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "Shaunak Mirani", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" - } + }, + "credit": "Shaunak Mirani", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/" - }, - { - "url": "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/" + }, + { + "url": "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27862.json b/2020/27xxx/CVE-2020-27862.json index 8d312a51d57..6d75fcc3697 100644 --- a/2020/27xxx/CVE-2020-27862.json +++ b/2020/27xxx/CVE-2020-27862.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27862", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmware version 2.3" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27862", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ + { + "version_value": "firmware version 2.3" + } + ] + } + } + ] + }, + "vendor_name": "D-Link" } - } ] - }, - "vendor_name": "D-Link" } - ] - } - }, - "credit": "chung96vn ft phieulang", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. When parsing the path parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-10911." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-77: Command Injection" - } + }, + "credit": "chung96vn ft phieulang", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. When parsing the path parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-10911." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1426/" - }, - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1426/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1426/" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27863.json b/2020/27xxx/CVE-2020-27863.json index 6f7f313ba6c..cba67e60a77 100644 --- a/2020/27xxx/CVE-2020-27863.json +++ b/2020/27xxx/CVE-2020-27863.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27863", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmeware version 2.3" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27863", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ + { + "version_value": "firmeware version 2.3" + } + ] + } + } + ] + }, + "vendor_name": "D-Link" } - } ] - }, - "vendor_name": "D-Link" } - ] - } - }, - "credit": "chung96vn ft phieulang", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10912." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" - } + }, + "credit": "chung96vn ft phieulang", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10912." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1427/" - }, - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1427/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1427/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27864.json b/2020/27xxx/CVE-2020-27864.json index fceeea17e1a..4036c5ddb2c 100644 --- a/2020/27xxx/CVE-2020-27864.json +++ b/2020/27xxx/CVE-2020-27864.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27864", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "DAP-1860", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.04B03" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27864", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "DAP-1860", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.04B03" + } + ] + } + } + ] + }, + "vendor_name": "D-Link" } - } ] - }, - "vendor_name": "D-Link" } - ] - } - }, - "credit": "chung96vn of Vietnam Cyber Security Center", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the Authorization request header, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10880." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-77: Command Injection" - } + }, + "credit": "chung96vn of Vietnam Cyber Security Center", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the Authorization request header, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10880." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1428/" - }, - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1428/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1428/" + }, + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27865.json b/2020/27xxx/CVE-2020-27865.json index 9301d59ff86..615aaf8396b 100644 --- a/2020/27xxx/CVE-2020-27865.json +++ b/2020/27xxx/CVE-2020-27865.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27865", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "DAP-1860", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.04B03" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27865", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "DAP-1860", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.04B03" + } + ] + } + } + ] + }, + "vendor_name": "D-Link" } - } ] - }, - "vendor_name": "D-Link" } - ] - } - }, - "credit": "chung96vn of Vietnam Cyber Security Center", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the uhttpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the device. Was ZDI-CAN-10894." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" - } + }, + "credit": "chung96vn of Vietnam Cyber Security Center", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 firmware version 1.04B03 WiFi extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the uhttpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the device. Was ZDI-CAN-10894." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1429/" - }, - { - "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10197" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1429/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1429/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27866.json b/2020/27xxx/CVE-2020-27866.json index 7d3979515ea..66be626b34e 100644 --- a/2020/27xxx/CVE-2020-27866.json +++ b/2020/27xxx/CVE-2020-27866.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27866", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.2.0.62_1.0.1" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27866", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.2.0.62_1.0.1" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "1sd3d of Viettel Cyber Security", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.\n\n Was ZDI-CAN-11355." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" - } + }, + "credit": "1sd3d of Viettel Cyber Security", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11355." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1451/" - }, - { - "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1451/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1451/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27867.json b/2020/27xxx/CVE-2020-27867.json index ad20afede12..5d70f0992bc 100644 --- a/2020/27xxx/CVE-2020-27867.json +++ b/2020/27xxx/CVE-2020-27867.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27867", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Multiple Routers", - "version": { - "version_data": [ - { - "version_value": "firmware version 1.2.0.62_1.0.1" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27867", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Multiple Routers", + "version": { + "version_data": [ + { + "version_value": "firmware version 1.2.0.62_1.0.1" + } + ] + } + } + ] + }, + "vendor_name": "NETGEAR" } - } ] - }, - "vendor_name": "NETGEAR" } - ] - } - }, - "credit": "1sd3d", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-77: Command Injection" - } + }, + "credit": "1sd3d", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1423/" - }, - { - "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-77: Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers", + "refsource": "MISC", + "name": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1423/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1423/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27868.json b/2020/27xxx/CVE-2020-27868.json index 9c998a145d8..5a760a78b2b 100644 --- a/2020/27xxx/CVE-2020-27868.json +++ b/2020/27xxx/CVE-2020-27868.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27868", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Ocularis", - "version": { - "version_data": [ - { - "version_value": "5.9.0.395" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27868", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Ocularis", + "version": { + "version_data": [ + { + "version_value": "5.9.0.395" + } + ] + } + } + ] + }, + "vendor_name": "Qognify" } - } ] - }, - "vendor_name": "Qognify" } - ] - } - }, - "credit": "Joachim Kerschbaumer (@joachimk)", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Qognify Ocularis 5.9.0.395. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of serialized objects provided to the EventCoordinator endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-11257." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-502: Deserialization of Untrusted Data" - } + }, + "credit": "Joachim Kerschbaumer (@joachimk)", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Qognify Ocularis 5.9.0.395. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of serialized objects provided to the EventCoordinator endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-11257." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1453/" - }, - { - "url": "https://www.qognify.com/support-training/software-downloads/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502: Deserialization of Untrusted Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1453/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1453/" + }, + { + "url": "https://www.qognify.com/support-training/software-downloads/", + "refsource": "MISC", + "name": "https://www.qognify.com/support-training/software-downloads/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27869.json b/2020/27xxx/CVE-2020-27869.json index 642b34151b0..5cd15c65ad8 100644 --- a/2020/27xxx/CVE-2020-27869.json +++ b/2020/27xxx/CVE-2020-27869.json @@ -1,67 +1,69 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27869", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Network Performance Monitor", - "version": { - "version_data": [ - { - "version_value": "2020 HF1, NPM: 2020.2" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27869", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Network Performance Monitor", + "version": { + "version_data": [ + { + "version_value": "2020 HF1, NPM: 2020.2" + } + ] + } + } + ] + }, + "vendor_name": "SolarWinds" } - } ] - }, - "vendor_name": "SolarWinds" } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" - } + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-064/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-064/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-064/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27870.json b/2020/27xxx/CVE-2020-27870.json index 689e5c152ae..5b7a5217659 100644 --- a/2020/27xxx/CVE-2020-27870.json +++ b/2020/27xxx/CVE-2020-27870.json @@ -1,67 +1,69 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27870", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Orion Platform", - "version": { - "version_data": [ - { - "version_value": "2020.2.1" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27870", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Orion Platform", + "version": { + "version_data": [ + { + "version_value": "2020.2.1" + } + ] + } + } + ] + }, + "vendor_name": "SolarWinds" } - } ] - }, - "vendor_name": "SolarWinds" } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" - } + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability. The specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-066/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-066/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-066/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27871.json b/2020/27xxx/CVE-2020-27871.json index 85504cb2dc0..e07db80f1e2 100644 --- a/2020/27xxx/CVE-2020-27871.json +++ b/2020/27xxx/CVE-2020-27871.json @@ -1,67 +1,69 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27871", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Orion Platform", - "version": { - "version_data": [ - { - "version_value": "2020.2.1" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27871", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Orion Platform", + "version": { + "version_data": [ + { + "version_value": "2020.2.1" + } + ] + } + } + ] + }, + "vendor_name": "SolarWinds" } - } ] - }, - "vendor_name": "SolarWinds" } - ] - } - }, - "credit": "Anonymous", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within VulnerabilitySettings.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11902." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" - } + }, + "credit": "Anonymous", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within VulnerabilitySettings.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11902." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-067/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-067/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-067/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27874.json b/2020/27xxx/CVE-2020-27874.json index 73e8c2a5d55..893822267b9 100644 --- a/2020/27xxx/CVE-2020-27874.json +++ b/2020/27xxx/CVE-2020-27874.json @@ -1,67 +1,69 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2020-27874", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "WeChat", - "version": { - "version_data": [ - { - "version_value": "7.0.18" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2020-27874", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WeChat", + "version": { + "version_data": [ + { + "version_value": "7.0.18" + } + ] + } + } + ] + }, + "vendor_name": "Tencent" } - } ] - }, - "vendor_name": "Tencent" } - ] - } - }, - "credit": "Wen guang Jiao", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11580." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" - } + }, + "credit": "Wen guang Jiao", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11580." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-084/" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-084/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-084/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28141.json b/2021/28xxx/CVE-2021-28141.json index 76f939af072..0040044754c 100644 --- a/2021/28xxx/CVE-2021-28141.json +++ b/2021/28xxx/CVE-2021-28141.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI." + "value": "** DISPUTED ** An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI. NOTE: the vendor states that this is not a vulnerability. The request's output does not indicate that a \"true\" command was executed on the server, and the request's output does not leak any private source code or data from the server." } ] }, diff --git a/2021/28xxx/CVE-2021-28302.json b/2021/28xxx/CVE-2021-28302.json index 06788e93391..ae2be8ddb92 100644 --- a/2021/28xxx/CVE-2021-28302.json +++ b/2021/28xxx/CVE-2021-28302.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28302", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28302", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack overflow in pupnp 1.16.1 can cause the denial of service through the Parser_parseDocument() function. ixmlNode_free() will release a child node recursively, which will consume stack space and lead to a crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pupnp/pupnp/issues/249", + "refsource": "MISC", + "name": "https://github.com/pupnp/pupnp/issues/249" } ] } From a81522a2e68b8e53d8958f48c1307f78e68b8e7e Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Fri, 12 Mar 2021 17:08:12 +0200 Subject: [PATCH 299/845] Adds CVE-2021-23354 --- 2021/23xxx/CVE-2021-23354.json | 84 ++++++++++++++++++++++++++++++++-- 1 file changed, 80 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23354.json b/2021/23xxx/CVE-2021-23354.json index 900f77179aa..77102b20d61 100644 --- a/2021/23xxx/CVE-2021-23354.json +++ b/2021/23xxx/CVE-2021-23354.json @@ -3,16 +3,92 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-12T15:08:10.668042Z", "ID": "CVE-2021-23354", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Regular Expression Denial of Service (ReDoS)" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "printf", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "0.6.1" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Regular Expression Denial of Service (ReDoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-PRINTF-1072096" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/adaltas/node-printf/pull/32" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/adaltas/node-printf/issues/31" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\\%(?:\\(([\\w_.]+)\\)|([1-9]\\d*)\\$)?([0 +\\-\\]*)(\\*|\\d+)?(\\.)?(\\*|\\d+)?[hlL]?([\\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Yeting Li" + } + ] } \ No newline at end of file From edb901da88eaa22eafda9bb791d1af1245dfa5bb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 16:00:43 +0000 Subject: [PATCH 300/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23354.json | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/2021/23xxx/CVE-2021-23354.json b/2021/23xxx/CVE-2021-23354.json index 77102b20d61..2cc730e00c5 100644 --- a/2021/23xxx/CVE-2021-23354.json +++ b/2021/23xxx/CVE-2021-23354.json @@ -48,16 +48,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-PRINTF-1072096" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-PRINTF-1072096", + "name": "https://snyk.io/vuln/SNYK-JS-PRINTF-1072096" }, { - "refsource": "CONFIRM", - "url": "https://github.com/adaltas/node-printf/pull/32" + "refsource": "MISC", + "url": "https://github.com/adaltas/node-printf/pull/32", + "name": "https://github.com/adaltas/node-printf/pull/32" }, { - "refsource": "CONFIRM", - "url": "https://github.com/adaltas/node-printf/issues/31" + "refsource": "MISC", + "url": "https://github.com/adaltas/node-printf/issues/31", + "name": "https://github.com/adaltas/node-printf/issues/31" } ] }, @@ -65,7 +68,7 @@ "description_data": [ { "lang": "eng", - "value": "The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\\%(?:\\(([\\w_.]+)\\)|([1-9]\\d*)\\$)?([0 +\\-\\]*)(\\*|\\d+)?(\\.)?(\\*|\\d+)?[hlL]?([\\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.\n" + "value": "The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\\%(?:\\(([\\w_.]+)\\)|([1-9]\\d*)\\$)?([0 +\\-\\]*)(\\*|\\d+)?(\\.)?(\\*|\\d+)?[hlL]?([\\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity." } ] }, From b2e5747d67cb95afb2feb384b429eae10fed3ef5 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 12 Mar 2021 09:19:43 -0700 Subject: [PATCH 301/845] Add CVE-2021-21366 for GHSA-h6q6-9hqw-rwfv --- 2021/21xxx/CVE-2021-21366.json | 100 +++++++++++++++++++++++++++++++-- 1 file changed, 94 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21366.json b/2021/21xxx/CVE-2021-21366.json index ce944a3fd60..bc81a3af4e3 100644 --- a/2021/21xxx/CVE-2021-21366.json +++ b/2021/21xxx/CVE-2021-21366.json @@ -1,18 +1,106 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21366", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Misinterpretation of malicious XML input" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "xmldom", + "version": { + "version_data": [ + { + "version_value": "< 0.5.0" + } + ] + } + } + ] + }, + "vendor_name": "xmldom" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This is fixed in version 0.5.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-436 Interpretation Conflict" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-115: Misinterpretation of Input" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv", + "refsource": "CONFIRM", + "url": "https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv" + }, + { + "name": "https://www.npmjs.com/package/xmldom", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/xmldom" + }, + { + "name": "https://github.com/xmldom/xmldom/releases/tag/0.5.0", + "refsource": "MISC", + "url": "https://github.com/xmldom/xmldom/releases/tag/0.5.0" + }, + { + "name": "https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135", + "refsource": "MISC", + "url": "https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135" + } + ] + }, + "source": { + "advisory": "GHSA-h6q6-9hqw-rwfv", + "discovery": "UNKNOWN" } } \ No newline at end of file From 93901c6e856882b48da5ff458262912d58d68518 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 12 Mar 2021 09:32:14 -0700 Subject: [PATCH 302/845] Add CVE-2021-21367 for GHSA-5p3g-j69g-w2mq --- 2021/21xxx/CVE-2021-21367.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21367.json b/2021/21xxx/CVE-2021-21367.json index 083374f519e..8393a86743a 100644 --- a/2021/21xxx/CVE-2021-21367.json +++ b/2021/21xxx/CVE-2021-21367.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21367", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Incorrect Authorization in switchboard-plug-bluetooth" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "switchboard-plug-bluetooth", + "version": { + "version_data": [ + { + "version_value": ">= 2.3.0, < 2.3.5" + } + ] + } + } + ] + }, + "vendor_name": "elementary" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Switchboard Bluetooth Plug for elementary OS from version 2.3.0 and before version version 2.3.5 has an incorrect authorization vulnerability. When the Bluetooth plug is running (in discoverable mode), Bluetooth service requests and pairing requests are automatically accepted, allowing physically proximate attackers to pair with a device running an affected version of switchboard-plug-bluetooth without the active consent of the user. By default, elementary OS doesn't expose any services via Bluetooth that allow information to be extracted by paired Bluetooth devices. However, if such services (i.e. contact list sharing software) have been installed, it's possible that attackers have been able to extract data from such services without authorization. If no such services have been installed, attackers are only able to pair with a device running an affected version without authorization and then play audio out of the device or possibly present a HID device (keyboard, mouse, etc...) to control the device. As such, users should check the list of trusted/paired devices and remove any that are not 100% confirmed to be genuine. This is fixed in version 2.3.5. To reduce the likelihood of this vulnerability on an unpatched version, only open the Bluetooth plug for short intervals when absolutely necessary and preferably not in crowded public areas. To mitigate the risk entirely with unpatched versions, do not open the Bluetooth plug within switchboard at all, and use a different method for pairing devices if necessary (e.g. `bluetoothctl` CLI)." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/elementary/switchboard-plug-bluetooth/security/advisories/GHSA-5p3g-j69g-w2mq", + "refsource": "CONFIRM", + "url": "https://github.com/elementary/switchboard-plug-bluetooth/security/advisories/GHSA-5p3g-j69g-w2mq" + }, + { + "name": "https://github.com/elementary/switchboard-plug-bluetooth/releases/tag/2.3.5", + "refsource": "MISC", + "url": "https://github.com/elementary/switchboard-plug-bluetooth/releases/tag/2.3.5" + }, + { + "name": "https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907538abafe5225b67cc12c03e7645", + "refsource": "MISC", + "url": "https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907538abafe5225b67cc12c03e7645" + } + ] + }, + "source": { + "advisory": "GHSA-5p3g-j69g-w2mq", + "discovery": "UNKNOWN" } } \ No newline at end of file From 4ff0d3ce23fd662bac6ebf1e1d4d85fde7ec873c Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Fri, 12 Mar 2021 11:37:37 -0500 Subject: [PATCH 303/845] IBM20210312-113737 Added CVE-2020-4831 --- 2020/4xxx/CVE-2020-4831.json | 105 ++++++++++++++++++++++++++++++----- 1 file changed, 90 insertions(+), 15 deletions(-) diff --git a/2020/4xxx/CVE-2020-4831.json b/2020/4xxx/CVE-2020-4831.json index 616b143120d..2b1d6cf9026 100644 --- a/2020/4xxx/CVE-2020-4831.json +++ b/2020/4xxx/CVE-2020-4831.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4831", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Obtain Information", + "lang" : "eng" + } + ] + } + ] + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RL" : "O", + "RC" : "C", + "E" : "U" + }, + "BM" : { + "AV" : "N", + "SCORE" : "5.900", + "C" : "H", + "I" : "N", + "A" : "N", + "PR" : "N", + "AC" : "H", + "S" : "U", + "UI" : "N" + } + } + }, + "description" : { + "description_data" : [ + { + "value" : "IBM DataPower Gateway 10.0.0.0 through 10.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 189965.", + "lang" : "eng" + } + ] + }, + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-03-11T00:00:00", + "ASSIGNER" : "psirt@us.ibm.com", + "ID" : "CVE-2020-4831", + "STATE" : "PUBLIC" + }, + "data_version" : "4.0", + "references" : { + "reference_data" : [ + { + "title" : "IBM Security Bulletin 6398744 (DataPower Gateway)", + "name" : "https://www.ibm.com/support/pages/node/6398744", + "url" : "https://www.ibm.com/support/pages/node/6398744", + "refsource" : "CONFIRM" + }, + { + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/189965", + "refsource" : "XF", + "title" : "X-Force Vulnerability Report", + "name" : "ibm-datapower-cve20204831-info-disc (189965)" + } + ] + }, + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "10.0.0.0" + }, + { + "version_value" : "10.0.1.0" + } + ] + }, + "product_name" : "DataPower Gateway" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format" : "MITRE" +} From 962cf7071373aa7c222b72d7634b56656abd450b Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 12 Mar 2021 09:56:36 -0700 Subject: [PATCH 304/845] Add CVE-2021-21368 for GHSA-gmjw-49p4-pcfm --- 2021/21xxx/CVE-2021-21368.json | 108 +++++++++++++++++++++++++++++++-- 1 file changed, 102 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21368.json b/2021/21xxx/CVE-2021-21368.json index 89a1a71499a..aec8cce168b 100644 --- a/2021/21xxx/CVE-2021-21368.json +++ b/2021/21xxx/CVE-2021-21368.json @@ -1,18 +1,114 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21368", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Prototype poisoning" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "msgpack5", + "version": { + "version_data": [ + { + "version_value": "< 3.6.1" + }, + { + "version_value": ">= 4.0.0, < 4.5.1" + }, + { + "version_value": ">= 5.0.0, < 5.2.1" + } + ] + } + } + ] + }, + "vendor_name": "mcollina" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "msgpack5 is a msgpack v5 implementation for node.js and the browser. In msgpack5 before versions 3.6.1, 4.5.1, and 5.2.1 there is a \"Prototype Poisoning\" vulnerability. When msgpack5 decodes a map containing a key \"__proto__\", it assigns the decoded value to __proto__. Object.prototype.__proto__ is an accessor property for the receiver's prototype. If the value corresponding to the key __proto__ decodes to an object or null, msgpack5 sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example length, numeric properties, and push et al if __proto__'s value decodes to an Array); and/or may throw unexpected exceptions when used (for example if the __proto__ value decodes to a Map or Date). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. This \"prototype poisoning\" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to msgpack5 values (though if the victim makes use of custom codecs, anything could be a msgpack5 value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). This has been fixed in msgpack5 version 3.6.1, 4.5.1, and 5.2.1. See the referenced GitHub Security Advisory for an example and more details." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm", + "refsource": "CONFIRM", + "url": "https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm" + }, + { + "name": "https://www.npmjs.com/package/msgpack5", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/msgpack5" + }, + { + "name": "https://github.com/mcollina/msgpack5/releases/tag/v3.6.1", + "refsource": "MISC", + "url": "https://github.com/mcollina/msgpack5/releases/tag/v3.6.1" + }, + { + "name": "https://github.com/mcollina/msgpack5/releases/tag/v4.5.1", + "refsource": "MISC", + "url": "https://github.com/mcollina/msgpack5/releases/tag/v4.5.1" + }, + { + "name": "https://github.com/mcollina/msgpack5/releases/tag/v5.2.1", + "refsource": "MISC", + "url": "https://github.com/mcollina/msgpack5/releases/tag/v5.2.1" + }, + { + "name": "https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8", + "refsource": "MISC", + "url": "https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8" + } + ] + }, + "source": { + "advisory": "GHSA-gmjw-49p4-pcfm", + "discovery": "UNKNOWN" } } \ No newline at end of file From 3cfc397f7b2258247b759af9abf6b6b69a78dc0c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 17:00:42 +0000 Subject: [PATCH 305/845] "-Synchronized-Data." --- 2020/4xxx/CVE-2020-4831.json | 180 +++++++++++++++++------------------ 2021/0xxx/CVE-2021-0457.json | 5 + 2021/0xxx/CVE-2021-0458.json | 5 + 2021/0xxx/CVE-2021-0459.json | 5 + 4 files changed, 105 insertions(+), 90 deletions(-) diff --git a/2020/4xxx/CVE-2020-4831.json b/2020/4xxx/CVE-2020-4831.json index 2b1d6cf9026..4aa28e83be0 100644 --- a/2020/4xxx/CVE-2020-4831.json +++ b/2020/4xxx/CVE-2020-4831.json @@ -1,93 +1,93 @@ { - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "AV" : "N", - "SCORE" : "5.900", - "C" : "H", - "I" : "N", - "A" : "N", - "PR" : "N", - "AC" : "H", - "S" : "U", - "UI" : "N" - } - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM DataPower Gateway 10.0.0.0 through 10.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 189965.", - "lang" : "eng" - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-03-11T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4831", - "STATE" : "PUBLIC" - }, - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6398744 (DataPower Gateway)", - "name" : "https://www.ibm.com/support/pages/node/6398744", - "url" : "https://www.ibm.com/support/pages/node/6398744", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/189965", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-datapower-cve20204831-info-disc (189965)" - } - ] - }, - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "10.0.0.0" - }, - { - "version_value" : "10.0.1.0" - } - ] - }, - "product_name" : "DataPower Gateway" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] } - ] - } - }, - "data_format" : "MITRE" -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "AV": "N", + "SCORE": "5.900", + "C": "H", + "I": "N", + "A": "N", + "PR": "N", + "AC": "H", + "S": "U", + "UI": "N" + } + } + }, + "description": { + "description_data": [ + { + "value": "IBM DataPower Gateway 10.0.0.0 through 10.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 189965.", + "lang": "eng" + } + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2021-03-11T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4831", + "STATE": "PUBLIC" + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6398744 (DataPower Gateway)", + "name": "https://www.ibm.com/support/pages/node/6398744", + "url": "https://www.ibm.com/support/pages/node/6398744", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189965", + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-datapower-cve20204831-info-disc (189965)" + } + ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "10.0.0.0" + }, + { + "version_value": "10.0.1.0" + } + ] + }, + "product_name": "DataPower Gateway" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2021/0xxx/CVE-2021-0457.json b/2021/0xxx/CVE-2021-0457.json index 974e1ba2bbe..782024fe55b 100644 --- a/2021/0xxx/CVE-2021-0457.json +++ b/2021/0xxx/CVE-2021-0457.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-279/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-279/" } ] }, diff --git a/2021/0xxx/CVE-2021-0458.json b/2021/0xxx/CVE-2021-0458.json index e4772815a44..02307531060 100644 --- a/2021/0xxx/CVE-2021-0458.json +++ b/2021/0xxx/CVE-2021-0458.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-280/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-280/" } ] }, diff --git a/2021/0xxx/CVE-2021-0459.json b/2021/0xxx/CVE-2021-0459.json index e4859092a1d..329922423a4 100644 --- a/2021/0xxx/CVE-2021-0459.json +++ b/2021/0xxx/CVE-2021-0459.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://source.android.com/security/bulletin/pixel/2021-03-01", "url": "https://source.android.com/security/bulletin/pixel/2021-03-01" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-278/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-278/" } ] }, From d52e777eb0ada6e8dc22b6cd4db188d5d88b0e74 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 12 Mar 2021 10:27:32 -0700 Subject: [PATCH 306/845] Add CVE-2021-21379 for GHSA-v662-xpcc-9xf6 --- 2021/21xxx/CVE-2021-21379.json | 88 +++++++++++++++++++++++++++++++--- 1 file changed, 82 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21379.json b/2021/21xxx/CVE-2021-21379.json index 22b47c96653..48a4b7aa55b 100644 --- a/2021/21xxx/CVE-2021-21379.json +++ b/2021/21xxx/CVE-2021-21379.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21379", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "It's possible to execute anything with the rights of the author of a macro which uses the {{wikimacrocontent}} macro" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "xwiki-platform", + "version": { + "version_data": [ + { + "version_value": ">= 11.4.0, < 11.10.11" + }, + { + "version_value": ">= 12.0.0, < 12.6.3" + }, + { + "version_value": ">= 12.7.0, < 12.8-rc-1" + } + ] + } + } + ] + }, + "vendor_name": "xwiki" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of XWiki Platform, the `{{wikimacrocontent}}` executes the content with the rights of the wiki macro author instead of the caller of that wiki macro. This makes possible to inject scripts through it and they will be executed with the rights of the wiki macro (very often a user which has Programming rights). Fortunately, no such macro exists by default in XWiki Standard but one could have been created or installed with an extension. This vulnerability has been patched in versions XWiki 12.6.3, 11.10.11 and 12.8-rc-1. There is no easy workaround other than disabling the affected macros. Inserting content in a safe way or knowing what is the user who called the wiki macro is not easy." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281 Improper Preservation of Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6", + "refsource": "CONFIRM", + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6" + }, + { + "name": "https://jira.xwiki.org/browse/XWIKI-17759", + "refsource": "MISC", + "url": "https://jira.xwiki.org/browse/XWIKI-17759" + } + ] + }, + "source": { + "advisory": "GHSA-v662-xpcc-9xf6", + "discovery": "UNKNOWN" } } \ No newline at end of file From eacbb4cf8ccbdf0e979e2a138e2c64f37e1b5c47 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 18:00:49 +0000 Subject: [PATCH 307/845] "-Synchronized-Data." --- 2020/9xxx/CVE-2020-9496.json | 5 +++++ 2021/21xxx/CVE-2021-21368.json | 2 +- 2021/26xxx/CVE-2021-26863.json | 5 +++++ 2021/28xxx/CVE-2021-28144.json | 5 +++++ 4 files changed, 16 insertions(+), 1 deletion(-) diff --git a/2020/9xxx/CVE-2020-9496.json b/2020/9xxx/CVE-2020-9496.json index b88f6459260..264cab1b95f 100644 --- a/2020/9xxx/CVE-2020-9496.json +++ b/2020/9xxx/CVE-2020-9496.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[ofbiz-user] 20201117 Re: [CVE-2020-9496] Apache OFBiz unsafe deserialization of XMLRPC arguments", "url": "https://lists.apache.org/thread.html/ra43cfe80226c3b23cd775f3543da10c035ad9c9943cfe8a680490730@%3Cuser.ofbiz.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html", + "url": "http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21368.json b/2021/21xxx/CVE-2021-21368.json index aec8cce168b..81a85195f43 100644 --- a/2021/21xxx/CVE-2021-21368.json +++ b/2021/21xxx/CVE-2021-21368.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "msgpack5 is a msgpack v5 implementation for node.js and the browser. In msgpack5 before versions 3.6.1, 4.5.1, and 5.2.1 there is a \"Prototype Poisoning\" vulnerability. When msgpack5 decodes a map containing a key \"__proto__\", it assigns the decoded value to __proto__. Object.prototype.__proto__ is an accessor property for the receiver's prototype. If the value corresponding to the key __proto__ decodes to an object or null, msgpack5 sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example length, numeric properties, and push et al if __proto__'s value decodes to an Array); and/or may throw unexpected exceptions when used (for example if the __proto__ value decodes to a Map or Date). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. This \"prototype poisoning\" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to msgpack5 values (though if the victim makes use of custom codecs, anything could be a msgpack5 value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). This has been fixed in msgpack5 version 3.6.1, 4.5.1, and 5.2.1. See the referenced GitHub Security Advisory for an example and more details." + "value": "msgpack5 is a msgpack v5 implementation for node.js and the browser. In msgpack5 before versions 3.6.1, 4.5.1, and 5.2.1 there is a \"Prototype Poisoning\" vulnerability. When msgpack5 decodes a map containing a key \"__proto__\", it assigns the decoded value to __proto__. Object.prototype.__proto__ is an accessor property for the receiver's prototype. If the value corresponding to the key __proto__ decodes to an object or null, msgpack5 sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example length, numeric properties, and push et al if __proto__'s value decodes to an Array); and/or may throw unexpected exceptions when used (for example if the __proto__ value decodes to a Map or Date). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. This \"prototype poisoning\" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to msgpack5 values (though if the victim makes use of custom codecs, anything could be a msgpack5 value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). This has been fixed in msgpack5 version 3.6.1, 4.5.1, and 5.2.1. See the referenced GitHub Security Advisory for an example and more details." } ] }, diff --git a/2021/26xxx/CVE-2021-26863.json b/2021/26xxx/CVE-2021-26863.json index 4913cfc39e0..c3fad4e0572 100644 --- a/2021/26xxx/CVE-2021-26863.json +++ b/2021/26xxx/CVE-2021-26863.json @@ -204,6 +204,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html", + "url": "http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html" } ] } diff --git a/2021/28xxx/CVE-2021-28144.json b/2021/28xxx/CVE-2021-28144.json index eb0b597409e..5ad9d74f51f 100644 --- a/2021/28xxx/CVE-2021-28144.json +++ b/2021/28xxx/CVE-2021-28144.json @@ -66,6 +66,11 @@ "refsource": "FULLDISC", "name": "20210311 [CVE-2021-28144] Authenticated Command Injection in D-Link DIR-3060 Web Interface", "url": "http://seclists.org/fulldisclosure/2021/Mar/23" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161757/D-Link-DIR-3060-1.11b04-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/161757/D-Link-DIR-3060-1.11b04-Command-Injection.html" } ] } From 3750f7ade6df5fe504d5dd735eed154950bd3297 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 19:00:40 +0000 Subject: [PATCH 308/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 10 ++++ 2021/20xxx/CVE-2021-20231.json | 55 +++++++++++++++++++-- 2021/20xxx/CVE-2021-20232.json | 55 +++++++++++++++++++-- 2021/21xxx/CVE-2021-21056.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21067.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21068.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21069.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21071.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21072.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21073.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21074.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21075.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21076.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21077.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21078.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21079.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21080.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21082.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21085.json | 90 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21726.json | 50 +++++++++++++++++-- 20 files changed, 1505 insertions(+), 105 deletions(-) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index c7f190f52d1..3600c643ae9 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -470,6 +470,16 @@ "refsource": "MLIST", "name": "[beam-issues] 20210312 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210312 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210312 [jira] [Updated] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/20xxx/CVE-2021-20231.json b/2021/20xxx/CVE-2021-20231.json index 7eac4417d1e..db617395269 100644 --- a/2021/20xxx/CVE-2021-20231.json +++ b/2021/20xxx/CVE-2021-20231.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20231", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "gnutls", + "version": { + "version_data": [ + { + "version_value": "gnutls 3.7.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1922276", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922276" + }, + { + "refsource": "MISC", + "name": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10", + "url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences." } ] } diff --git a/2021/20xxx/CVE-2021-20232.json b/2021/20xxx/CVE-2021-20232.json index 4e754472b47..45b7333aa95 100644 --- a/2021/20xxx/CVE-2021-20232.json +++ b/2021/20xxx/CVE-2021-20232.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20232", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "gnutls", + "version": { + "version_data": [ + { + "version_value": "gnutls 3.7.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10", + "url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences." } ] } diff --git a/2021/21xxx/CVE-2021-21056.json b/2021/21xxx/CVE-2021-21056.json index 044a6bf0161..164eed358cc 100644 --- a/2021/21xxx/CVE-2021-21056.json +++ b/2021/21xxx/CVE-2021-21056.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-02-09T23:00:00.000Z", "ID": "CVE-2021-21056", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe FrameMaker Out-of-Bounds Read Vulnerability Could Lead To Remote Code Execution" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "FrameMaker", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "2020.0.1" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Framemaker version 2020.0.1 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/framemaker/apsb21-14.html", + "name": "https://helpx.adobe.com/security/products/framemaker/apsb21-14.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21067.json b/2021/21xxx/CVE-2021-21067.json index df2da05b13d..43fcd36cebf 100644 --- a/2021/21xxx/CVE-2021-21067.json +++ b/2021/21xxx/CVE-2021-21067.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21067", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Photoshop CoolType arbitrary stack manipulation in Type 1/Multiple Master" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Photoshop", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "22.2" + }, + { + "version_affected": "<=", + "version_value": "21.2.5" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop versions 21.2.5 (and earlier) and 22.2 (and earlier) are affected by an Out-of-bounds Write vulnerability in the CoolType library. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Write (CWE-787)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/photoshop/apsb21-17.html", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb21-17.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21068.json b/2021/21xxx/CVE-2021-21068.json index eb3904c4fff..34ce0a137a9 100644 --- a/2021/21xxx/CVE-2021-21068.json +++ b/2021/21xxx/CVE-2021-21068.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21068", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Creative Cloud installer arbitrary file overwrite vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Creative Cloud (desktop component)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "5.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Creative Cloud Desktop Application version 5.3 (and earlier) is affected by a file handling vulnerability that could allow an attacker to cause arbitrary file overwriting. Exploitation of this issue requires physical access and user interaction." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.7, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "High", + "scope": "Changed", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Creation of Temporary File in Directory with Incorrect Permissions (CWE-379)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html", + "name": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21069.json b/2021/21xxx/CVE-2021-21069.json index 8010d7aa232..f0ece157cbb 100644 --- a/2021/21xxx/CVE-2021-21069.json +++ b/2021/21xxx/CVE-2021-21069.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21069", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Creative Cloud Privilege Escalation Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Creative Cloud (desktop component)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "5.3.1.470a" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Creative Cloud Desktop Application version 5.3 (and earlier) is affected by a local privilege escalation vulnerability that could allow an attacker to call functions against the installer to perform high privileged actions. Exploitation of this issue does not require user interaction." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation (CWE-20)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html", + "name": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21071.json b/2021/21xxx/CVE-2021-21071.json index 5f19f2c8a93..ec220a9638f 100644 --- a/2021/21xxx/CVE-2021-21071.json +++ b/2021/21xxx/CVE-2021-21071.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21071", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate memory corruption vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by a Memory Corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Access of Memory Location After End of Buffer (CWE-788)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21072.json b/2021/21xxx/CVE-2021-21072.json index 2c003b81804..b8dd1749a67 100644 --- a/2021/21xxx/CVE-2021-21072.json +++ b/2021/21xxx/CVE-2021-21072.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21072", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate out-of-bounds read vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21073.json b/2021/21xxx/CVE-2021-21073.json index e1d5c1d79f7..bc9390d19ae 100644 --- a/2021/21xxx/CVE-2021-21073.json +++ b/2021/21xxx/CVE-2021-21073.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21073", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate out-of-bounds read vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21074.json b/2021/21xxx/CVE-2021-21074.json index b240f2a9980..e850f07bc7c 100644 --- a/2021/21xxx/CVE-2021-21074.json +++ b/2021/21xxx/CVE-2021-21074.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21074", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate out-of-bounds read vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21075.json b/2021/21xxx/CVE-2021-21075.json index cf6eab5b750..ce0a13725e8 100644 --- a/2021/21xxx/CVE-2021-21075.json +++ b/2021/21xxx/CVE-2021-21075.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21075", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate out-of-bounds read vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21076.json b/2021/21xxx/CVE-2021-21076.json index 38c53af2d68..0a53afce9c2 100644 --- a/2021/21xxx/CVE-2021-21076.json +++ b/2021/21xxx/CVE-2021-21076.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21076", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate out-of-bounds read vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "None", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds Read (CWE-125)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21077.json b/2021/21xxx/CVE-2021-21077.json index f831981991d..c52923dae93 100644 --- a/2021/21xxx/CVE-2021-21077.json +++ b/2021/21xxx/CVE-2021-21077.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21077", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Animate heap-based overflow vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Animate", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "21.0.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Animate version 21.0.3 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 7.8, + "baseSeverity": "High", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow (CWE-122)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/animate/apsb21-21.html", + "name": "https://helpx.adobe.com/security/products/animate/apsb21-21.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21078.json b/2021/21xxx/CVE-2021-21078.json index f4226cf075e..f3426cf9a83 100644 --- a/2021/21xxx/CVE-2021-21078.json +++ b/2021/21xxx/CVE-2021-21078.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21078", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Creative Cloud Unquoted Service Path in CCXProcess" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Creative Cloud (desktop component)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "5.3" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Creative Cloud Desktop Application version 5.3 (and earlier) is affected by an Unquoted Service Path vulnerability in CCXProcess that could allow an attacker to achieve arbitrary code execution in the process of the current user. Exploitation of this issue requires user interaction" } ] + }, + "impact": { + "cvss": { + "attackComplexity": "High", + "attackVector": "Local", + "availabilityImpact": "High", + "baseScore": 6.3, + "baseSeverity": "Medium", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "High", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Untrusted Search Path (CWE-426)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html", + "name": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21079.json b/2021/21xxx/CVE-2021-21079.json index 5d226a9d2f3..4379f6452d1 100644 --- a/2021/21xxx/CVE-2021-21079.json +++ b/2021/21xxx/CVE-2021-21079.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21079", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Connect Reflected Cross-site Scripting via archiveOffset parameter" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Connect", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.0.7" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Connect version 11.0.7 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious JavaScript content that may be executed within the context of the victim's browser when they browse to the page containing the vulnerable field." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 6.4, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "Low", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (Reflected XSS) (CWE-79)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/connect/apsb21-19.html", + "name": "https://helpx.adobe.com/security/products/connect/apsb21-19.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21080.json b/2021/21xxx/CVE-2021-21080.json index 3976df12818..4eeafcd033b 100644 --- a/2021/21xxx/CVE-2021-21080.json +++ b/2021/21xxx/CVE-2021-21080.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21080", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Connect Reflected Cross-site Scripting via query parameter" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Connect", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.0.7" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Connect version 11.0.7 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious JavaScript content that may be executed within the context of the victim's browser when they browse to the page containing the vulnerable field." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "None", + "baseScore": 6.4, + "baseSeverity": "Medium", + "confidentialityImpact": "Low", + "integrityImpact": "Low", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "Required", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (Reflected XSS) (CWE-79)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/connect/apsb21-19.html", + "name": "https://helpx.adobe.com/security/products/connect/apsb21-19.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21082.json b/2021/21xxx/CVE-2021-21082.json index c20855d79de..55f8c595882 100644 --- a/2021/21xxx/CVE-2021-21082.json +++ b/2021/21xxx/CVE-2021-21082.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21082", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Photoshop Memory Corruption" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Photoshop", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "22.2" + }, + { + "version_affected": "<=", + "version_value": "21.2.5" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Photoshop versions 21.2.5 (and earlier) and 22.2 (and earlier) are affected by a Memory Corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "Low", + "baseScore": 7.5, + "baseSeverity": "High", + "confidentialityImpact": "None", + "integrityImpact": "Low", + "privilegesRequired": "None", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Access of Memory Location After End of Buffer (CWE-788)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/photoshop/apsb21-17.html", + "name": "https://helpx.adobe.com/security/products/photoshop/apsb21-17.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21085.json b/2021/21xxx/CVE-2021-21085.json index c1443ae5ac8..ecee7ec86f0 100644 --- a/2021/21xxx/CVE-2021-21085.json +++ b/2021/21xxx/CVE-2021-21085.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "DATE_PUBLIC": "2021-03-09T23:00:00.000Z", "ID": "CVE-2021-21085", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Adobe Connect CSV injection via export feature could lead to code execution" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Connect", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.0.7" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + }, + { + "version_affected": "<=", + "version_value": "None" + } + ] + } + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Connect version 11.0.7 (and earlier) is affected by an Input Validation vulnerability in the export feature. An attacker could exploit this vulnerability by injecting a payload into the registration form and achieve arbitrary code execution in the context of the admin account." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "Low", + "attackVector": "Network", + "availabilityImpact": "Low", + "baseScore": 7.1, + "baseSeverity": "High", + "confidentialityImpact": "Low", + "integrityImpact": "Low", + "privilegesRequired": "None", + "scope": "Changed", + "userInteraction": "Required", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation (CWE-20)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://helpx.adobe.com/security/products/connect/apsb21-19.html", + "name": "https://helpx.adobe.com/security/products/connect/apsb21-19.html" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21726.json b/2021/21xxx/CVE-2021-21726.json index 3f289777d5e..d0cf58a2b16 100644 --- a/2021/21xxx/CVE-2021-21726.json +++ b/2021/21xxx/CVE-2021-21726.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21726", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@zte.com.cn", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "", + "version": { + "version_data": [ + { + "version_value": "" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "input verification" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664", + "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:" } ] } From 1a06ec12010f273504b4219967f2296db13809fb Mon Sep 17 00:00:00 2001 From: DellEMCProductSecurity Date: Fri, 12 Mar 2021 14:56:43 -0500 Subject: [PATCH 309/845] Added CVE --- 2021/21xxx/CVE-2021-21518.json | 71 +++++++++++++++++++++++++++++----- 1 file changed, 62 insertions(+), 9 deletions(-) diff --git a/2021/21xxx/CVE-2021-21518.json b/2021/21xxx/CVE-2021-21518.json index d1e02b1630c..ee5dc680371 100644 --- a/2021/21xxx/CVE-2021-21518.json +++ b/2021/21xxx/CVE-2021-21518.json @@ -1,17 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-21518", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-10", + "ID": "CVE-2021-21518", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Dell SupportAssist Client", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "SACH 3.8, SACB 2.3" + } + ] + } + } + ] + }, + "vendor_name": "Dell" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "lang": "eng", + "value": "Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x, 2.1.x, 2.2.x, and Dell SupportAssist Client ProManage 1.x contain a DLL injection vulnerability in the Costura Fody plugin. A local user with low privileges could potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with SYSTEM privileges." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427: Uncontrolled Search Path Element" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.dell.com/support/kbdoc/en-us/000184012/dsa-2021-052-dell-supportassist-for-home-pcs-business-pcs-security-update-for-pc-doctor-plugin-vulnerability" } ] } From fc8db6ca442b7941e57d133b1f3c49980c4b1f43 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 20:00:38 +0000 Subject: [PATCH 310/845] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23926.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/23xxx/CVE-2021-23926.json b/2021/23xxx/CVE-2021-23926.json index 2ace09a3ff1..9097e942923 100644 --- a/2021/23xxx/CVE-2021-23926.json +++ b/2021/23xxx/CVE-2021-23926.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[axis-java-dev] 20210312 xmlbeans 2.6.0 and CVE-2021-23926", "url": "https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[axis-java-dev] 20210312 Re: xmlbeans 2.6.0 and CVE-2021-23926", + "url": "https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E" } ] }, From 4ce83f93bf504d926bbddd70d456e622550b9fc0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 21:00:41 +0000 Subject: [PATCH 311/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21518.json | 43 +++++++++++++++++----------------- 1 file changed, 22 insertions(+), 21 deletions(-) diff --git a/2021/21xxx/CVE-2021-21518.json b/2021/21xxx/CVE-2021-21518.json index ee5dc680371..3c5d9596257 100644 --- a/2021/21xxx/CVE-2021-21518.json +++ b/2021/21xxx/CVE-2021-21518.json @@ -1,10 +1,10 @@ { "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2021-03-10", - "ID": "CVE-2021-21518", + "ASSIGNER": "secure@dell.com", + "DATE_PUBLIC": "2021-03-10", + "ID": "CVE-2021-21518", "STATE": "PUBLIC" - }, + }, "affects": { "vendor": { "vendor_data": [ @@ -12,59 +12,60 @@ "product": { "product_data": [ { - "product_name": "Dell SupportAssist Client", + "product_name": "Dell SupportAssist Client", "version": { "version_data": [ { - "version_affected": "<", + "version_affected": "<", "version_value": "SACH 3.8, SACB 2.3" } ] } } ] - }, + }, "vendor_name": "Dell" } ] } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { - "lang": "eng", + "lang": "eng", "value": "Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x, 2.1.x, 2.2.x, and Dell SupportAssist Client ProManage 1.x contain a DLL injection vulnerability in the Costura Fody plugin. A local user with low privileges could potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with SYSTEM privileges." } ] - }, + }, "impact": { "cvss": { - "baseScore": 7.8, - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } - }, + }, "problemtype": { "problemtype_data": [ { "description": [ { - "lang": "eng", + "lang": "eng", "value": "CWE-427: Uncontrolled Search Path Element" } ] } ] - }, + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000184012/dsa-2021-052-dell-supportassist-for-home-pcs-business-pcs-security-update-for-pc-doctor-plugin-vulnerability" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000184012/dsa-2021-052-dell-supportassist-for-home-pcs-business-pcs-security-update-for-pc-doctor-plugin-vulnerability", + "name": "https://www.dell.com/support/kbdoc/en-us/000184012/dsa-2021-052-dell-supportassist-for-home-pcs-business-pcs-security-update-for-pc-doctor-plugin-vulnerability" } ] } From 9416e604272aa84ffcf8a1faabec3f9e6961079f Mon Sep 17 00:00:00 2001 From: Wayne Beaton Date: Fri, 12 Mar 2021 16:33:47 -0500 Subject: [PATCH 312/845] Two CVEs for Eclipse Theia Signed-off-by: Wayne Beaton --- 2021/28xxx/CVE-2021-28161.json | 54 +++++++++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28162.json | 54 +++++++++++++++++++++++++++++++--- 2 files changed, 100 insertions(+), 8 deletions(-) diff --git a/2021/28xxx/CVE-2021-28161.json b/2021/28xxx/CVE-2021-28161.json index 6e1dcc0ce81..dd4d2633c9f 100644 --- a/2021/28xxx/CVE-2021-28161.json +++ b/2021/28xxx/CVE-2021-28161.json @@ -4,15 +4,61 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-28161", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@eclipse.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Eclipse Foundation", + "product": { + "product_data": [ + { + "product_name": "Eclipse Theia", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "1.8.0" + } + + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/eclipse-theia/theia/issues/8794", + "refsource": "CONFIRM", + "url": "https://github.com/eclipse-theia/theia/issues/8794" } ] } -} \ No newline at end of file +} diff --git a/2021/28xxx/CVE-2021-28162.json b/2021/28xxx/CVE-2021-28162.json index d01c9985692..7a162125cd4 100644 --- a/2021/28xxx/CVE-2021-28162.json +++ b/2021/28xxx/CVE-2021-28162.json @@ -4,15 +4,61 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-28162", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@eclipse.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Eclipse Foundation", + "product": { + "product_data": [ + { + "product_name": "Eclipse Theia", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "0.16.0" + } + + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-830: Inclusion of Web Functionality from an Untrusted Source" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/eclipse-theia/theia/issues/7283", + "refsource": "CONFIRM", + "url": "https://github.com/eclipse-theia/theia/issues/7283" } ] } -} \ No newline at end of file +} From a2d5d60badf7a20fa07a85c5bf51e1e2b2e28bf0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 22:00:45 +0000 Subject: [PATCH 313/845] "-Synchronized-Data." --- 2018/15xxx/CVE-2018-15120.json | 20 +++++++++++ 2020/29xxx/CVE-2020-29134.json | 2 +- 2020/29xxx/CVE-2020-29457.json | 2 +- 2021/27xxx/CVE-2021-27290.json | 61 +++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28092.json | 66 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28309.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28310.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28311.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28312.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28313.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28314.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28315.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28316.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28317.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28318.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28319.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28320.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28321.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28322.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28323.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28324.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28325.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28326.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28327.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28328.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28329.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28330.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28331.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28332.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28333.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28334.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28335.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28336.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28337.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28338.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28339.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28340.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28341.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28342.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28343.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28344.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28345.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28346.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28347.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28348.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28349.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28350.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28351.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28352.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28353.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28354.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28355.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28356.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28357.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28358.json | 18 ++++++++++ 55 files changed, 1037 insertions(+), 14 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28309.json create mode 100644 2021/28xxx/CVE-2021-28310.json create mode 100644 2021/28xxx/CVE-2021-28311.json create mode 100644 2021/28xxx/CVE-2021-28312.json create mode 100644 2021/28xxx/CVE-2021-28313.json create mode 100644 2021/28xxx/CVE-2021-28314.json create mode 100644 2021/28xxx/CVE-2021-28315.json create mode 100644 2021/28xxx/CVE-2021-28316.json create mode 100644 2021/28xxx/CVE-2021-28317.json create mode 100644 2021/28xxx/CVE-2021-28318.json create mode 100644 2021/28xxx/CVE-2021-28319.json create mode 100644 2021/28xxx/CVE-2021-28320.json create mode 100644 2021/28xxx/CVE-2021-28321.json create mode 100644 2021/28xxx/CVE-2021-28322.json create mode 100644 2021/28xxx/CVE-2021-28323.json create mode 100644 2021/28xxx/CVE-2021-28324.json create mode 100644 2021/28xxx/CVE-2021-28325.json create mode 100644 2021/28xxx/CVE-2021-28326.json create mode 100644 2021/28xxx/CVE-2021-28327.json create mode 100644 2021/28xxx/CVE-2021-28328.json create mode 100644 2021/28xxx/CVE-2021-28329.json create mode 100644 2021/28xxx/CVE-2021-28330.json create mode 100644 2021/28xxx/CVE-2021-28331.json create mode 100644 2021/28xxx/CVE-2021-28332.json create mode 100644 2021/28xxx/CVE-2021-28333.json create mode 100644 2021/28xxx/CVE-2021-28334.json create mode 100644 2021/28xxx/CVE-2021-28335.json create mode 100644 2021/28xxx/CVE-2021-28336.json create mode 100644 2021/28xxx/CVE-2021-28337.json create mode 100644 2021/28xxx/CVE-2021-28338.json create mode 100644 2021/28xxx/CVE-2021-28339.json create mode 100644 2021/28xxx/CVE-2021-28340.json create mode 100644 2021/28xxx/CVE-2021-28341.json create mode 100644 2021/28xxx/CVE-2021-28342.json create mode 100644 2021/28xxx/CVE-2021-28343.json create mode 100644 2021/28xxx/CVE-2021-28344.json create mode 100644 2021/28xxx/CVE-2021-28345.json create mode 100644 2021/28xxx/CVE-2021-28346.json create mode 100644 2021/28xxx/CVE-2021-28347.json create mode 100644 2021/28xxx/CVE-2021-28348.json create mode 100644 2021/28xxx/CVE-2021-28349.json create mode 100644 2021/28xxx/CVE-2021-28350.json create mode 100644 2021/28xxx/CVE-2021-28351.json create mode 100644 2021/28xxx/CVE-2021-28352.json create mode 100644 2021/28xxx/CVE-2021-28353.json create mode 100644 2021/28xxx/CVE-2021-28354.json create mode 100644 2021/28xxx/CVE-2021-28355.json create mode 100644 2021/28xxx/CVE-2021-28356.json create mode 100644 2021/28xxx/CVE-2021-28357.json create mode 100644 2021/28xxx/CVE-2021-28358.json diff --git a/2018/15xxx/CVE-2018-15120.json b/2018/15xxx/CVE-2018-15120.json index 3c5441b452a..fdb4e6cecf9 100644 --- a/2018/15xxx/CVE-2018-15120.json +++ b/2018/15xxx/CVE-2018-15120.json @@ -86,6 +86,26 @@ "refsource": "MISC", "name": "http://52.117.224.77/xfce4-pdos.webm", "url": "http://52.117.224.77/xfce4-pdos.webm" + }, + { + "refsource": "MISC", + "name": "https://www.ign.com/articles/2018/10/16/ps4s-are-reportedly-being-bricked-and-sony-is-working-on-a-fix", + "url": "https://www.ign.com/articles/2018/10/16/ps4s-are-reportedly-being-bricked-and-sony-is-working-on-a-fix" + }, + { + "refsource": "MISC", + "name": "https://www.reddit.com/r/PS4/comments/9o5efg/message_bricking_console_megathread/", + "url": "https://www.reddit.com/r/PS4/comments/9o5efg/message_bricking_console_megathread/" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/45263", + "url": "https://www.exploit-db.com/exploits/45263" + }, + { + "refsource": "MISC", + "name": "https://i.redd.it/v7p4n2ptu0s11.jpg", + "url": "https://i.redd.it/v7p4n2ptu0s11.jpg" } ] } diff --git a/2020/29xxx/CVE-2020-29134.json b/2020/29xxx/CVE-2020-29134.json index cd67b82c321..f6b2e5414b4 100644 --- a/2020/29xxx/CVE-2020-29134.json +++ b/2020/29xxx/CVE-2020-29134.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "TOTVS Fluig Platform allows directory traversal via a base64 encoded in paremeter \"file=../\" to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210209, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201222, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201201,Fluig Lake 1.7.0-201124, Fluig Lake 1.7.0-201117, Fluig Lake 1.7.0-201103, Fluig Lake 1.7.0-201027, Fluig Lake 1.7.0-201020, Fluig Lake 1.7.0-201013, Fluig Lake 1.7.0-201006, Fluig Lake 1.7.0-200915, Fluig Lake 1.7.0-200907, Fluig Lake 1.7.0-200901, Fluig Lake 1.7.0-200825, Fluig Lake 1.7.0-200818, Fluig Lake 1.7.0-200804, Fluig Lake 1.7.0-200616), Fluig 1.6.5-200915, Fluig 1.6.5-200128, Fluig 1.6.5-191029, and Fluig 1.6.4-181026." + "value": "The TOTVS Fluig platform allows path traversal through the parameter \"file = .. /\" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4" } ] }, diff --git a/2020/29xxx/CVE-2020-29457.json b/2020/29xxx/CVE-2020-29457.json index 2c57281ef54..53ef868b80e 100644 --- a/2020/29xxx/CVE-2020-29457.json +++ b/2020/29xxx/CVE-2020-29457.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates." + "value": "A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection." } ] }, diff --git a/2021/27xxx/CVE-2021-27290.json b/2021/27xxx/CVE-2021-27290.json index 691beda0f29..c33bb85c2b2 100644 --- a/2021/27xxx/CVE-2021-27290.json +++ b/2021/27xxx/CVE-2021-27290.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27290", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27290", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://npmjs.com", + "refsource": "MISC", + "name": "https://npmjs.com" + }, + { + "refsource": "MISC", + "name": "https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf", + "url": "https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf" } ] } diff --git a/2021/28xxx/CVE-2021-28092.json b/2021/28xxx/CVE-2021-28092.json index 3ab5f8f82a5..7831b5d0c85 100644 --- a/2021/28xxx/CVE-2021-28092.json +++ b/2021/28xxx/CVE-2021-28092.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28092", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28092", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/sindresorhus/is-svg/releases", + "refsource": "MISC", + "name": "https://github.com/sindresorhus/is-svg/releases" + }, + { + "url": "https://www.npmjs.com/package/is-svg", + "refsource": "MISC", + "name": "https://www.npmjs.com/package/is-svg" + }, + { + "refsource": "MISC", + "name": "https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2", + "url": "https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2" } ] } diff --git a/2021/28xxx/CVE-2021-28309.json b/2021/28xxx/CVE-2021-28309.json new file mode 100644 index 00000000000..37d3a688fdc --- /dev/null +++ b/2021/28xxx/CVE-2021-28309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28310.json b/2021/28xxx/CVE-2021-28310.json new file mode 100644 index 00000000000..422196ce9c7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28311.json b/2021/28xxx/CVE-2021-28311.json new file mode 100644 index 00000000000..d2e177047db --- /dev/null +++ b/2021/28xxx/CVE-2021-28311.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28311", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28312.json b/2021/28xxx/CVE-2021-28312.json new file mode 100644 index 00000000000..31f116b9f33 --- /dev/null +++ b/2021/28xxx/CVE-2021-28312.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28312", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28313.json b/2021/28xxx/CVE-2021-28313.json new file mode 100644 index 00000000000..8aaaf008f3c --- /dev/null +++ b/2021/28xxx/CVE-2021-28313.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28313", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28314.json b/2021/28xxx/CVE-2021-28314.json new file mode 100644 index 00000000000..533d36374d2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28314.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28314", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28315.json b/2021/28xxx/CVE-2021-28315.json new file mode 100644 index 00000000000..97ab9833b74 --- /dev/null +++ b/2021/28xxx/CVE-2021-28315.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28315", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28316.json b/2021/28xxx/CVE-2021-28316.json new file mode 100644 index 00000000000..33b36f2386c --- /dev/null +++ b/2021/28xxx/CVE-2021-28316.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28316", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28317.json b/2021/28xxx/CVE-2021-28317.json new file mode 100644 index 00000000000..12626fea9aa --- /dev/null +++ b/2021/28xxx/CVE-2021-28317.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28317", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28318.json b/2021/28xxx/CVE-2021-28318.json new file mode 100644 index 00000000000..ff2fb428972 --- /dev/null +++ b/2021/28xxx/CVE-2021-28318.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28318", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28319.json b/2021/28xxx/CVE-2021-28319.json new file mode 100644 index 00000000000..5e7767b6322 --- /dev/null +++ b/2021/28xxx/CVE-2021-28319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28320.json b/2021/28xxx/CVE-2021-28320.json new file mode 100644 index 00000000000..d6744e77d34 --- /dev/null +++ b/2021/28xxx/CVE-2021-28320.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28320", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28321.json b/2021/28xxx/CVE-2021-28321.json new file mode 100644 index 00000000000..af0a412b674 --- /dev/null +++ b/2021/28xxx/CVE-2021-28321.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28321", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28322.json b/2021/28xxx/CVE-2021-28322.json new file mode 100644 index 00000000000..34a71748bec --- /dev/null +++ b/2021/28xxx/CVE-2021-28322.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28322", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28323.json b/2021/28xxx/CVE-2021-28323.json new file mode 100644 index 00000000000..6748fe92ae6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28323.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28323", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28324.json b/2021/28xxx/CVE-2021-28324.json new file mode 100644 index 00000000000..9181102d94d --- /dev/null +++ b/2021/28xxx/CVE-2021-28324.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28324", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28325.json b/2021/28xxx/CVE-2021-28325.json new file mode 100644 index 00000000000..063e388c42a --- /dev/null +++ b/2021/28xxx/CVE-2021-28325.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28325", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28326.json b/2021/28xxx/CVE-2021-28326.json new file mode 100644 index 00000000000..4874a723ae1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28326.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28326", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28327.json b/2021/28xxx/CVE-2021-28327.json new file mode 100644 index 00000000000..e63ab82ea4d --- /dev/null +++ b/2021/28xxx/CVE-2021-28327.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28327", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28328.json b/2021/28xxx/CVE-2021-28328.json new file mode 100644 index 00000000000..1e14320e1a2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28328.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28328", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28329.json b/2021/28xxx/CVE-2021-28329.json new file mode 100644 index 00000000000..26501bc1581 --- /dev/null +++ b/2021/28xxx/CVE-2021-28329.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28329", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28330.json b/2021/28xxx/CVE-2021-28330.json new file mode 100644 index 00000000000..bfdeb0940ac --- /dev/null +++ b/2021/28xxx/CVE-2021-28330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28331.json b/2021/28xxx/CVE-2021-28331.json new file mode 100644 index 00000000000..6ea2c884b21 --- /dev/null +++ b/2021/28xxx/CVE-2021-28331.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28331", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28332.json b/2021/28xxx/CVE-2021-28332.json new file mode 100644 index 00000000000..287cfdd0a06 --- /dev/null +++ b/2021/28xxx/CVE-2021-28332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28333.json b/2021/28xxx/CVE-2021-28333.json new file mode 100644 index 00000000000..74bfdffb475 --- /dev/null +++ b/2021/28xxx/CVE-2021-28333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28334.json b/2021/28xxx/CVE-2021-28334.json new file mode 100644 index 00000000000..b9f3ac39ce3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28335.json b/2021/28xxx/CVE-2021-28335.json new file mode 100644 index 00000000000..83c33447e44 --- /dev/null +++ b/2021/28xxx/CVE-2021-28335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28336.json b/2021/28xxx/CVE-2021-28336.json new file mode 100644 index 00000000000..6d1f0119e91 --- /dev/null +++ b/2021/28xxx/CVE-2021-28336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28337.json b/2021/28xxx/CVE-2021-28337.json new file mode 100644 index 00000000000..5ce677066ff --- /dev/null +++ b/2021/28xxx/CVE-2021-28337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28338.json b/2021/28xxx/CVE-2021-28338.json new file mode 100644 index 00000000000..a26aed6ef46 --- /dev/null +++ b/2021/28xxx/CVE-2021-28338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28339.json b/2021/28xxx/CVE-2021-28339.json new file mode 100644 index 00000000000..46f1234828a --- /dev/null +++ b/2021/28xxx/CVE-2021-28339.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28339", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28340.json b/2021/28xxx/CVE-2021-28340.json new file mode 100644 index 00000000000..0d7602334d6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28340.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28340", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28341.json b/2021/28xxx/CVE-2021-28341.json new file mode 100644 index 00000000000..da8246b36d8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28341.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28341", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28342.json b/2021/28xxx/CVE-2021-28342.json new file mode 100644 index 00000000000..82cfaf37a6c --- /dev/null +++ b/2021/28xxx/CVE-2021-28342.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28342", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28343.json b/2021/28xxx/CVE-2021-28343.json new file mode 100644 index 00000000000..4e62a5bea4b --- /dev/null +++ b/2021/28xxx/CVE-2021-28343.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28343", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28344.json b/2021/28xxx/CVE-2021-28344.json new file mode 100644 index 00000000000..dcbdb323350 --- /dev/null +++ b/2021/28xxx/CVE-2021-28344.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28344", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28345.json b/2021/28xxx/CVE-2021-28345.json new file mode 100644 index 00000000000..eb5ed4e1470 --- /dev/null +++ b/2021/28xxx/CVE-2021-28345.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28345", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28346.json b/2021/28xxx/CVE-2021-28346.json new file mode 100644 index 00000000000..2764e85f7b9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28346.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28346", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28347.json b/2021/28xxx/CVE-2021-28347.json new file mode 100644 index 00000000000..a63ceabbe3f --- /dev/null +++ b/2021/28xxx/CVE-2021-28347.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28347", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28348.json b/2021/28xxx/CVE-2021-28348.json new file mode 100644 index 00000000000..bbf48a3d845 --- /dev/null +++ b/2021/28xxx/CVE-2021-28348.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28348", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28349.json b/2021/28xxx/CVE-2021-28349.json new file mode 100644 index 00000000000..473a7c190bf --- /dev/null +++ b/2021/28xxx/CVE-2021-28349.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28349", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28350.json b/2021/28xxx/CVE-2021-28350.json new file mode 100644 index 00000000000..858a0b0ce82 --- /dev/null +++ b/2021/28xxx/CVE-2021-28350.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28350", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28351.json b/2021/28xxx/CVE-2021-28351.json new file mode 100644 index 00000000000..141b1563de1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28351.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28351", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28352.json b/2021/28xxx/CVE-2021-28352.json new file mode 100644 index 00000000000..b3e3bc2e43d --- /dev/null +++ b/2021/28xxx/CVE-2021-28352.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28352", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28353.json b/2021/28xxx/CVE-2021-28353.json new file mode 100644 index 00000000000..47f1878f920 --- /dev/null +++ b/2021/28xxx/CVE-2021-28353.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28353", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28354.json b/2021/28xxx/CVE-2021-28354.json new file mode 100644 index 00000000000..12b4cb790fb --- /dev/null +++ b/2021/28xxx/CVE-2021-28354.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28354", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28355.json b/2021/28xxx/CVE-2021-28355.json new file mode 100644 index 00000000000..d98625ca8f2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28356.json b/2021/28xxx/CVE-2021-28356.json new file mode 100644 index 00000000000..43f553571c5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28356.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28356", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28357.json b/2021/28xxx/CVE-2021-28357.json new file mode 100644 index 00000000000..6af8c92fc12 --- /dev/null +++ b/2021/28xxx/CVE-2021-28357.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28357", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28358.json b/2021/28xxx/CVE-2021-28358.json new file mode 100644 index 00000000000..5797d9592fc --- /dev/null +++ b/2021/28xxx/CVE-2021-28358.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28358", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 8ca56eb1169364c34b37e25c3a22073223e44f70 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Mar 2021 23:00:43 +0000 Subject: [PATCH 314/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 2021/22xxx/CVE-2021-22880.json | 5 +++++ 2021/22xxx/CVE-2021-22881.json | 5 +++++ 2021/23xxx/CVE-2021-23336.json | 5 +++++ 4 files changed, 20 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 3600c643ae9..a5d20357a74 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -480,6 +480,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210312 [jira] [Updated] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210312 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/22xxx/CVE-2021-22880.json b/2021/22xxx/CVE-2021-22880.json index a889e694a37..2556a8f13d8 100644 --- a/2021/22xxx/CVE-2021-22880.json +++ b/2021/22xxx/CVE-2021-22880.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129", "url": "https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b571fca1b8", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/" } ] }, diff --git a/2021/22xxx/CVE-2021-22881.json b/2021/22xxx/CVE-2021-22881.json index a77e67c39ad..22ede7ea544 100644 --- a/2021/22xxx/CVE-2021-22881.json +++ b/2021/22xxx/CVE-2021-22881.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/", "url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b571fca1b8", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/" } ] }, diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index 23753f80f4c..44be63fed3e 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -149,6 +149,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-b326fcb83f", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-1bb399a5af", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/" } ] }, From 028970bf10c5e8963d7840717a6e6bb2c4085428 Mon Sep 17 00:00:00 2001 From: swpsirt <42012556+swpsirt@users.noreply.github.com> Date: Fri, 12 Mar 2021 18:02:50 -0800 Subject: [PATCH 315/845] SonicWall SMA100 two CVE commit SonicWall SMA100 CVE-2021-20017 and CVE-2021-20018 commit --- 2021/20xxx/CVE-2021-20017.json | 74 +++++++++++++++++++++++++++------- 2021/20xxx/CVE-2021-20018.json | 74 +++++++++++++++++++++++++++------- 2 files changed, 118 insertions(+), 30 deletions(-) diff --git a/2021/20xxx/CVE-2021-20017.json b/2021/20xxx/CVE-2021-20017.json index e3ed9d5eab1..57b8f68fb81 100644 --- a/2021/20xxx/CVE-2021-20017.json +++ b/2021/20xxx/CVE-2021-20017.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20017", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "psirt@sonicwall.com", + "ID": "CVE-2021-20017", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SMA100", + "version": { + "version_data": [ + { + "version_value": "10.2.0.5 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" + } + ] } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004" + } + ] + } } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20018.json b/2021/20xxx/CVE-2021-20018.json index 29ff45e2355..004f93d9aba 100644 --- a/2021/20xxx/CVE-2021-20018.json +++ b/2021/20xxx/CVE-2021-20018.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20018", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "psirt@sonicwall.com", + "ID": "CVE-2021-20018", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SMA100", + "version": { + "version_data": [ + { + "version_value": "10.2.0.5 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" + } + ] } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005" + } + ] + } } \ No newline at end of file From f703bd8d979f4bd7d9600a41ce0f5915704ccb63 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 03:00:41 +0000 Subject: [PATCH 316/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20017.json | 112 ++++++++++++++++----------------- 2021/20xxx/CVE-2021-20018.json | 112 ++++++++++++++++----------------- 2 files changed, 112 insertions(+), 112 deletions(-) diff --git a/2021/20xxx/CVE-2021-20017.json b/2021/20xxx/CVE-2021-20017.json index 57b8f68fb81..3d6942e9a33 100644 --- a/2021/20xxx/CVE-2021-20017.json +++ b/2021/20xxx/CVE-2021-20017.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@sonicwall.com", - "ID": "CVE-2021-20017", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "SMA100", - "version": { - "version_data": [ - { - "version_value": "10.2.0.5 and earlier" - } - ] + "CVE_data_meta": { + "ASSIGNER": "PSIRT@sonicwall.com", + "ID": "CVE-2021-20017", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SMA100", + "version": { + "version_data": [ + { + "version_value": "10.2.0.5 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" } - } ] - }, - "vendor_name": "SonicWall" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004", - "refsource": "CONFIRM", - "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004" - } - ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004" + } + ] + } } \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20018.json b/2021/20xxx/CVE-2021-20018.json index 004f93d9aba..2b0ecc6d651 100644 --- a/2021/20xxx/CVE-2021-20018.json +++ b/2021/20xxx/CVE-2021-20018.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@sonicwall.com", - "ID": "CVE-2021-20018", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "SMA100", - "version": { - "version_data": [ - { - "version_value": "10.2.0.5 and earlier" - } - ] + "CVE_data_meta": { + "ASSIGNER": "PSIRT@sonicwall.com", + "ID": "CVE-2021-20018", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SMA100", + "version": { + "version_data": [ + { + "version_value": "10.2.0.5 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" } - } ] - }, - "vendor_name": "SonicWall" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005", - "refsource": "CONFIRM", - "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005" - } - ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005" + } + ] + } } \ No newline at end of file From 564b318e6ca0cad6fa5714227463ac3cfc9af49f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 06:00:38 +0000 Subject: [PATCH 317/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index a5d20357a74..0f3843f13b4 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -485,6 +485,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210312 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210312 [jira] [Assigned] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E" } ] } From 14ae1c4f9a0fa0acb02d7d1b6ec137682757541e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 07:00:40 +0000 Subject: [PATCH 318/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 0f3843f13b4..085b2f67830 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -490,6 +490,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210312 [jira] [Assigned] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210313 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E" } ] } From d934d3f9d8b7ef51cabfdb4b032d4749e77e0a29 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 08:00:42 +0000 Subject: [PATCH 319/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28359.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28359.json diff --git a/2021/28xxx/CVE-2021-28359.json b/2021/28xxx/CVE-2021-28359.json new file mode 100644 index 00000000000..80952fadd49 --- /dev/null +++ b/2021/28xxx/CVE-2021-28359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From c11010628be838f11b29d5290ed1e60d9123a134 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 12:00:43 +0000 Subject: [PATCH 320/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35523.json | 5 +++++ 2020/35xxx/CVE-2020-35524.json | 5 +++++ 2021/21xxx/CVE-2021-21381.json | 5 +++++ 3 files changed, 15 insertions(+) diff --git a/2020/35xxx/CVE-2020-35523.json b/2020/35xxx/CVE-2020-35523.json index 643976ac219..2720baf9252 100644 --- a/2020/35xxx/CVE-2020-35523.json +++ b/2020/35xxx/CVE-2020-35523.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932040" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4869", + "url": "https://www.debian.org/security/2021/dsa-4869" } ] }, diff --git a/2020/35xxx/CVE-2020-35524.json b/2020/35xxx/CVE-2020-35524.json index 489885c57d4..5216c6d6019 100644 --- a/2020/35xxx/CVE-2020-35524.json +++ b/2020/35xxx/CVE-2020-35524.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932044" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4869", + "url": "https://www.debian.org/security/2021/dsa-4869" } ] }, diff --git a/2021/21xxx/CVE-2021-21381.json b/2021/21xxx/CVE-2021-21381.json index 0a617d302f9..35036fc416e 100644 --- a/2021/21xxx/CVE-2021-21381.json +++ b/2021/21xxx/CVE-2021-21381.json @@ -98,6 +98,11 @@ "name": "https://github.com/flatpak/flatpak/releases/tag/1.10.2", "refsource": "MISC", "url": "https://github.com/flatpak/flatpak/releases/tag/1.10.2" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4868", + "url": "https://www.debian.org/security/2021/dsa-4868" } ] }, From 6e2d635f3d5449b3a5c0e65656451fe6647a01ee Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 19:00:39 +0000 Subject: [PATCH 321/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35682.json | 56 ++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28360.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28361.json | 62 ++++++++++++++++++++++++++++++++++ 3 files changed, 130 insertions(+), 6 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28360.json create mode 100644 2021/28xxx/CVE-2021-28361.json diff --git a/2020/35xxx/CVE-2020-35682.json b/2020/35xxx/CVE-2020-35682.json index 08644d13c92..cba1e26f309 100644 --- a/2020/35xxx/CVE-2020-35682.json +++ b/2020/35xxx/CVE-2020-35682.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35682", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35682", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine ServiceDesk Plus before 11134 allows an Authentication Bypass (only during SAML login)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/service-desk/on-premises/readme.html#11134", + "url": "https://www.manageengine.com/products/service-desk/on-premises/readme.html#11134" } ] } diff --git a/2021/28xxx/CVE-2021-28360.json b/2021/28xxx/CVE-2021-28360.json new file mode 100644 index 00000000000..e8ef1a9d0be --- /dev/null +++ b/2021/28xxx/CVE-2021-28360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28361.json b/2021/28xxx/CVE-2021-28361.json new file mode 100644 index 00000000000..0de97584b55 --- /dev/null +++ b/2021/28xxx/CVE-2021-28361.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28361", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Storage Performance Development Kit (SPDK) before 20.01.01. If a PDU is sent to the iSCSI target with a zero length (but data is expected), the iSCSI target can crash with a NULL pointer dereference." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spdk/spdk/releases/tag/v21.01.1", + "refsource": "MISC", + "name": "https://github.com/spdk/spdk/releases/tag/v21.01.1" + } + ] + } +} \ No newline at end of file From 7ede63a2b141acbaa7d8091eb751a6e391cc87a1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 20:00:40 +0000 Subject: [PATCH 322/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28362.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28363.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28364.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28365.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28366.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28367.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28368.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28369.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28370.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28371.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28372.json | 18 ++++++++++++++++++ 11 files changed, 198 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28362.json create mode 100644 2021/28xxx/CVE-2021-28363.json create mode 100644 2021/28xxx/CVE-2021-28364.json create mode 100644 2021/28xxx/CVE-2021-28365.json create mode 100644 2021/28xxx/CVE-2021-28366.json create mode 100644 2021/28xxx/CVE-2021-28367.json create mode 100644 2021/28xxx/CVE-2021-28368.json create mode 100644 2021/28xxx/CVE-2021-28369.json create mode 100644 2021/28xxx/CVE-2021-28370.json create mode 100644 2021/28xxx/CVE-2021-28371.json create mode 100644 2021/28xxx/CVE-2021-28372.json diff --git a/2021/28xxx/CVE-2021-28362.json b/2021/28xxx/CVE-2021-28362.json new file mode 100644 index 00000000000..50a2085b810 --- /dev/null +++ b/2021/28xxx/CVE-2021-28362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28363.json b/2021/28xxx/CVE-2021-28363.json new file mode 100644 index 00000000000..c2dd3ef5958 --- /dev/null +++ b/2021/28xxx/CVE-2021-28363.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28363", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28364.json b/2021/28xxx/CVE-2021-28364.json new file mode 100644 index 00000000000..a9aa0ee3bbe --- /dev/null +++ b/2021/28xxx/CVE-2021-28364.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28364", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28365.json b/2021/28xxx/CVE-2021-28365.json new file mode 100644 index 00000000000..2296331fc63 --- /dev/null +++ b/2021/28xxx/CVE-2021-28365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28366.json b/2021/28xxx/CVE-2021-28366.json new file mode 100644 index 00000000000..4435819b878 --- /dev/null +++ b/2021/28xxx/CVE-2021-28366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28367.json b/2021/28xxx/CVE-2021-28367.json new file mode 100644 index 00000000000..db88000162c --- /dev/null +++ b/2021/28xxx/CVE-2021-28367.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28367", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28368.json b/2021/28xxx/CVE-2021-28368.json new file mode 100644 index 00000000000..1019c740241 --- /dev/null +++ b/2021/28xxx/CVE-2021-28368.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28368", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28369.json b/2021/28xxx/CVE-2021-28369.json new file mode 100644 index 00000000000..1c2920f2cf7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28369.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28369", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28370.json b/2021/28xxx/CVE-2021-28370.json new file mode 100644 index 00000000000..b78e8d86d54 --- /dev/null +++ b/2021/28xxx/CVE-2021-28370.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28370", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28371.json b/2021/28xxx/CVE-2021-28371.json new file mode 100644 index 00000000000..2b0c9f87e84 --- /dev/null +++ b/2021/28xxx/CVE-2021-28371.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28371", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28372.json b/2021/28xxx/CVE-2021-28372.json new file mode 100644 index 00000000000..dc7d241ec57 --- /dev/null +++ b/2021/28xxx/CVE-2021-28372.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28372", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 7f5c23c84cd6f17b63549dc92895f4d632644d5c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 21:00:41 +0000 Subject: [PATCH 323/845] "-Synchronized-Data." --- 2017/15xxx/CVE-2017-15041.json | 10 +++++ 2018/16xxx/CVE-2018-16873.json | 10 +++++ 2018/16xxx/CVE-2018-16874.json | 10 +++++ 2019/16xxx/CVE-2019-16276.json | 10 +++++ 2019/17xxx/CVE-2019-17596.json | 10 +++++ 2019/9xxx/CVE-2019-9741.json | 10 +++++ 2021/28xxx/CVE-2021-28373.json | 67 ++++++++++++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3114.json | 10 +++++ 8 files changed, 137 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28373.json diff --git a/2017/15xxx/CVE-2017-15041.json b/2017/15xxx/CVE-2017-15041.json index 1e3debb80e0..07f68c1b5ea 100644 --- a/2017/15xxx/CVE-2017-15041.json +++ b/2017/15xxx/CVE-2017-15041.json @@ -91,6 +91,16 @@ "name": "https://github.com/golang/go/issues/22125", "refsource": "CONFIRM", "url": "https://github.com/golang/go/issues/22125" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } diff --git a/2018/16xxx/CVE-2018-16873.json b/2018/16xxx/CVE-2018-16873.json index eebc6a02342..84dc875ba2d 100644 --- a/2018/16xxx/CVE-2018-16873.json +++ b/2018/16xxx/CVE-2018-16873.json @@ -114,6 +114,16 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0554", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } diff --git a/2018/16xxx/CVE-2018-16874.json b/2018/16xxx/CVE-2018-16874.json index 72819ec9137..81acdeb26a4 100644 --- a/2018/16xxx/CVE-2018-16874.json +++ b/2018/16xxx/CVE-2018-16874.json @@ -114,6 +114,16 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0554", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } diff --git a/2019/16xxx/CVE-2019-16276.json b/2019/16xxx/CVE-2019-16276.json index cb63130bc43..33bae14231c 100644 --- a/2019/16xxx/CVE-2019-16276.json +++ b/2019/16xxx/CVE-2019-16276.json @@ -106,6 +106,16 @@ "refsource": "REDHAT", "name": "RHSA-2020:0652", "url": "https://access.redhat.com/errata/RHSA-2020:0652" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } diff --git a/2019/17xxx/CVE-2019-17596.json b/2019/17xxx/CVE-2019-17596.json index e3e2fcf482c..3a8938ed677 100644 --- a/2019/17xxx/CVE-2019-17596.json +++ b/2019/17xxx/CVE-2019-17596.json @@ -101,6 +101,16 @@ "refsource": "REDHAT", "name": "RHSA-2020:0329", "url": "https://access.redhat.com/errata/RHSA-2020:0329" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } diff --git a/2019/9xxx/CVE-2019-9741.json b/2019/9xxx/CVE-2019-9741.json index 891d053bce1..ff28eab563f 100644 --- a/2019/9xxx/CVE-2019-9741.json +++ b/2019/9xxx/CVE-2019-9741.json @@ -81,6 +81,16 @@ "refsource": "REDHAT", "name": "RHSA-2019:1519", "url": "https://access.redhat.com/errata/RHSA-2019:1519" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } diff --git a/2021/28xxx/CVE-2021-28373.json b/2021/28xxx/CVE-2021-28373.json new file mode 100644 index 00000000000..3b6a47c3bea --- /dev/null +++ b/2021/28xxx/CVE-2021-28373.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28373", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The auth_internal plugin in Tiny Tiny RSS (aka tt-rss) before 2021-03-12 allows an attacker to log in via the OTP code without a valid password. NOTE: this issue only affected the git master branch for a short time. However, all end users are explicitly directed to use the git master branch in production. Semantic version numbers such as 21.03 appear to exist, but are automatically generated from the year and month. They are not releases." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://community.tt-rss.org/t/check-password-not-called-if-otp-is-enabled-update-asap-if-youre-using-2fa/4502", + "refsource": "MISC", + "name": "https://community.tt-rss.org/t/check-password-not-called-if-otp-is-enabled-update-asap-if-youre-using-2fa/4502" + }, + { + "url": "https://git.tt-rss.org/fox/tt-rss/commit/4949e1a59059d9e72ba7a98f783cec312c06c6d2", + "refsource": "MISC", + "name": "https://git.tt-rss.org/fox/tt-rss/commit/4949e1a59059d9e72ba7a98f783cec312c06c6d2" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3114.json b/2021/3xxx/CVE-2021-3114.json index e349394f868..ab379c21e1a 100644 --- a/2021/3xxx/CVE-2021-3114.json +++ b/2021/3xxx/CVE-2021-3114.json @@ -76,6 +76,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0001/", "url": "https://security.netapp.com/advisory/ntap-20210219-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html" } ] } From c8dd556e741913a1e0a0c992d6f3f0d4c9a04d3f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 13 Mar 2021 23:00:42 +0000 Subject: [PATCH 324/845] "-Synchronized-Data." --- 2021/22xxx/CVE-2021-22880.json | 5 +++++ 2021/23xxx/CVE-2021-23336.json | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/2021/22xxx/CVE-2021-22880.json b/2021/22xxx/CVE-2021-22880.json index 2556a8f13d8..1305887cda4 100644 --- a/2021/22xxx/CVE-2021-22880.json +++ b/2021/22xxx/CVE-2021-22880.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-b571fca1b8", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-def0e32233", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/" } ] }, diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index 44be63fed3e..f327f9fc06c 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -154,6 +154,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-1bb399a5af", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-ef83e8525a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/" } ] }, From cbe9e4dab2e71750a34af8f51702f2a91c0db31c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 14 Mar 2021 23:00:41 +0000 Subject: [PATCH 325/845] "-Synchronized-Data." --- 2020/5xxx/CVE-2020-5258.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/5xxx/CVE-2020-5258.json b/2020/5xxx/CVE-2020-5258.json index 9ce70fee718..7e292b176e7 100644 --- a/2020/5xxx/CVE-2020-5258.json +++ b/2020/5xxx/CVE-2020-5258.json @@ -105,6 +105,11 @@ "refsource": "MLIST", "name": "[qpid-users] 20210309 Addressing CVE-2020-5258 in Qpid Broker-J", "url": "https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[qpid-users] 20210314 Re: Addressing CVE-2020-5258 in Qpid Broker-J", + "url": "https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E" } ] }, From 568cd33b7073e9aa834dd089ebead0926d579abf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 03:00:41 +0000 Subject: [PATCH 326/845] "-Synchronized-Data." --- 2020/28xxx/CVE-2020-28493.json | 7 ++++++- 2020/29xxx/CVE-2020-29385.json | 5 +++++ 2020/35xxx/CVE-2020-35654.json | 10 ++++++++++ 2021/21xxx/CVE-2021-21334.json | 10 ++++++++++ 2021/23xxx/CVE-2021-23336.json | 10 ++++++++++ 2021/26xxx/CVE-2021-26926.json | 10 ++++++++++ 2021/26xxx/CVE-2021-26927.json | 10 ++++++++++ 2021/27xxx/CVE-2021-27218.json | 5 +++++ 2021/27xxx/CVE-2021-27219.json | 5 +++++ 2021/27xxx/CVE-2021-27921.json | 10 ++++++++++ 2021/27xxx/CVE-2021-27922.json | 10 ++++++++++ 2021/27xxx/CVE-2021-27923.json | 10 ++++++++++ 12 files changed, 101 insertions(+), 1 deletion(-) diff --git a/2020/28xxx/CVE-2020-28493.json b/2020/28xxx/CVE-2020-28493.json index 3d9a400b0a8..78605b1c180 100644 --- a/2020/28xxx/CVE-2020-28493.json +++ b/2020/28xxx/CVE-2020-28493.json @@ -65,6 +65,11 @@ "refsource": "MISC", "url": "https://github.com/pallets/jinja/pull/1343", "name": "https://github.com/pallets/jinja/pull/1343" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-2ab8ebcabc", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVAKCOO7VBVUBM3Q6CBBTPBFNP5NDXF4/" } ] }, @@ -98,4 +103,4 @@ "value": "Yeting Li" } ] -} +} \ No newline at end of file diff --git a/2020/29xxx/CVE-2020-29385.json b/2020/29xxx/CVE-2020-29385.json index ba35fba2814..bdd0ee47015 100644 --- a/2020/29xxx/CVE-2020-29385.json +++ b/2020/29xxx/CVE-2020-29385.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-2e59756cbe", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EANWYODLOJDFLMBH6WEKJJMQ5PKLEWML/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-755ba8968a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5H3GNVWMZTYZR3JBYCK57PF7PFMQBNP/" } ] } diff --git a/2020/35xxx/CVE-2020-35654.json b/2020/35xxx/CVE-2020-35654.json index fcd6ad39cc6..a51bf267ff4 100644 --- a/2020/35xxx/CVE-2020-35654.json +++ b/2020/35xxx/CVE-2020-35654.json @@ -66,6 +66,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-880aa7bd27", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-0ece308612", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-15845d3abe", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/" } ] } diff --git a/2021/21xxx/CVE-2021-21334.json b/2021/21xxx/CVE-2021-21334.json index 932f68f7ed2..120e49a8d34 100644 --- a/2021/21xxx/CVE-2021-21334.json +++ b/2021/21xxx/CVE-2021-21334.json @@ -91,6 +91,16 @@ "name": "https://github.com/containerd/containerd/commit/05f951a3781f4f2c1911b05e61c160e9c30eaa8e", "refsource": "MISC", "url": "https://github.com/containerd/containerd/commit/05f951a3781f4f2c1911b05e61c160e9c30eaa8e" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-470fa24f5b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUE2Z2ZUWBHRU36ZGBD2YSJCYB6ELPXE/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-10ce8fcbf1", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIBPKSX5IOWPM3ZPFB3JVLXWDHSZTTWT/" } ] }, diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index f327f9fc06c..cccbd066d7e 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -159,6 +159,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-ef83e8525a", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b76ede8f4d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-309bc2e727", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/" } ] }, diff --git a/2021/26xxx/CVE-2021-26926.json b/2021/26xxx/CVE-2021-26926.json index 1829a525d15..59cd81a18f1 100644 --- a/2021/26xxx/CVE-2021-26926.json +++ b/2021/26xxx/CVE-2021-26926.json @@ -53,6 +53,16 @@ "refsource": "MISC", "name": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b", "url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-7f3323a767", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-56a49b0bc6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/" } ] }, diff --git a/2021/26xxx/CVE-2021-26927.json b/2021/26xxx/CVE-2021-26927.json index 1238c5a7c60..ceb9bc36434 100644 --- a/2021/26xxx/CVE-2021-26927.json +++ b/2021/26xxx/CVE-2021-26927.json @@ -53,6 +53,16 @@ "refsource": "MISC", "name": "https://github.com/jasper-software/jasper/issues/265", "url": "https://github.com/jasper-software/jasper/issues/265" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-7f3323a767", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-56a49b0bc6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/" } ] }, diff --git a/2021/27xxx/CVE-2021-27218.json b/2021/27xxx/CVE-2021-27218.json index d255032798b..ccc51abfbcf 100644 --- a/2021/27xxx/CVE-2021-27218.json +++ b/2021/27xxx/CVE-2021-27218.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-7c71cda8da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/" } ] } diff --git a/2021/27xxx/CVE-2021-27219.json b/2021/27xxx/CVE-2021-27219.json index c22605c9c4b..6712597b69a 100644 --- a/2021/27xxx/CVE-2021-27219.json +++ b/2021/27xxx/CVE-2021-27219.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-7c71cda8da", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/" } ] } diff --git a/2021/27xxx/CVE-2021-27921.json b/2021/27xxx/CVE-2021-27921.json index af9346f3e9f..afc73a0a81a 100644 --- a/2021/27xxx/CVE-2021-27921.json +++ b/2021/27xxx/CVE-2021-27921.json @@ -56,6 +56,16 @@ "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html", "refsource": "MISC", "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-0ece308612", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-15845d3abe", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/" } ] } diff --git a/2021/27xxx/CVE-2021-27922.json b/2021/27xxx/CVE-2021-27922.json index a39d1913306..87cb1fcd080 100644 --- a/2021/27xxx/CVE-2021-27922.json +++ b/2021/27xxx/CVE-2021-27922.json @@ -56,6 +56,16 @@ "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html", "refsource": "MISC", "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-0ece308612", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-15845d3abe", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/" } ] } diff --git a/2021/27xxx/CVE-2021-27923.json b/2021/27xxx/CVE-2021-27923.json index c7d47362767..98e60eebd63 100644 --- a/2021/27xxx/CVE-2021-27923.json +++ b/2021/27xxx/CVE-2021-27923.json @@ -56,6 +56,16 @@ "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html", "refsource": "MISC", "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-0ece308612", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-15845d3abe", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/" } ] } From 7846752964c73a0b49d0963c243f46695762db51 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 05:00:41 +0000 Subject: [PATCH 327/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28374.json | 62 +++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28375.json | 67 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28376.json | 18 +++++++++ 2021/28xxx/CVE-2021-28377.json | 18 +++++++++ 4 files changed, 165 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28374.json create mode 100644 2021/28xxx/CVE-2021-28375.json create mode 100644 2021/28xxx/CVE-2021-28376.json create mode 100644 2021/28xxx/CVE-2021-28377.json diff --git a/2021/28xxx/CVE-2021-28374.json b/2021/28xxx/CVE-2021-28374.json new file mode 100644 index 00000000000..18625989209 --- /dev/null +++ b/2021/28xxx/CVE-2021-28374.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28374", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.debian.org/984810", + "refsource": "MISC", + "name": "https://bugs.debian.org/984810" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28375.json b/2021/28xxx/CVE-2021-28375.json new file mode 100644 index 00000000000..45e56b1070a --- /dev/null +++ b/2021/28xxx/CVE-2021-28375.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28375", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/linus/20c40794eb85ea29852d7bc37c55713802a543d6", + "refsource": "MISC", + "name": "https://git.kernel.org/linus/20c40794eb85ea29852d7bc37c55713802a543d6" + }, + { + "url": "https://lore.kernel.org/stable/YD03ew7+6v0XPh6l@kroah.com/", + "refsource": "MISC", + "name": "https://lore.kernel.org/stable/YD03ew7+6v0XPh6l@kroah.com/" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28376.json b/2021/28xxx/CVE-2021-28376.json new file mode 100644 index 00000000000..ee571e22242 --- /dev/null +++ b/2021/28xxx/CVE-2021-28376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28377.json b/2021/28xxx/CVE-2021-28377.json new file mode 100644 index 00000000000..e54b8f4e300 --- /dev/null +++ b/2021/28xxx/CVE-2021-28377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 1575690987ce32c13d9a88de4f8a011434324159 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 06:00:39 +0000 Subject: [PATCH 328/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28378.json | 81 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28379.json | 62 ++++++++++++++++++++++++++ 2 files changed, 143 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28378.json create mode 100644 2021/28xxx/CVE-2021-28379.json diff --git a/2021/28xxx/CVE-2021-28378.json b/2021/28xxx/CVE-2021-28378.json new file mode 100644 index 00000000000..c5c41d55d57 --- /dev/null +++ b/2021/28xxx/CVE-2021-28378.json @@ -0,0 +1,81 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28378", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/go-gitea/gitea/pull/14898", + "refsource": "MISC", + "name": "https://github.com/go-gitea/gitea/pull/14898" + }, + { + "url": "https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/", + "refsource": "MISC", + "name": "https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AC:H/AV:N/A:N/C:L/I:L/PR:L/S:U/UI:R", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28379.json b/2021/28xxx/CVE-2021-28379.json new file mode 100644 index 00000000000..01d5757670a --- /dev/null +++ b/2021/28xxx/CVE-2021-28379.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28379", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "web/upload/UploadHandler.php in Vesta Control Panel (aka VestaCP) through 0.9.8-27 and myVesta through 0.9.8-26-39 allows uploads from a different origin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/myvesta/vesta/commit/3402071e950e76b79fa8672a1e09b70d3860f355", + "refsource": "MISC", + "name": "https://github.com/myvesta/vesta/commit/3402071e950e76b79fa8672a1e09b70d3860f355" + } + ] + } +} \ No newline at end of file From d144ae144ca18c412c8e0120cf8154e288cd5117 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 07:00:47 +0000 Subject: [PATCH 329/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28380.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28381.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28382.json | 18 ++++++++++++++++++ 3 files changed, 54 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28380.json create mode 100644 2021/28xxx/CVE-2021-28381.json create mode 100644 2021/28xxx/CVE-2021-28382.json diff --git a/2021/28xxx/CVE-2021-28380.json b/2021/28xxx/CVE-2021-28380.json new file mode 100644 index 00000000000..04d3315ac95 --- /dev/null +++ b/2021/28xxx/CVE-2021-28380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28381.json b/2021/28xxx/CVE-2021-28381.json new file mode 100644 index 00000000000..88ff298b303 --- /dev/null +++ b/2021/28xxx/CVE-2021-28381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28382.json b/2021/28xxx/CVE-2021-28382.json new file mode 100644 index 00000000000..a36d4b4d257 --- /dev/null +++ b/2021/28xxx/CVE-2021-28382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 89c8781cad27221a3b38462a8238db4aa435688d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 08:00:41 +0000 Subject: [PATCH 330/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28383.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28384.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28385.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28386.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28387.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28388.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28389.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28390.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28391.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28392.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28393.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28394.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28395.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28396.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28397.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28398.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28399.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28400.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28401.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28402.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28403.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28404.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28405.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28406.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28407.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28408.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28409.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28410.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28411.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28412.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28413.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28414.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28415.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28416.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28417.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28418.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28419.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28420.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28421.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28422.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28423.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28424.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28425.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28426.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28427.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28428.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28429.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28430.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28431.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28432.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28433.json | 18 ++++++++++++++++++ 51 files changed, 918 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28383.json create mode 100644 2021/28xxx/CVE-2021-28384.json create mode 100644 2021/28xxx/CVE-2021-28385.json create mode 100644 2021/28xxx/CVE-2021-28386.json create mode 100644 2021/28xxx/CVE-2021-28387.json create mode 100644 2021/28xxx/CVE-2021-28388.json create mode 100644 2021/28xxx/CVE-2021-28389.json create mode 100644 2021/28xxx/CVE-2021-28390.json create mode 100644 2021/28xxx/CVE-2021-28391.json create mode 100644 2021/28xxx/CVE-2021-28392.json create mode 100644 2021/28xxx/CVE-2021-28393.json create mode 100644 2021/28xxx/CVE-2021-28394.json create mode 100644 2021/28xxx/CVE-2021-28395.json create mode 100644 2021/28xxx/CVE-2021-28396.json create mode 100644 2021/28xxx/CVE-2021-28397.json create mode 100644 2021/28xxx/CVE-2021-28398.json create mode 100644 2021/28xxx/CVE-2021-28399.json create mode 100644 2021/28xxx/CVE-2021-28400.json create mode 100644 2021/28xxx/CVE-2021-28401.json create mode 100644 2021/28xxx/CVE-2021-28402.json create mode 100644 2021/28xxx/CVE-2021-28403.json create mode 100644 2021/28xxx/CVE-2021-28404.json create mode 100644 2021/28xxx/CVE-2021-28405.json create mode 100644 2021/28xxx/CVE-2021-28406.json create mode 100644 2021/28xxx/CVE-2021-28407.json create mode 100644 2021/28xxx/CVE-2021-28408.json create mode 100644 2021/28xxx/CVE-2021-28409.json create mode 100644 2021/28xxx/CVE-2021-28410.json create mode 100644 2021/28xxx/CVE-2021-28411.json create mode 100644 2021/28xxx/CVE-2021-28412.json create mode 100644 2021/28xxx/CVE-2021-28413.json create mode 100644 2021/28xxx/CVE-2021-28414.json create mode 100644 2021/28xxx/CVE-2021-28415.json create mode 100644 2021/28xxx/CVE-2021-28416.json create mode 100644 2021/28xxx/CVE-2021-28417.json create mode 100644 2021/28xxx/CVE-2021-28418.json create mode 100644 2021/28xxx/CVE-2021-28419.json create mode 100644 2021/28xxx/CVE-2021-28420.json create mode 100644 2021/28xxx/CVE-2021-28421.json create mode 100644 2021/28xxx/CVE-2021-28422.json create mode 100644 2021/28xxx/CVE-2021-28423.json create mode 100644 2021/28xxx/CVE-2021-28424.json create mode 100644 2021/28xxx/CVE-2021-28425.json create mode 100644 2021/28xxx/CVE-2021-28426.json create mode 100644 2021/28xxx/CVE-2021-28427.json create mode 100644 2021/28xxx/CVE-2021-28428.json create mode 100644 2021/28xxx/CVE-2021-28429.json create mode 100644 2021/28xxx/CVE-2021-28430.json create mode 100644 2021/28xxx/CVE-2021-28431.json create mode 100644 2021/28xxx/CVE-2021-28432.json create mode 100644 2021/28xxx/CVE-2021-28433.json diff --git a/2021/28xxx/CVE-2021-28383.json b/2021/28xxx/CVE-2021-28383.json new file mode 100644 index 00000000000..d73018a9f2d --- /dev/null +++ b/2021/28xxx/CVE-2021-28383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28384.json b/2021/28xxx/CVE-2021-28384.json new file mode 100644 index 00000000000..1f0d2d6fd01 --- /dev/null +++ b/2021/28xxx/CVE-2021-28384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28385.json b/2021/28xxx/CVE-2021-28385.json new file mode 100644 index 00000000000..e1b4546e28c --- /dev/null +++ b/2021/28xxx/CVE-2021-28385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28386.json b/2021/28xxx/CVE-2021-28386.json new file mode 100644 index 00000000000..6534d94bd5c --- /dev/null +++ b/2021/28xxx/CVE-2021-28386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28387.json b/2021/28xxx/CVE-2021-28387.json new file mode 100644 index 00000000000..197c38967d8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28388.json b/2021/28xxx/CVE-2021-28388.json new file mode 100644 index 00000000000..7c340859ab9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28389.json b/2021/28xxx/CVE-2021-28389.json new file mode 100644 index 00000000000..b24ce219e5f --- /dev/null +++ b/2021/28xxx/CVE-2021-28389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28390.json b/2021/28xxx/CVE-2021-28390.json new file mode 100644 index 00000000000..94e5e3eb97a --- /dev/null +++ b/2021/28xxx/CVE-2021-28390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28391.json b/2021/28xxx/CVE-2021-28391.json new file mode 100644 index 00000000000..2fcd185c972 --- /dev/null +++ b/2021/28xxx/CVE-2021-28391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28392.json b/2021/28xxx/CVE-2021-28392.json new file mode 100644 index 00000000000..4aeb2bd7802 --- /dev/null +++ b/2021/28xxx/CVE-2021-28392.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28392", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28393.json b/2021/28xxx/CVE-2021-28393.json new file mode 100644 index 00000000000..afb7c58355d --- /dev/null +++ b/2021/28xxx/CVE-2021-28393.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28393", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28394.json b/2021/28xxx/CVE-2021-28394.json new file mode 100644 index 00000000000..9624f0c3013 --- /dev/null +++ b/2021/28xxx/CVE-2021-28394.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28394", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28395.json b/2021/28xxx/CVE-2021-28395.json new file mode 100644 index 00000000000..fec602aa8c2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28395.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28395", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28396.json b/2021/28xxx/CVE-2021-28396.json new file mode 100644 index 00000000000..e92f093ab8e --- /dev/null +++ b/2021/28xxx/CVE-2021-28396.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28396", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28397.json b/2021/28xxx/CVE-2021-28397.json new file mode 100644 index 00000000000..15bd570cb84 --- /dev/null +++ b/2021/28xxx/CVE-2021-28397.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28397", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28398.json b/2021/28xxx/CVE-2021-28398.json new file mode 100644 index 00000000000..9ef758f1d43 --- /dev/null +++ b/2021/28xxx/CVE-2021-28398.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28398", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28399.json b/2021/28xxx/CVE-2021-28399.json new file mode 100644 index 00000000000..22f8c93acad --- /dev/null +++ b/2021/28xxx/CVE-2021-28399.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28399", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28400.json b/2021/28xxx/CVE-2021-28400.json new file mode 100644 index 00000000000..586061d792a --- /dev/null +++ b/2021/28xxx/CVE-2021-28400.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28400", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28401.json b/2021/28xxx/CVE-2021-28401.json new file mode 100644 index 00000000000..490df1b7bc9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28401.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28401", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28402.json b/2021/28xxx/CVE-2021-28402.json new file mode 100644 index 00000000000..67a8f6be222 --- /dev/null +++ b/2021/28xxx/CVE-2021-28402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28403.json b/2021/28xxx/CVE-2021-28403.json new file mode 100644 index 00000000000..c37907b01f7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28403.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28403", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28404.json b/2021/28xxx/CVE-2021-28404.json new file mode 100644 index 00000000000..e9be1ff7b5d --- /dev/null +++ b/2021/28xxx/CVE-2021-28404.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28404", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28405.json b/2021/28xxx/CVE-2021-28405.json new file mode 100644 index 00000000000..d0fd86c1316 --- /dev/null +++ b/2021/28xxx/CVE-2021-28405.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28405", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28406.json b/2021/28xxx/CVE-2021-28406.json new file mode 100644 index 00000000000..aac7cf2f9ea --- /dev/null +++ b/2021/28xxx/CVE-2021-28406.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28406", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28407.json b/2021/28xxx/CVE-2021-28407.json new file mode 100644 index 00000000000..14c793f6051 --- /dev/null +++ b/2021/28xxx/CVE-2021-28407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28408.json b/2021/28xxx/CVE-2021-28408.json new file mode 100644 index 00000000000..f8a5d6c879e --- /dev/null +++ b/2021/28xxx/CVE-2021-28408.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28408", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28409.json b/2021/28xxx/CVE-2021-28409.json new file mode 100644 index 00000000000..d1328447798 --- /dev/null +++ b/2021/28xxx/CVE-2021-28409.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28409", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28410.json b/2021/28xxx/CVE-2021-28410.json new file mode 100644 index 00000000000..e0e911737a6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28410.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28410", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28411.json b/2021/28xxx/CVE-2021-28411.json new file mode 100644 index 00000000000..2481c9ea098 --- /dev/null +++ b/2021/28xxx/CVE-2021-28411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28412.json b/2021/28xxx/CVE-2021-28412.json new file mode 100644 index 00000000000..952fe359b6d --- /dev/null +++ b/2021/28xxx/CVE-2021-28412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28413.json b/2021/28xxx/CVE-2021-28413.json new file mode 100644 index 00000000000..66a19183586 --- /dev/null +++ b/2021/28xxx/CVE-2021-28413.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28413", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28414.json b/2021/28xxx/CVE-2021-28414.json new file mode 100644 index 00000000000..3b40b709e10 --- /dev/null +++ b/2021/28xxx/CVE-2021-28414.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28414", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28415.json b/2021/28xxx/CVE-2021-28415.json new file mode 100644 index 00000000000..46688a0af6e --- /dev/null +++ b/2021/28xxx/CVE-2021-28415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28416.json b/2021/28xxx/CVE-2021-28416.json new file mode 100644 index 00000000000..1238bf81b4a --- /dev/null +++ b/2021/28xxx/CVE-2021-28416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28417.json b/2021/28xxx/CVE-2021-28417.json new file mode 100644 index 00000000000..6da23e6a2e0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28417.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28417", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28418.json b/2021/28xxx/CVE-2021-28418.json new file mode 100644 index 00000000000..ab4a6118b82 --- /dev/null +++ b/2021/28xxx/CVE-2021-28418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28419.json b/2021/28xxx/CVE-2021-28419.json new file mode 100644 index 00000000000..c7557b48a39 --- /dev/null +++ b/2021/28xxx/CVE-2021-28419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28420.json b/2021/28xxx/CVE-2021-28420.json new file mode 100644 index 00000000000..1611d97360b --- /dev/null +++ b/2021/28xxx/CVE-2021-28420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28421.json b/2021/28xxx/CVE-2021-28421.json new file mode 100644 index 00000000000..2765c8671ad --- /dev/null +++ b/2021/28xxx/CVE-2021-28421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28422.json b/2021/28xxx/CVE-2021-28422.json new file mode 100644 index 00000000000..f383b0711f3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28423.json b/2021/28xxx/CVE-2021-28423.json new file mode 100644 index 00000000000..732bbc81a98 --- /dev/null +++ b/2021/28xxx/CVE-2021-28423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28424.json b/2021/28xxx/CVE-2021-28424.json new file mode 100644 index 00000000000..886c5c331d4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28425.json b/2021/28xxx/CVE-2021-28425.json new file mode 100644 index 00000000000..3078621acb8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28426.json b/2021/28xxx/CVE-2021-28426.json new file mode 100644 index 00000000000..79ba79acaf0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28427.json b/2021/28xxx/CVE-2021-28427.json new file mode 100644 index 00000000000..371d8b618e2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28428.json b/2021/28xxx/CVE-2021-28428.json new file mode 100644 index 00000000000..dafbbb4e87c --- /dev/null +++ b/2021/28xxx/CVE-2021-28428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28429.json b/2021/28xxx/CVE-2021-28429.json new file mode 100644 index 00000000000..0eb6140b178 --- /dev/null +++ b/2021/28xxx/CVE-2021-28429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28430.json b/2021/28xxx/CVE-2021-28430.json new file mode 100644 index 00000000000..f1dfb6be180 --- /dev/null +++ b/2021/28xxx/CVE-2021-28430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28431.json b/2021/28xxx/CVE-2021-28431.json new file mode 100644 index 00000000000..056c423ddbc --- /dev/null +++ b/2021/28xxx/CVE-2021-28431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28432.json b/2021/28xxx/CVE-2021-28432.json new file mode 100644 index 00000000000..e7e288915b9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28433.json b/2021/28xxx/CVE-2021-28433.json new file mode 100644 index 00000000000..80545371529 --- /dev/null +++ b/2021/28xxx/CVE-2021-28433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 6a5211f846b6c1c2618c11cc3e6dee3e4b097f10 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Mon, 15 Mar 2021 08:59:25 +0000 Subject: [PATCH 331/845] Add CVE-2021-27576 for Apache OpenMeetings --- 2021/27xxx/CVE-2021-27576.json | 78 +++++++++++++++++++++++++++++++--- 1 file changed, 71 insertions(+), 7 deletions(-) diff --git a/2021/27xxx/CVE-2021-27576.json b/2021/27xxx/CVE-2021-27576.json index 76447f78cbf..bc624a98520 100644 --- a/2021/27xxx/CVE-2021-27576.json +++ b/2021/27xxx/CVE-2021-27576.json @@ -1,18 +1,82 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-27576", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Apache OpenMeetings: bandwidth can be overloaded with public web service" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache OpenMeetings", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "Apache OpenMeetings 4", + "version_value": "4.0.0" + }, + { + "version_affected": "<=", + "version_name": "Apache OpenMeetings 5", + "version_value": "5.1.0" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "This issue was identified by Trung Le, Chi Tran, Linh Cua" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Server bandwidth overload" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From 675b32d2d5d7ad975b91abe0fa6363ff3fd6cf95 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 10:00:42 +0000 Subject: [PATCH 332/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21056.json | 5 +++++ 2021/21xxx/CVE-2021-21069.json | 5 +++++ 2021/27xxx/CVE-2021-27576.json | 9 +++++---- 3 files changed, 15 insertions(+), 4 deletions(-) diff --git a/2021/21xxx/CVE-2021-21056.json b/2021/21xxx/CVE-2021-21056.json index 164eed358cc..e0504bc0d2c 100644 --- a/2021/21xxx/CVE-2021-21056.json +++ b/2021/21xxx/CVE-2021-21056.json @@ -87,6 +87,11 @@ "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/framemaker/apsb21-14.html", "name": "https://helpx.adobe.com/security/products/framemaker/apsb21-14.html" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-282/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-282/" } ] }, diff --git a/2021/21xxx/CVE-2021-21069.json b/2021/21xxx/CVE-2021-21069.json index f0ece157cbb..b551d6d3782 100644 --- a/2021/21xxx/CVE-2021-21069.json +++ b/2021/21xxx/CVE-2021-21069.json @@ -87,6 +87,11 @@ "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html", "name": "https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-281/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-281/" } ] }, diff --git a/2021/27xxx/CVE-2021-27576.json b/2021/27xxx/CVE-2021-27576.json index bc624a98520..3f371f312ac 100644 --- a/2021/27xxx/CVE-2021-27576.json +++ b/2021/27xxx/CVE-2021-27576.json @@ -48,7 +48,7 @@ "description_data": [ { "lang": "eng", - "value": "If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0" + "value": "If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0" } ] }, @@ -71,12 +71,13 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E", + "name": "https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file From db164dfd2022459167a84d468e4c51a77094849e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 12:00:46 +0000 Subject: [PATCH 333/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35358.json | 56 ++++++++++++++++++++++++++++++---- 1 file changed, 50 insertions(+), 6 deletions(-) diff --git a/2020/35xxx/CVE-2020-35358.json b/2020/35xxx/CVE-2020-35358.json index 253236351d2..81f6a0a08fe 100644 --- a/2020/35xxx/CVE-2020-35358.json +++ b/2020/35xxx/CVE-2020-35358.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35358", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35358", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DomainMOD domainmod-v4.15.0 is affected by an insufficient session expiration vulnerability. On changing a password, both sessions using the changed password and old sessions in any other browser or device do not expire and remain active. Such flaws frequently give attackers unauthorized access to some system data or functionality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/anku-agar/0fec2ffd98308e550ce9b5d4b395d0d7", + "url": "https://gist.github.com/anku-agar/0fec2ffd98308e550ce9b5d4b395d0d7" } ] } From eccbebeb5171a047f1169abd1c724851cf07b2ee Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 13:00:40 +0000 Subject: [PATCH 334/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20179.json | 75 ++++++++++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27208.json | 61 ++++++++++++++++++++++++--- 2 files changed, 127 insertions(+), 9 deletions(-) diff --git a/2021/20xxx/CVE-2021-20179.json b/2021/20xxx/CVE-2021-20179.json index 2ca9eb74e2d..6fc2ff6d4c5 100644 --- a/2021/20xxx/CVE-2021-20179.json +++ b/2021/20xxx/CVE-2021-20179.json @@ -4,14 +4,83 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20179", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "pki-core", + "version": { + "version_data": [ + { + "version_value": "pki-core 10.5, pki-core 10.8, pki-core 10.9, pki-core 10.10, pki-core 10.11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1914379", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914379" + }, + { + "refsource": "MISC", + "name": "https://github.com/dogtagpki/pki/pull/3478", + "url": "https://github.com/dogtagpki/pki/pull/3478" + }, + { + "refsource": "MISC", + "name": "https://github.com/dogtagpki/pki/pull/3477", + "url": "https://github.com/dogtagpki/pki/pull/3477" + }, + { + "refsource": "MISC", + "name": "https://github.com/dogtagpki/pki/pull/3476", + "url": "https://github.com/dogtagpki/pki/pull/3476" + }, + { + "refsource": "MISC", + "name": "https://github.com/dogtagpki/pki/pull/3475", + "url": "https://github.com/dogtagpki/pki/pull/3475" + }, + { + "refsource": "MISC", + "name": "https://github.com/dogtagpki/pki/pull/3474", + "url": "https://github.com/dogtagpki/pki/pull/3474" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity." } ] } diff --git a/2021/27xxx/CVE-2021-27208.json b/2021/27xxx/CVE-2021-27208.json index 8c0704511cd..3dbd521b891 100644 --- a/2021/27xxx/CVE-2021-27208.json +++ b/2021/27xxx/CVE-2021-27208.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27208", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27208", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand\u2019s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification to the Zynq-7000 device is needed to replace the original nand flash memory with a nand flash emulator for this attack to be successful." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.xilinx.com/support.html", + "refsource": "MISC", + "name": "https://www.xilinx.com/support.html" + }, + { + "refsource": "MISC", + "name": "https://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html", + "url": "https://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html" } ] } From d70c2f2999689607abe6ef2dc50f72c17e6aea81 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 14:00:40 +0000 Subject: [PATCH 335/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3442.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3442.json diff --git a/2021/3xxx/CVE-2021-3442.json b/2021/3xxx/CVE-2021-3442.json new file mode 100644 index 00000000000..b8d4fcbed10 --- /dev/null +++ b/2021/3xxx/CVE-2021-3442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 371744bd4ea6465ddb3f054d099704f76ce4323a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 15:00:40 +0000 Subject: [PATCH 336/845] "-Synchronized-Data." --- 2021/1xxx/CVE-2021-1729.json | 5 +++ 2021/21xxx/CVE-2021-21493.json | 80 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26862.json | 5 +++ 2021/26xxx/CVE-2021-26866.json | 5 +++ 2021/26xxx/CVE-2021-26873.json | 5 +++ 2021/26xxx/CVE-2021-26921.json | 5 +++ 2021/26xxx/CVE-2021-26923.json | 61 +++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26924.json | 61 +++++++++++++++++++++++--- 2021/27xxx/CVE-2021-27077.json | 5 +++ 2021/27xxx/CVE-2021-27208.json | 15 ++++--- 2021/27xxx/CVE-2021-27585.json | 10 +++++ 2021/27xxx/CVE-2021-27586.json | 5 +++ 2021/27xxx/CVE-2021-27587.json | 10 +++++ 2021/27xxx/CVE-2021-27588.json | 5 +++ 2021/27xxx/CVE-2021-27589.json | 5 +++ 2021/27xxx/CVE-2021-27590.json | 5 +++ 2021/27xxx/CVE-2021-27591.json | 5 +++ 2021/27xxx/CVE-2021-27592.json | 15 +++++++ 2021/27xxx/CVE-2021-27891.json | 56 +++++++++++++++++++++--- 2021/27xxx/CVE-2021-27892.json | 56 +++++++++++++++++++++--- 2021/27xxx/CVE-2021-27893.json | 56 +++++++++++++++++++++--- 21 files changed, 440 insertions(+), 35 deletions(-) diff --git a/2021/1xxx/CVE-2021-1729.json b/2021/1xxx/CVE-2021-1729.json index b835d44dfa7..c3fb9d31f10 100644 --- a/2021/1xxx/CVE-2021-1729.json +++ b/2021/1xxx/CVE-2021-1729.json @@ -204,6 +204,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-284/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-284/" } ] } diff --git a/2021/21xxx/CVE-2021-21493.json b/2021/21xxx/CVE-2021-21493.json index 665b625a442..bd26a107ab8 100644 --- a/2021/21xxx/CVE-2021-21493.json +++ b/2021/21xxx/CVE-2021-21493.json @@ -69,6 +69,86 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-293/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-293/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-304/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-304/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-297/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-297/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-305/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-305/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-309/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-309/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-295/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-295/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-303/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-303/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-290/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-290/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-289/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-289/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-301/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-301/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-302/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-302/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-300/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-300/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-291/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-291/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-296/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-296/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-307/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-307/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-308/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-308/" } ] } diff --git a/2021/26xxx/CVE-2021-26862.json b/2021/26xxx/CVE-2021-26862.json index 0f047c532f7..184962c4148 100644 --- a/2021/26xxx/CVE-2021-26862.json +++ b/2021/26xxx/CVE-2021-26862.json @@ -267,6 +267,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-285/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-285/" } ] } diff --git a/2021/26xxx/CVE-2021-26866.json b/2021/26xxx/CVE-2021-26866.json index 51872a21a40..00655f33e83 100644 --- a/2021/26xxx/CVE-2021-26866.json +++ b/2021/26xxx/CVE-2021-26866.json @@ -222,6 +222,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-286/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-286/" } ] } diff --git a/2021/26xxx/CVE-2021-26873.json b/2021/26xxx/CVE-2021-26873.json index 67a71ef00fa..55dff3f1588 100644 --- a/2021/26xxx/CVE-2021-26873.json +++ b/2021/26xxx/CVE-2021-26873.json @@ -267,6 +267,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-283/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-283/" } ] } diff --git a/2021/26xxx/CVE-2021-26921.json b/2021/26xxx/CVE-2021-26921.json index 74adf9be4a4..d4787d5df53 100644 --- a/2021/26xxx/CVE-2021-26921.json +++ b/2021/26xxx/CVE-2021-26921.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5", "url": "https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5" + }, + { + "refsource": "MISC", + "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52", + "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52" } ] } diff --git a/2021/26xxx/CVE-2021-26923.json b/2021/26xxx/CVE-2021-26923.json index c259f538edd..f0bd85a75f1 100644 --- a/2021/26xxx/CVE-2021-26923.json +++ b/2021/26xxx/CVE-2021-26923.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26923", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26923", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Argo CD before 1.8.4. Accessing the endpoint /api/version leaks internal information for the system, and this endpoint is not protected with authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4", + "refsource": "MISC", + "name": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4" + }, + { + "refsource": "MISC", + "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pfgj-mh5m-2p48", + "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pfgj-mh5m-2p48" } ] } diff --git a/2021/26xxx/CVE-2021-26924.json b/2021/26xxx/CVE-2021-26924.json index 0ff45998510..d29ca782e39 100644 --- a/2021/26xxx/CVE-2021-26924.json +++ b/2021/26xxx/CVE-2021-26924.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26924", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26924", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Argo CD before 1.8.4. Browser XSS protection is not activated due to the missing XSS protection header." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4", + "refsource": "MISC", + "name": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4" + }, + { + "refsource": "MISC", + "name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pg99-h5gc-446r", + "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pg99-h5gc-446r" } ] } diff --git a/2021/27xxx/CVE-2021-27077.json b/2021/27xxx/CVE-2021-27077.json index 4496404120c..cab050c5f07 100644 --- a/2021/27xxx/CVE-2021-27077.json +++ b/2021/27xxx/CVE-2021-27077.json @@ -267,6 +267,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-287/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-287/" } ] } diff --git a/2021/27xxx/CVE-2021-27208.json b/2021/27xxx/CVE-2021-27208.json index 3dbd521b891..f36b7c96d92 100644 --- a/2021/27xxx/CVE-2021-27208.json +++ b/2021/27xxx/CVE-2021-27208.json @@ -52,15 +52,20 @@ }, "references": { "reference_data": [ - { - "url": "https://www.xilinx.com/support.html", - "refsource": "MISC", - "name": "https://www.xilinx.com/support.html" - }, { "refsource": "MISC", "name": "https://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html", "url": "https://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html" + }, + { + "refsource": "MISC", + "name": "https://www.xilinx.com/support/answers/76201.html", + "url": "https://www.xilinx.com/support/answers/76201.html" + }, + { + "refsource": "MISC", + "name": "http://www.onfi.org/specifications", + "url": "http://www.onfi.org/specifications" } ] } diff --git a/2021/27xxx/CVE-2021-27585.json b/2021/27xxx/CVE-2021-27585.json index b41952eec32..c1336345431 100644 --- a/2021/27xxx/CVE-2021-27585.json +++ b/2021/27xxx/CVE-2021-27585.json @@ -69,6 +69,16 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-299/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-299/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-288/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-288/" } ] } diff --git a/2021/27xxx/CVE-2021-27586.json b/2021/27xxx/CVE-2021-27586.json index df96a274345..605f3023a0e 100644 --- a/2021/27xxx/CVE-2021-27586.json +++ b/2021/27xxx/CVE-2021-27586.json @@ -69,6 +69,11 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-315/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-315/" } ] } diff --git a/2021/27xxx/CVE-2021-27587.json b/2021/27xxx/CVE-2021-27587.json index a93e30e7313..ff7ad343f4e 100644 --- a/2021/27xxx/CVE-2021-27587.json +++ b/2021/27xxx/CVE-2021-27587.json @@ -69,6 +69,16 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-310/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-310/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-312/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-312/" } ] } diff --git a/2021/27xxx/CVE-2021-27588.json b/2021/27xxx/CVE-2021-27588.json index e5bcf468eab..faa7227751d 100644 --- a/2021/27xxx/CVE-2021-27588.json +++ b/2021/27xxx/CVE-2021-27588.json @@ -69,6 +69,11 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-292/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-292/" } ] } diff --git a/2021/27xxx/CVE-2021-27589.json b/2021/27xxx/CVE-2021-27589.json index 234ca60f909..52830371d77 100644 --- a/2021/27xxx/CVE-2021-27589.json +++ b/2021/27xxx/CVE-2021-27589.json @@ -69,6 +69,11 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-306/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-306/" } ] } diff --git a/2021/27xxx/CVE-2021-27590.json b/2021/27xxx/CVE-2021-27590.json index 9813e732af6..d7e10c38b1b 100644 --- a/2021/27xxx/CVE-2021-27590.json +++ b/2021/27xxx/CVE-2021-27590.json @@ -69,6 +69,11 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-294/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-294/" } ] } diff --git a/2021/27xxx/CVE-2021-27591.json b/2021/27xxx/CVE-2021-27591.json index 9bfc03d9199..2db38608f38 100644 --- a/2021/27xxx/CVE-2021-27591.json +++ b/2021/27xxx/CVE-2021-27591.json @@ -69,6 +69,11 @@ "url": "https://launchpad.support.sap.com/#/notes/3027758", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027758" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-298/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-298/" } ] } diff --git a/2021/27xxx/CVE-2021-27592.json b/2021/27xxx/CVE-2021-27592.json index 05316a8e048..26bf8c9dc22 100644 --- a/2021/27xxx/CVE-2021-27592.json +++ b/2021/27xxx/CVE-2021-27592.json @@ -69,6 +69,21 @@ "url": "https://launchpad.support.sap.com/#/notes/3027767", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/3027767" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-313/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-313/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-311/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-311/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-314/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-314/" } ] } diff --git a/2021/27xxx/CVE-2021-27891.json b/2021/27xxx/CVE-2021-27891.json index 6492a44eabc..1e4447e8478 100644 --- a/2021/27xxx/CVE-2021-27891.json +++ b/2021/27xxx/CVE-2021-27891.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27891", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27891", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891", + "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891" } ] } diff --git a/2021/27xxx/CVE-2021-27892.json b/2021/27xxx/CVE-2021-27892.json index 126f36251d1..4f76e33050a 100644 --- a/2021/27xxx/CVE-2021-27892.json +++ b/2021/27xxx/CVE-2021-27892.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27892", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27892", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892", + "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892" } ] } diff --git a/2021/27xxx/CVE-2021-27893.json b/2021/27xxx/CVE-2021-27893.json index c6d6701cc2c..7c8cf5ed744 100644 --- a/2021/27xxx/CVE-2021-27893.json +++ b/2021/27xxx/CVE-2021-27893.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27893", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27893", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893", + "url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893" } ] } From f33fb192e447ef951bce4a0bcd5f8432ca4d38f9 Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Mon, 15 Mar 2021 11:26:46 -0400 Subject: [PATCH 337/845] IBM20210315-112646 Added CVE-2020-4184, CVE-2021-20440 --- 2020/4xxx/CVE-2020-4184.json | 102 ++++++++++++++++++++++++++----- 2021/20xxx/CVE-2021-20440.json | 108 ++++++++++++++++++++++++++++----- 2 files changed, 180 insertions(+), 30 deletions(-) diff --git a/2020/4xxx/CVE-2020-4184.json b/2020/4xxx/CVE-2020-4184.json index 1ce1b850270..a92665cf6e5 100644 --- a/2020/4xxx/CVE-2020-4184.json +++ b/2020/4xxx/CVE-2020-4184.json @@ -1,18 +1,90 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4184", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "impact" : { + "cvssv3" : { + "BM" : { + "C" : "L", + "A" : "L", + "PR" : "N", + "I" : "L", + "UI" : "N", + "SCORE" : "5.800", + "AC" : "H", + "S" : "C", + "AV" : "A" + }, + "TM" : { + "E" : "U", + "RC" : "C", + "RL" : "O" + } + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "product_name" : "Security Guardium", + "version" : { + "version_data" : [ + { + "version_value" : "11.2" + } + ] + } + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Gain Privileges" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6429569 (Security Guardium)", + "name" : "https://www.ibm.com/support/pages/node/6429569", + "url" : "https://www.ibm.com/support/pages/node/6429569" + }, + { + "title" : "X-Force Vulnerability Report", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/174802", + "name" : "ibm-guardium-cve20204184-code-exec (174802)" + } + ] + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Security Guardium 11.2 performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 174802.." + } + ] + }, + "data_version" : "4.0", + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-03-12T00:00:00", + "STATE" : "PUBLIC", + "ID" : "CVE-2020-4184", + "ASSIGNER" : "psirt@us.ibm.com" + } +} diff --git a/2021/20xxx/CVE-2021-20440.json b/2021/20xxx/CVE-2021-20440.json index 7808f462f44..d9804838d56 100644 --- a/2021/20xxx/CVE-2021-20440.json +++ b/2021/20xxx/CVE-2021-20440.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-20440", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_type" : "CVE", + "data_format" : "MITRE", + "impact" : { + "cvssv3" : { + "BM" : { + "AV" : "N", + "PR" : "L", + "A" : "L", + "C" : "H", + "SCORE" : "6.400", + "AC" : "H", + "S" : "U", + "I" : "L", + "UI" : "N" + }, + "TM" : { + "RC" : "C", + "RL" : "O", + "E" : "U" + } + } + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "product_name" : "API Connect", + "version" : { + "version_data" : [ + { + "version_value" : "2018.4.1.0" + }, + { + "version_value" : "2018.4.1.13" + }, + { + "version_value" : "10.0.0.0" + } + ] + } + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "data_version" : "4.0", + "CVE_data_meta" : { + "DATE_PUBLIC" : "2021-03-14T00:00:00", + "STATE" : "PUBLIC", + "ID" : "CVE-2021-20440", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "description" : { + "description_data" : [ + { + "value" : "IBM API Connect 10.0.0.0, and 2018.4.1.0 through 2018.4.1.13 does not restrict member registration to the intended recepient. An attacker who is a valid user in the user registry used by API Manager can use a stolen invitation link and register themselves as a member of an API provider organization. IBM X-Force ID: 196536.", + "lang" : "eng" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Obtain Information", + "lang" : "eng" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6430107", + "url" : "https://www.ibm.com/support/pages/node/6430107", + "refsource" : "CONFIRM", + "title" : "IBM Security Bulletin 6430107 (API Connect)" + }, + { + "refsource" : "XF", + "title" : "X-Force Vulnerability Report", + "name" : "ibm-api-cve202120440-info-disc (196536)", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196536" + } + ] + } +} From a50a6b9887e8dbc2e4394a2228e60ef53fc792c4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 16:00:43 +0000 Subject: [PATCH 338/845] "-Synchronized-Data." --- 2020/4xxx/CVE-2020-4184.json | 174 +++++++++++++++--------------- 2021/20xxx/CVE-2021-20440.json | 186 ++++++++++++++++----------------- 2021/28xxx/CVE-2021-28434.json | 18 ++++ 2021/28xxx/CVE-2021-28435.json | 18 ++++ 2021/28xxx/CVE-2021-28436.json | 18 ++++ 2021/28xxx/CVE-2021-28437.json | 18 ++++ 2021/28xxx/CVE-2021-28438.json | 18 ++++ 2021/28xxx/CVE-2021-28439.json | 18 ++++ 2021/28xxx/CVE-2021-28440.json | 18 ++++ 2021/28xxx/CVE-2021-28441.json | 18 ++++ 2021/28xxx/CVE-2021-28442.json | 18 ++++ 2021/28xxx/CVE-2021-28443.json | 18 ++++ 2021/28xxx/CVE-2021-28444.json | 18 ++++ 2021/28xxx/CVE-2021-28445.json | 18 ++++ 2021/28xxx/CVE-2021-28446.json | 18 ++++ 2021/28xxx/CVE-2021-28447.json | 18 ++++ 2021/28xxx/CVE-2021-28448.json | 18 ++++ 2021/28xxx/CVE-2021-28449.json | 18 ++++ 2021/28xxx/CVE-2021-28450.json | 18 ++++ 2021/28xxx/CVE-2021-28451.json | 18 ++++ 2021/28xxx/CVE-2021-28452.json | 18 ++++ 2021/28xxx/CVE-2021-28453.json | 18 ++++ 2021/28xxx/CVE-2021-28454.json | 18 ++++ 2021/28xxx/CVE-2021-28455.json | 18 ++++ 2021/28xxx/CVE-2021-28456.json | 18 ++++ 2021/28xxx/CVE-2021-28457.json | 18 ++++ 2021/28xxx/CVE-2021-28458.json | 18 ++++ 2021/28xxx/CVE-2021-28459.json | 18 ++++ 2021/28xxx/CVE-2021-28460.json | 18 ++++ 2021/28xxx/CVE-2021-28461.json | 18 ++++ 2021/28xxx/CVE-2021-28462.json | 18 ++++ 2021/28xxx/CVE-2021-28463.json | 18 ++++ 2021/28xxx/CVE-2021-28464.json | 18 ++++ 2021/28xxx/CVE-2021-28465.json | 18 ++++ 2021/28xxx/CVE-2021-28466.json | 18 ++++ 2021/28xxx/CVE-2021-28467.json | 18 ++++ 2021/28xxx/CVE-2021-28468.json | 18 ++++ 2021/28xxx/CVE-2021-28469.json | 18 ++++ 2021/28xxx/CVE-2021-28470.json | 18 ++++ 2021/28xxx/CVE-2021-28471.json | 18 ++++ 2021/28xxx/CVE-2021-28472.json | 18 ++++ 2021/28xxx/CVE-2021-28473.json | 18 ++++ 2021/28xxx/CVE-2021-28474.json | 18 ++++ 2021/28xxx/CVE-2021-28475.json | 18 ++++ 2021/28xxx/CVE-2021-28476.json | 18 ++++ 2021/28xxx/CVE-2021-28477.json | 18 ++++ 2021/28xxx/CVE-2021-28478.json | 18 ++++ 2021/28xxx/CVE-2021-28479.json | 18 ++++ 2021/28xxx/CVE-2021-28480.json | 18 ++++ 2021/28xxx/CVE-2021-28481.json | 18 ++++ 2021/28xxx/CVE-2021-28482.json | 18 ++++ 2021/28xxx/CVE-2021-28483.json | 18 ++++ 2021/3xxx/CVE-2021-3167.json | 69 ++++++++++-- 53 files changed, 1143 insertions(+), 186 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28434.json create mode 100644 2021/28xxx/CVE-2021-28435.json create mode 100644 2021/28xxx/CVE-2021-28436.json create mode 100644 2021/28xxx/CVE-2021-28437.json create mode 100644 2021/28xxx/CVE-2021-28438.json create mode 100644 2021/28xxx/CVE-2021-28439.json create mode 100644 2021/28xxx/CVE-2021-28440.json create mode 100644 2021/28xxx/CVE-2021-28441.json create mode 100644 2021/28xxx/CVE-2021-28442.json create mode 100644 2021/28xxx/CVE-2021-28443.json create mode 100644 2021/28xxx/CVE-2021-28444.json create mode 100644 2021/28xxx/CVE-2021-28445.json create mode 100644 2021/28xxx/CVE-2021-28446.json create mode 100644 2021/28xxx/CVE-2021-28447.json create mode 100644 2021/28xxx/CVE-2021-28448.json create mode 100644 2021/28xxx/CVE-2021-28449.json create mode 100644 2021/28xxx/CVE-2021-28450.json create mode 100644 2021/28xxx/CVE-2021-28451.json create mode 100644 2021/28xxx/CVE-2021-28452.json create mode 100644 2021/28xxx/CVE-2021-28453.json create mode 100644 2021/28xxx/CVE-2021-28454.json create mode 100644 2021/28xxx/CVE-2021-28455.json create mode 100644 2021/28xxx/CVE-2021-28456.json create mode 100644 2021/28xxx/CVE-2021-28457.json create mode 100644 2021/28xxx/CVE-2021-28458.json create mode 100644 2021/28xxx/CVE-2021-28459.json create mode 100644 2021/28xxx/CVE-2021-28460.json create mode 100644 2021/28xxx/CVE-2021-28461.json create mode 100644 2021/28xxx/CVE-2021-28462.json create mode 100644 2021/28xxx/CVE-2021-28463.json create mode 100644 2021/28xxx/CVE-2021-28464.json create mode 100644 2021/28xxx/CVE-2021-28465.json create mode 100644 2021/28xxx/CVE-2021-28466.json create mode 100644 2021/28xxx/CVE-2021-28467.json create mode 100644 2021/28xxx/CVE-2021-28468.json create mode 100644 2021/28xxx/CVE-2021-28469.json create mode 100644 2021/28xxx/CVE-2021-28470.json create mode 100644 2021/28xxx/CVE-2021-28471.json create mode 100644 2021/28xxx/CVE-2021-28472.json create mode 100644 2021/28xxx/CVE-2021-28473.json create mode 100644 2021/28xxx/CVE-2021-28474.json create mode 100644 2021/28xxx/CVE-2021-28475.json create mode 100644 2021/28xxx/CVE-2021-28476.json create mode 100644 2021/28xxx/CVE-2021-28477.json create mode 100644 2021/28xxx/CVE-2021-28478.json create mode 100644 2021/28xxx/CVE-2021-28479.json create mode 100644 2021/28xxx/CVE-2021-28480.json create mode 100644 2021/28xxx/CVE-2021-28481.json create mode 100644 2021/28xxx/CVE-2021-28482.json create mode 100644 2021/28xxx/CVE-2021-28483.json diff --git a/2020/4xxx/CVE-2020-4184.json b/2020/4xxx/CVE-2020-4184.json index a92665cf6e5..d6562b7b55e 100644 --- a/2020/4xxx/CVE-2020-4184.json +++ b/2020/4xxx/CVE-2020-4184.json @@ -1,90 +1,90 @@ { - "impact" : { - "cvssv3" : { - "BM" : { - "C" : "L", - "A" : "L", - "PR" : "N", - "I" : "L", - "UI" : "N", - "SCORE" : "5.800", - "AC" : "H", - "S" : "C", - "AV" : "A" - }, - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - } - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Security Guardium", - "version" : { - "version_data" : [ - { - "version_value" : "11.2" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "impact": { + "cvssv3": { + "BM": { + "C": "L", + "A": "L", + "PR": "N", + "I": "L", + "UI": "N", + "SCORE": "5.800", + "AC": "H", + "S": "C", + "AV": "A" + }, + "TM": { + "E": "U", + "RC": "C", + "RL": "O" } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Gain Privileges" - } + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Security Guardium", + "version": { + "version_data": [ + { + "version_value": "11.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6429569 (Security Guardium)", - "name" : "https://www.ibm.com/support/pages/node/6429569", - "url" : "https://www.ibm.com/support/pages/node/6429569" - }, - { - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/174802", - "name" : "ibm-guardium-cve20204184-code-exec (174802)" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Security Guardium 11.2 performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 174802.." - } - ] - }, - "data_version" : "4.0", - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-03-12T00:00:00", - "STATE" : "PUBLIC", - "ID" : "CVE-2020-4184", - "ASSIGNER" : "psirt@us.ibm.com" - } -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Gain Privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6429569 (Security Guardium)", + "name": "https://www.ibm.com/support/pages/node/6429569", + "url": "https://www.ibm.com/support/pages/node/6429569" + }, + { + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/174802", + "name": "ibm-guardium-cve20204184-code-exec (174802)" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Security Guardium 11.2 performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 174802.." + } + ] + }, + "data_version": "4.0", + "CVE_data_meta": { + "DATE_PUBLIC": "2021-03-12T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2020-4184", + "ASSIGNER": "psirt@us.ibm.com" + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20440.json b/2021/20xxx/CVE-2021-20440.json index d9804838d56..98530db7c7f 100644 --- a/2021/20xxx/CVE-2021-20440.json +++ b/2021/20xxx/CVE-2021-20440.json @@ -1,96 +1,96 @@ { - "data_type" : "CVE", - "data_format" : "MITRE", - "impact" : { - "cvssv3" : { - "BM" : { - "AV" : "N", - "PR" : "L", - "A" : "L", - "C" : "H", - "SCORE" : "6.400", - "AC" : "H", - "S" : "U", - "I" : "L", - "UI" : "N" - }, - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "API Connect", - "version" : { - "version_data" : [ - { - "version_value" : "2018.4.1.0" - }, - { - "version_value" : "2018.4.1.13" - }, - { - "version_value" : "10.0.0.0" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "data_type": "CVE", + "data_format": "MITRE", + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "PR": "L", + "A": "L", + "C": "H", + "SCORE": "6.400", + "AC": "H", + "S": "U", + "I": "L", + "UI": "N" + }, + "TM": { + "RC": "C", + "RL": "O", + "E": "U" } - ] - } - }, - "data_version" : "4.0", - "CVE_data_meta" : { - "DATE_PUBLIC" : "2021-03-14T00:00:00", - "STATE" : "PUBLIC", - "ID" : "CVE-2021-20440", - "ASSIGNER" : "psirt@us.ibm.com" - }, - "description" : { - "description_data" : [ - { - "value" : "IBM API Connect 10.0.0.0, and 2018.4.1.0 through 2018.4.1.13 does not restrict member registration to the intended recepient. An attacker who is a valid user in the user registry used by API Manager can use a stolen invitation link and register themselves as a member of an API provider organization. IBM X-Force ID: 196536.", - "lang" : "eng" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "API Connect", + "version": { + "version_data": [ + { + "version_value": "2018.4.1.0" + }, + { + "version_value": "2018.4.1.13" + }, + { + "version_value": "10.0.0.0" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6430107", - "url" : "https://www.ibm.com/support/pages/node/6430107", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6430107 (API Connect)" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-api-cve202120440-info-disc (196536)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196536" - } - ] - } -} + } + }, + "data_version": "4.0", + "CVE_data_meta": { + "DATE_PUBLIC": "2021-03-14T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2021-20440", + "ASSIGNER": "psirt@us.ibm.com" + }, + "description": { + "description_data": [ + { + "value": "IBM API Connect 10.0.0.0, and 2018.4.1.0 through 2018.4.1.13 does not restrict member registration to the intended recepient. An attacker who is a valid user in the user registry used by API Manager can use a stolen invitation link and register themselves as a member of an API provider organization. IBM X-Force ID: 196536.", + "lang": "eng" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6430107", + "url": "https://www.ibm.com/support/pages/node/6430107", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6430107 (API Connect)" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-api-cve202120440-info-disc (196536)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196536" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28434.json b/2021/28xxx/CVE-2021-28434.json new file mode 100644 index 00000000000..efff5346e5e --- /dev/null +++ b/2021/28xxx/CVE-2021-28434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28435.json b/2021/28xxx/CVE-2021-28435.json new file mode 100644 index 00000000000..15a70f7c879 --- /dev/null +++ b/2021/28xxx/CVE-2021-28435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28436.json b/2021/28xxx/CVE-2021-28436.json new file mode 100644 index 00000000000..276ddd7168b --- /dev/null +++ b/2021/28xxx/CVE-2021-28436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28437.json b/2021/28xxx/CVE-2021-28437.json new file mode 100644 index 00000000000..dfe0be94b70 --- /dev/null +++ b/2021/28xxx/CVE-2021-28437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28438.json b/2021/28xxx/CVE-2021-28438.json new file mode 100644 index 00000000000..4d56f1435c0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28439.json b/2021/28xxx/CVE-2021-28439.json new file mode 100644 index 00000000000..6c5c71aafa9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28440.json b/2021/28xxx/CVE-2021-28440.json new file mode 100644 index 00000000000..5a9cb0a93d9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28441.json b/2021/28xxx/CVE-2021-28441.json new file mode 100644 index 00000000000..a3a76d1bb72 --- /dev/null +++ b/2021/28xxx/CVE-2021-28441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28442.json b/2021/28xxx/CVE-2021-28442.json new file mode 100644 index 00000000000..de68e2e99bf --- /dev/null +++ b/2021/28xxx/CVE-2021-28442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28443.json b/2021/28xxx/CVE-2021-28443.json new file mode 100644 index 00000000000..c62d4978ce0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28443.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28443", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28444.json b/2021/28xxx/CVE-2021-28444.json new file mode 100644 index 00000000000..79f2c0efa68 --- /dev/null +++ b/2021/28xxx/CVE-2021-28444.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28444", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28445.json b/2021/28xxx/CVE-2021-28445.json new file mode 100644 index 00000000000..e4b875dbdaf --- /dev/null +++ b/2021/28xxx/CVE-2021-28445.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28445", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28446.json b/2021/28xxx/CVE-2021-28446.json new file mode 100644 index 00000000000..3b8b4689abe --- /dev/null +++ b/2021/28xxx/CVE-2021-28446.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28446", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28447.json b/2021/28xxx/CVE-2021-28447.json new file mode 100644 index 00000000000..791dcc8ba13 --- /dev/null +++ b/2021/28xxx/CVE-2021-28447.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28447", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28448.json b/2021/28xxx/CVE-2021-28448.json new file mode 100644 index 00000000000..866ae414a21 --- /dev/null +++ b/2021/28xxx/CVE-2021-28448.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28448", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28449.json b/2021/28xxx/CVE-2021-28449.json new file mode 100644 index 00000000000..4b0459d55a1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28449.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28449", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28450.json b/2021/28xxx/CVE-2021-28450.json new file mode 100644 index 00000000000..a0f738dc03b --- /dev/null +++ b/2021/28xxx/CVE-2021-28450.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28450", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28451.json b/2021/28xxx/CVE-2021-28451.json new file mode 100644 index 00000000000..cebe3a0053d --- /dev/null +++ b/2021/28xxx/CVE-2021-28451.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28451", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28452.json b/2021/28xxx/CVE-2021-28452.json new file mode 100644 index 00000000000..57adecbb3d2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28452.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28452", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28453.json b/2021/28xxx/CVE-2021-28453.json new file mode 100644 index 00000000000..cd167029792 --- /dev/null +++ b/2021/28xxx/CVE-2021-28453.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28453", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28454.json b/2021/28xxx/CVE-2021-28454.json new file mode 100644 index 00000000000..375fb2348b0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28454.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28454", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28455.json b/2021/28xxx/CVE-2021-28455.json new file mode 100644 index 00000000000..355cde626e4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28455.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28455", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28456.json b/2021/28xxx/CVE-2021-28456.json new file mode 100644 index 00000000000..7904ab1fcfb --- /dev/null +++ b/2021/28xxx/CVE-2021-28456.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28456", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28457.json b/2021/28xxx/CVE-2021-28457.json new file mode 100644 index 00000000000..ef2d5857dfb --- /dev/null +++ b/2021/28xxx/CVE-2021-28457.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28457", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28458.json b/2021/28xxx/CVE-2021-28458.json new file mode 100644 index 00000000000..08b23a8d28a --- /dev/null +++ b/2021/28xxx/CVE-2021-28458.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28458", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28459.json b/2021/28xxx/CVE-2021-28459.json new file mode 100644 index 00000000000..350bf46ab36 --- /dev/null +++ b/2021/28xxx/CVE-2021-28459.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28459", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28460.json b/2021/28xxx/CVE-2021-28460.json new file mode 100644 index 00000000000..96f8b98c5d4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28460.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28460", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28461.json b/2021/28xxx/CVE-2021-28461.json new file mode 100644 index 00000000000..1d8d4d2553e --- /dev/null +++ b/2021/28xxx/CVE-2021-28461.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28461", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28462.json b/2021/28xxx/CVE-2021-28462.json new file mode 100644 index 00000000000..d6c447b10aa --- /dev/null +++ b/2021/28xxx/CVE-2021-28462.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28462", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28463.json b/2021/28xxx/CVE-2021-28463.json new file mode 100644 index 00000000000..6d7d70f7993 --- /dev/null +++ b/2021/28xxx/CVE-2021-28463.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28463", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28464.json b/2021/28xxx/CVE-2021-28464.json new file mode 100644 index 00000000000..e1dd330f4a0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28464.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28464", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28465.json b/2021/28xxx/CVE-2021-28465.json new file mode 100644 index 00000000000..8f8de444f03 --- /dev/null +++ b/2021/28xxx/CVE-2021-28465.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28465", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28466.json b/2021/28xxx/CVE-2021-28466.json new file mode 100644 index 00000000000..7eb0f57f111 --- /dev/null +++ b/2021/28xxx/CVE-2021-28466.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28466", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28467.json b/2021/28xxx/CVE-2021-28467.json new file mode 100644 index 00000000000..597dc83663b --- /dev/null +++ b/2021/28xxx/CVE-2021-28467.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28467", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28468.json b/2021/28xxx/CVE-2021-28468.json new file mode 100644 index 00000000000..5292aabcd18 --- /dev/null +++ b/2021/28xxx/CVE-2021-28468.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28468", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28469.json b/2021/28xxx/CVE-2021-28469.json new file mode 100644 index 00000000000..14b0e63d593 --- /dev/null +++ b/2021/28xxx/CVE-2021-28469.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28469", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28470.json b/2021/28xxx/CVE-2021-28470.json new file mode 100644 index 00000000000..470c5054431 --- /dev/null +++ b/2021/28xxx/CVE-2021-28470.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28470", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28471.json b/2021/28xxx/CVE-2021-28471.json new file mode 100644 index 00000000000..9e85ce5e61e --- /dev/null +++ b/2021/28xxx/CVE-2021-28471.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28471", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28472.json b/2021/28xxx/CVE-2021-28472.json new file mode 100644 index 00000000000..08e1e618c14 --- /dev/null +++ b/2021/28xxx/CVE-2021-28472.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28472", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28473.json b/2021/28xxx/CVE-2021-28473.json new file mode 100644 index 00000000000..cf654e20e91 --- /dev/null +++ b/2021/28xxx/CVE-2021-28473.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28473", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28474.json b/2021/28xxx/CVE-2021-28474.json new file mode 100644 index 00000000000..d0f74f72869 --- /dev/null +++ b/2021/28xxx/CVE-2021-28474.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28474", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28475.json b/2021/28xxx/CVE-2021-28475.json new file mode 100644 index 00000000000..00d9bd55a9b --- /dev/null +++ b/2021/28xxx/CVE-2021-28475.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28475", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28476.json b/2021/28xxx/CVE-2021-28476.json new file mode 100644 index 00000000000..3b470c5e4f5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28477.json b/2021/28xxx/CVE-2021-28477.json new file mode 100644 index 00000000000..ea2e005b629 --- /dev/null +++ b/2021/28xxx/CVE-2021-28477.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28477", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28478.json b/2021/28xxx/CVE-2021-28478.json new file mode 100644 index 00000000000..9decd655341 --- /dev/null +++ b/2021/28xxx/CVE-2021-28478.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28478", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28479.json b/2021/28xxx/CVE-2021-28479.json new file mode 100644 index 00000000000..60edab301fe --- /dev/null +++ b/2021/28xxx/CVE-2021-28479.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28479", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28480.json b/2021/28xxx/CVE-2021-28480.json new file mode 100644 index 00000000000..52b039c0915 --- /dev/null +++ b/2021/28xxx/CVE-2021-28480.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28480", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28481.json b/2021/28xxx/CVE-2021-28481.json new file mode 100644 index 00000000000..fe3fe9b268b --- /dev/null +++ b/2021/28xxx/CVE-2021-28481.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28481", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28482.json b/2021/28xxx/CVE-2021-28482.json new file mode 100644 index 00000000000..21bc4f96c21 --- /dev/null +++ b/2021/28xxx/CVE-2021-28482.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28482", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28483.json b/2021/28xxx/CVE-2021-28483.json new file mode 100644 index 00000000000..66e51a657c7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28483.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28483", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3167.json b/2021/3xxx/CVE-2021-3167.json index 346be8db791..98d6b3daf9c 100644 --- a/2021/3xxx/CVE-2021-3167.json +++ b/2021/3xxx/CVE-2021-3167.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3167", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3167", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Cloudera Data Engineering (CDE) 1.3.0, JWT authentication tokens are exposed to administrators in virtual cluster server logs." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html", + "refsource": "MISC", + "name": "https://docs.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html" + }, + { + "refsource": "MISC", + "name": "https://my.cloudera.com/knowledge/TSB-2021-466-CDE-authentication-tokens-exposed-in-pod-and?id=310163", + "url": "https://my.cloudera.com/knowledge/TSB-2021-466-CDE-authentication-tokens-exposed-in-pod-and?id=310163" + }, + { + "refsource": "MISC", + "name": "https://docs.cloudera.com/data-engineering/cloud/release-notes/topics/cde-general-known-issues.html", + "url": "https://docs.cloudera.com/data-engineering/cloud/release-notes/topics/cde-general-known-issues.html" + } + ] + }, + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file From c71df0cb31768509c10db12c0efdd9807da385c4 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Mon, 15 Mar 2021 18:37:50 +0200 Subject: [PATCH 339/845] Adds CVE-2021-23355 --- 2021/23xxx/CVE-2021-23355.json | 76 ++++++++++++++++++++++++++++++++-- 1 file changed, 72 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23355.json b/2021/23xxx/CVE-2021-23355.json index 4100fed7209..09cb351a978 100644 --- a/2021/23xxx/CVE-2021-23355.json +++ b/2021/23xxx/CVE-2021-23355.json @@ -3,16 +3,84 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-15T16:37:48.658985Z", "ID": "CVE-2021-23355", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Arbitrary Command Injection" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ps-kill", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-PSKILL-1078529" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects all versions of package ps-kill.\n If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization in the index.js file.\r\n\r\n\r\nPoC (provided by reporter):\r\n\r\nvar ps_kill = require('ps-kill');\r\n\r\nps_kill.kill('$(touch success)',function(){});\r\n\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "OmniTaint" + } + ] } \ No newline at end of file From 3e4d605fe4c5af95ee14f43d63dac7c63b857d80 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Mon, 15 Mar 2021 18:38:41 +0200 Subject: [PATCH 340/845] Adds CVE-2021-23356 --- 2021/23xxx/CVE-2021-23356.json | 76 ++++++++++++++++++++++++++++++++-- 1 file changed, 72 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23356.json b/2021/23xxx/CVE-2021-23356.json index 6a44d97837d..b743abda97a 100644 --- a/2021/23xxx/CVE-2021-23356.json +++ b/2021/23xxx/CVE-2021-23356.json @@ -3,16 +3,84 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-15T16:38:39.688011Z", "ID": "CVE-2021-23356", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Arbitrary Command Injection" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "kill-process-by-name", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects all versions of package kill-process-by-name.\n If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization in the index.js file.\r\n\r\n\r\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "OmniTaint" + } + ] } \ No newline at end of file From 0885d440c6c8d0c89dceab8d888441e6385ec6ab Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Mon, 15 Mar 2021 18:40:28 +0200 Subject: [PATCH 341/845] Adds CVE-2021-23357 --- 2021/23xxx/CVE-2021-23357.json | 80 ++++++++++++++++++++++++++++++++-- 1 file changed, 76 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23357.json b/2021/23xxx/CVE-2021-23357.json index 6399d67d4a2..b738634fcbe 100644 --- a/2021/23xxx/CVE-2021-23357.json +++ b/2021/23xxx/CVE-2021-23357.json @@ -3,16 +3,88 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-15T16:40:25.829280Z", "ID": "CVE-2021-23357", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Directory Traversal" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "github.com/TykTechnologies/tyk/gateway", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Directory Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/TykTechnologies/tyk/issues/3390" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function.\r\n\r\nThis function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request.\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + } + }, + "credit": [ + { + "lang": "eng", + "value": "calabdean" + } + ] } \ No newline at end of file From 1c623c22c64f44a4b7e3d9de21ce4e84d98ce8fb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 17:00:44 +0000 Subject: [PATCH 342/845] "-Synchronized-Data." --- 2018/10xxx/CVE-2018-10237.json | 5 +++ 2019/17xxx/CVE-2019-17558.json | 5 +++ 2020/24xxx/CVE-2020-24877.json | 56 +++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27216.json | 10 ++++++ 2021/23xxx/CVE-2021-23355.json | 7 ++-- 2021/23xxx/CVE-2021-23356.json | 7 ++-- 2021/23xxx/CVE-2021-23357.json | 12 ++++--- 2021/27xxx/CVE-2021-27695.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27817.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27889.json | 56 +++++++++++++++++++++++++++---- 10 files changed, 245 insertions(+), 35 deletions(-) diff --git a/2018/10xxx/CVE-2018-10237.json b/2018/10xxx/CVE-2018-10237.json index 06cff29e1ad..3baa8985242 100644 --- a/2018/10xxx/CVE-2018-10237.json +++ b/2018/10xxx/CVE-2018-10237.json @@ -291,6 +291,11 @@ "refsource": "MLIST", "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[storm-issues] 20210315 [jira] [Created] (STORM-3754) Upgrade Guava version because of security vulnerability", + "url": "https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E" } ] } diff --git a/2019/17xxx/CVE-2019-17558.json b/2019/17xxx/CVE-2019-17558.json index 36d0e1cd054..463065215a4 100644 --- a/2019/17xxx/CVE-2019-17558.json +++ b/2019/17xxx/CVE-2019-17558.json @@ -178,6 +178,11 @@ "refsource": "MLIST", "name": "[lucene-solr-user] 20210213 Re: CVE-2019-17558 on SOLR 6.1", "url": "https://lists.apache.org/thread.html/r5dc200f7337093285bac40e6d5de5ea66597c3da343a0f7553f1bb12@%3Csolr-user.lucene.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[lucene-issues] 20210315 [GitHub] [lucene-solr] erikhatcher commented on pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability", + "url": "https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071@%3Cissues.lucene.apache.org%3E" } ] }, diff --git a/2020/24xxx/CVE-2020-24877.json b/2020/24xxx/CVE-2020-24877.json index 3e16d8827ae..c17b04a7669 100644 --- a/2020/24xxx/CVE-2020-24877.json +++ b/2020/24xxx/CVE-2020-24877.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24877", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24877", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL injection vulnerability in zzzphp v1.8.0 through /form/index.php?module=getjson may lead to a possible access restriction bypass." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/h4ckdepy/zzzphp/issues/1", + "refsource": "MISC", + "name": "https://github.com/h4ckdepy/zzzphp/issues/1" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 085b2f67830..8f91a718c43 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -495,6 +495,16 @@ "refsource": "MLIST", "name": "[beam-issues] 20210313 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210315 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210315 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2021/23xxx/CVE-2021-23355.json b/2021/23xxx/CVE-2021-23355.json index 09cb351a978..dbb31db4523 100644 --- a/2021/23xxx/CVE-2021-23355.json +++ b/2021/23xxx/CVE-2021-23355.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-PSKILL-1078529" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-PSKILL-1078529", + "name": "https://snyk.io/vuln/SNYK-JS-PSKILL-1078529" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package ps-kill.\n If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization in the index.js file.\r\n\r\n\r\nPoC (provided by reporter):\r\n\r\nvar ps_kill = require('ps-kill');\r\n\r\nps_kill.kill('$(touch success)',function(){});\r\n\n" + "value": "This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)',function(){});" } ] }, diff --git a/2021/23xxx/CVE-2021-23356.json b/2021/23xxx/CVE-2021-23356.json index b743abda97a..0dbba18a117 100644 --- a/2021/23xxx/CVE-2021-23356.json +++ b/2021/23xxx/CVE-2021-23356.json @@ -48,8 +48,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534", + "name": "https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534" } ] }, @@ -57,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package kill-process-by-name.\n If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization in the index.js file.\r\n\r\n\r\n" + "value": "This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file." } ] }, diff --git a/2021/23xxx/CVE-2021-23357.json b/2021/23xxx/CVE-2021-23357.json index b738634fcbe..a9678541d5f 100644 --- a/2021/23xxx/CVE-2021-23357.json +++ b/2021/23xxx/CVE-2021-23357.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516", + "name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516" }, { - "refsource": "CONFIRM", - "url": "https://github.com/TykTechnologies/tyk/issues/3390" + "refsource": "MISC", + "url": "https://github.com/TykTechnologies/tyk/issues/3390", + "name": "https://github.com/TykTechnologies/tyk/issues/3390" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function.\r\n\r\nThis function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request.\n" + "value": "All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request." } ] }, diff --git a/2021/27xxx/CVE-2021-27695.json b/2021/27xxx/CVE-2021-27695.json index 60100eaaaf0..2f607aa790d 100644 --- a/2021/27xxx/CVE-2021-27695.json +++ b/2021/27xxx/CVE-2021-27695.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27695", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27695", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in openMAINT 2.1-3.3-b allow remote attackers to inject arbitrary web script or HTML via any \"Add\" sections, such as Add Card Building & Floor, or others in the Name and Code Parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://openmaint.com", + "refsource": "MISC", + "name": "http://openmaint.com" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49649", + "url": "https://www.exploit-db.com/exploits/49649" } ] } diff --git a/2021/27xxx/CVE-2021-27817.json b/2021/27xxx/CVE-2021-27817.json index 07c18dc64bc..af9fcb17de5 100644 --- a/2021/27xxx/CVE-2021-27817.json +++ b/2021/27xxx/CVE-2021-27817.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27817", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27817", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote command execution vulnerability in shopxo 1.9.3 allows an attacker to upload malicious code generated by phar where the suffix is JPG, which is uploaded after modifying the phar suffix." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gongfuxiang/shopxo", + "refsource": "MISC", + "name": "https://github.com/gongfuxiang/shopxo" + }, + { + "url": "https://github.com/h4ckdepy/vuls/blob/main/shopxo.md", + "refsource": "MISC", + "name": "https://github.com/h4ckdepy/vuls/blob/main/shopxo.md" } ] } diff --git a/2021/27xxx/CVE-2021-27889.json b/2021/27xxx/CVE-2021-27889.json index 196bdcfd6b8..edcee4cf3a0 100644 --- a/2021/27xxx/CVE-2021-27889.json +++ b/2021/27xxx/CVE-2021-27889.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27889", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27889", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site Scriptiong (XSS) vulnerability in MyBB before 1.8.26 via Nested Auto URL when parsing messages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mybb/mybb/security/advisories/GHSA-xhj7-3349-mqcm", + "url": "https://github.com/mybb/mybb/security/advisories/GHSA-xhj7-3349-mqcm" } ] } From 7a9c847c2a10524fc17c70c19a9ee9a28013dca5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 18:00:44 +0000 Subject: [PATCH 343/845] "-Synchronized-Data." --- 2017/12xxx/CVE-2017-12741.json | 2 +- 2017/2xxx/CVE-2017-2680.json | 2 +- 2017/2xxx/CVE-2017-2681.json | 2 +- 2019/10xxx/CVE-2019-10925.json | 12 ++++---- 2019/10xxx/CVE-2019-10926.json | 12 ++++---- 2019/13xxx/CVE-2019-13946.json | 2 +- 2019/19xxx/CVE-2019-19300.json | 2 +- 2019/6xxx/CVE-2019-6570.json | 2 +- 2020/25xxx/CVE-2020-25236.json | 7 +++-- 2020/25xxx/CVE-2020-25239.json | 7 +++-- 2020/25xxx/CVE-2020-25240.json | 7 +++-- 2020/25xxx/CVE-2020-25241.json | 7 +++-- 2020/28xxx/CVE-2020-28385.json | 5 +-- 2020/28xxx/CVE-2020-28387.json | 7 +++-- 2020/28xxx/CVE-2020-28388.json | 4 +-- 2020/7xxx/CVE-2020-7580.json | 2 +- 2020/7xxx/CVE-2020-7581.json | 2 +- 2020/7xxx/CVE-2020-7587.json | 2 +- 2020/7xxx/CVE-2020-7588.json | 2 +- 2021/25xxx/CVE-2021-25667.json | 7 +++-- 2021/25xxx/CVE-2021-25672.json | 7 +++-- 2021/25xxx/CVE-2021-25673.json | 7 +++-- 2021/25xxx/CVE-2021-25674.json | 7 +++-- 2021/25xxx/CVE-2021-25675.json | 7 +++-- 2021/25xxx/CVE-2021-25676.json | 7 +++-- 2021/27xxx/CVE-2021-27380.json | 7 +++-- 2021/27xxx/CVE-2021-27381.json | 7 +++-- 2021/27xxx/CVE-2021-27890.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27946.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27947.json | 56 ++++++++++++++++++++++++++++++---- 30 files changed, 229 insertions(+), 83 deletions(-) diff --git a/2017/12xxx/CVE-2017-12741.json b/2017/12xxx/CVE-2017-12741.json index 560621e7d90..03cacc53685 100644 --- a/2017/12xxx/CVE-2017-12741.json +++ b/2017/12xxx/CVE-2017-12741.json @@ -656,7 +656,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC Compact Field Unit, SIMATIC ET200AL, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0), SIMATIC ET200pro, SIMATIC PN/PN Coupler (incl. SIPLUS NET variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-200 Smart, SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX (F) 2010, SIMOCODE pro V EIP (incl. SIPLUS variants), SIMOCODE pro V PN (incl. SIPLUS variants), SIMOTION C, SIMOTION D (incl. SIPLUS variants), SIMOTION D4xx V4.4 for SINAMICS SM150i-2 w. PROFINET (incl. SIPLUS variants), SIMOTION P V4.4 and V4.5, SIMOTION P V5, SINAMICS DCM w. PN, SINAMICS DCP w. PN, SINAMICS G110M w. PN, SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants), SINAMICS G130 V4.7 w. PN, SINAMICS G130 V4.8 w. PN, SINAMICS G150 V4.7 w. PN, SINAMICS G150 V4.8 w. PN, SINAMICS GH150 V4.7 w. PROFINET, SINAMICS GL150 V4.7 w. PROFINET, SINAMICS GM150 V4.7 w. PROFINET, SINAMICS S110 w. PN, SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants), SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants), SINAMICS S150 V4.7 w. PN, SINAMICS S150 V4.8 w. PN, SINAMICS SL150 V4.7.0 w. PROFINET, SINAMICS SL150 V4.7.4 w. PROFINET, SINAMICS SL150 V4.7.5 w. PROFINET, SINAMICS SM120 V4.7 w. PROFINET, SINAMICS V90 w. PN, SINUMERIK 840D sl, SIRIUS Soft Starter 3RW44 PN. Specially crafted packets sent to port 161/udp could cause a Denial-of-Service condition. The affected devices must be restarted manually.\n" + "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC Compact Field Unit, SIMATIC ET200AL, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0), SIMATIC ET200pro, SIMATIC PN/PN Coupler (incl. SIPLUS NET variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-200 Smart, SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX (F) 2010, SIMOCODE pro V EIP (incl. SIPLUS variants), SIMOCODE pro V PN (incl. SIPLUS variants), SIMOTION C, SIMOTION D (incl. SIPLUS variants), SIMOTION D4xx V4.4 for SINAMICS SM150i-2 w. PROFINET (incl. SIPLUS variants), SIMOTION P V4.4 and V4.5, SIMOTION P V5, SINAMICS DCM w. PN, SINAMICS DCP w. PN, SINAMICS G110M w. PN, SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants), SINAMICS G130 V4.7 w. PN, SINAMICS G130 V4.8 w. PN, SINAMICS G150 V4.7 w. PN, SINAMICS G150 V4.8 w. PN, SINAMICS GH150 V4.7 w. PROFINET, SINAMICS GL150 V4.7 w. PROFINET, SINAMICS GM150 V4.7 w. PROFINET, SINAMICS S110 w. PN, SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants), SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants), SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants), SINAMICS S150 V4.7 w. PN, SINAMICS S150 V4.8 w. PN, SINAMICS SL150 V4.7.0 w. PROFINET, SINAMICS SL150 V4.7.4 w. PROFINET, SINAMICS SL150 V4.7.5 w. PROFINET, SINAMICS SM120 V4.7 w. PROFINET, SINAMICS V90 w. PN, SINUMERIK 840D sl, SIRIUS Soft Starter 3RW44 PN. Specially crafted packets sent to port 161/udp could cause a Denial-of-Service condition. The affected devices must be restarted manually." } ] }, diff --git a/2017/2xxx/CVE-2017-2680.json b/2017/2xxx/CVE-2017-2680.json index 651f121b809..569c653770b 100644 --- a/2017/2xxx/CVE-2017-2680.json +++ b/2017/2xxx/CVE-2017-2680.json @@ -1116,7 +1116,7 @@ "description_data": [ { "lang": "eng", - "value": "Specially crafted PROFINET DCP broadcast packets could cause a Denial-of-Service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.\n" + "value": "Specially crafted PROFINET DCP broadcast packets could cause a Denial-of-Service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected." } ] }, diff --git a/2017/2xxx/CVE-2017-2681.json b/2017/2xxx/CVE-2017-2681.json index 55bebe0edef..b355ccbfff5 100644 --- a/2017/2xxx/CVE-2017-2681.json +++ b/2017/2xxx/CVE-2017-2681.json @@ -956,7 +956,7 @@ "description_data": [ { "lang": "eng", - "value": "Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a Denial-of-Service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices.\n" + "value": "Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a Denial-of-Service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices." } ] }, diff --git a/2019/10xxx/CVE-2019-10925.json b/2019/10xxx/CVE-2019-10925.json index 646260ba707..5c4ec1672b1 100644 --- a/2019/10xxx/CVE-2019-10925.json +++ b/2019/10xxx/CVE-2019-10925.json @@ -46,12 +46,17 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially\ncrafted requests to the integrated webserver.\n\nThe security vulnerability can be exploited by an attacker with network\naccess to the device. Valid user credentials, but no user interaction are\nrequired. Successful exploitation compromises integrity and availability of\nthe device.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n" + "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "references": { "reference_data": [ + { + "refsource": "BID", + "name": "108725", + "url": "http://www.securityfocus.com/bid/108725" + }, { "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-816980.pdf", @@ -61,11 +66,6 @@ "refsource": "MISC", "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-162-02", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-162-02" - }, - { - "refsource": "BID", - "name": "108725", - "url": "http://www.securityfocus.com/bid/108725" } ] } diff --git a/2019/10xxx/CVE-2019-10926.json b/2019/10xxx/CVE-2019-10926.json index 9dbcd7ed0cd..703f808cfb2 100644 --- a/2019/10xxx/CVE-2019-10926.json +++ b/2019/10xxx/CVE-2019-10926.json @@ -46,12 +46,17 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). Communication with the device is not encrypted. Data transmitted between the\ndevice and the user can be obtained by an attacker in a privileged network\nposition.\n\nThe security vulnerability can be exploited by an attacker in a privileged\nnetwork position which allows eavesdropping the communication between the\naffected device and the user. The user must invoke a session. Successful\nexploitation of the vulnerability compromises confidentiality of the data\ntransmitted.\n" + "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). Communication with the device is not encrypted. Data transmitted between the device and the user can be obtained by an attacker in a privileged network position. The security vulnerability can be exploited by an attacker in a privileged network position which allows eavesdropping the communication between the affected device and the user. The user must invoke a session. Successful exploitation of the vulnerability compromises confidentiality of the data transmitted." } ] }, "references": { "reference_data": [ + { + "refsource": "BID", + "name": "108725", + "url": "http://www.securityfocus.com/bid/108725" + }, { "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-816980.pdf", @@ -61,11 +66,6 @@ "refsource": "MISC", "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-162-02", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-162-02" - }, - { - "refsource": "BID", - "name": "108725", - "url": "http://www.securityfocus.com/bid/108725" } ] } diff --git a/2019/13xxx/CVE-2019-13946.json b/2019/13xxx/CVE-2019-13946.json index 92beb8d517c..b6cb93d5347 100644 --- a/2019/13xxx/CVE-2019-13946.json +++ b/2019/13xxx/CVE-2019-13946.json @@ -476,7 +476,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All Versions < V4.5), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All Versions < V4.6), PROFINET Driver for Controller (All Versions < V2.1), RUGGEDCOM RM1224 (All versions < V4.3), SCALANCE M-800 / S615 (All versions < V4.3), SCALANCE W700 IEEE 802.11n (All versions <= V6.0.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All Versions < V5.3), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions), SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG (All Versions < V3.0), SCALANCE XM-400 switch family (All Versions < V6.0), SCALANCE XR-500 switch family (All Versions < V6.0), SIMATIC ET200AL IM 157-1 PN (All versions), SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) (All versions), SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) (All versions), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All Versions < V4.2.0), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200S (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All Versions < V3.3.1), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0) (All versions), SIMATIC ET200pro, IM 154-3 PN HF (All versions), SIMATIC ET200pro, IM 154-4 PN HF (All versions), SIMATIC IPC Support, Package for VxWorks (All versions), SIMATIC MV400 family (All Versions < V7.0.6), SIMATIC NET CP 1616 and CP 1604 (All Versions < V2.8), SIMATIC NET CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 ERPC (All versions), SIMATIC NET CP 343-1 LEAN (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 OPC UA (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) (All Versions), SIMATIC RF180C (All versions), SIMATIC RF182C (All versions), SIMATIC RF600 family (All versions < V3), SIMOTION C (All versions < V4.5), SIMOTION D (incl. SIPLUS variants) (All versions < V4.5), SIMOTION P (All versions < V4.5), SINAMICS DCP (All Versions < V1.3), SOFTNET-IE PNIO (All versions). Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit\ninternal resource allocation when multiple legitimate diagnostic package\nrequests are sent to the DCE-RPC interface.\nThis could lead to a denial of service condition due to lack of memory\nfor devices that include a vulnerable version of the stack.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to an affected device. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise the availability of the device.\n" + "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All Versions < V4.5), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All Versions < V4.6), PROFINET Driver for Controller (All Versions < V2.1), RUGGEDCOM RM1224 (All versions < V4.3), SCALANCE M-800 / S615 (All versions < V4.3), SCALANCE W700 IEEE 802.11n (All versions <= V6.0.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All Versions < V5.3), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions), SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG (All Versions < V3.0), SCALANCE XM-400 switch family (All Versions < V6.0), SCALANCE XR-500 switch family (All Versions < V6.0), SIMATIC ET200AL IM 157-1 PN (All versions), SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) (All versions), SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) (All versions), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All Versions < V4.2.0), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200S (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All Versions < V3.3.1), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) (All Versions < V4.1.0), SIMATIC ET200ecoPN (except 6ES7141-6BG00-0BB0, 6ES7141-6BH00-0BB0, 6ES7142-6BG00-0BB0, 6ES7142-6BR00-0BB0, 6S7143-6BH00-0BB0, 6ES7146-6FF00-0AB0, 6ES7148-6JD00-0AB0 and 6ES7148-6JG00-0BB0) (All versions), SIMATIC ET200pro, IM 154-3 PN HF (All versions), SIMATIC ET200pro, IM 154-4 PN HF (All versions), SIMATIC IPC Support, Package for VxWorks (All versions), SIMATIC MV400 family (All Versions < V7.0.6), SIMATIC NET CP 1616 and CP 1604 (All Versions < V2.8), SIMATIC NET CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 ERPC (All versions), SIMATIC NET CP 343-1 LEAN (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 443-1 OPC UA (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) (All Versions), SIMATIC RF180C (All versions), SIMATIC RF182C (All versions), SIMATIC RF600 family (All versions < V3), SIMOTION C (All versions < V4.5), SIMOTION D (incl. SIPLUS variants) (All versions < V4.5), SIMOTION P (All versions < V4.5), SINAMICS DCP (All Versions < V1.3), SOFTNET-IE PNIO (All versions). Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit internal resource allocation when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. This could lead to a denial of service condition due to lack of memory for devices that include a vulnerable version of the stack. The security vulnerability could be exploited by an attacker with network access to an affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the availability of the device." } ] }, diff --git a/2019/19xxx/CVE-2019-19300.json b/2019/19xxx/CVE-2019-19300.json index 2a6f027d4b0..3a3842f4dc5 100644 --- a/2019/19xxx/CVE-2019-19300.json +++ b/2019/19xxx/CVE-2019-19300.json @@ -296,7 +296,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), KTK ATE530S (All versions), SIDOOR ATD430W (All versions), SIDOOR ATE530S COATED (All versions), SIDOOR ATE531S (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 MF HF (All versions), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC MICRO-DRIVE PDC (All versions), SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) (All versions >= V4.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.0), SIMATIC S7-1500 Software Controller (All versions < V2.0), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions), SIMATIC TDC CP51M1 (All versions), SIMATIC TDC CPU555 (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINAMICS S/G Control Unit w. PROFINET (All versions). The Interniche-based TCP Stack can be forced to make very expensive calls for every incoming packet which can lead to a denial of service.\n" + "value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), KTK ATE530S (All versions), SIDOOR ATD430W (All versions), SIDOOR ATE530S COATED (All versions), SIDOOR ATE531S (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 MF HF (All versions), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) (All versions >= V4.2), SIMATIC MICRO-DRIVE PDC (All versions), SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) (All versions >= V4.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.0), SIMATIC S7-1500 Software Controller (All versions < V2.0), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions), SIMATIC TDC CP51M1 (All versions), SIMATIC TDC CPU555 (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINAMICS S/G Control Unit w. PROFINET (All versions). The Interniche-based TCP Stack can be forced to make very expensive calls for every incoming packet which can lead to a denial of service." } ] }, diff --git a/2019/6xxx/CVE-2019-6570.json b/2019/6xxx/CVE-2019-6570.json index d92142a3fed..5cca1362880 100644 --- a/2019/6xxx/CVE-2019-6570.json +++ b/2019/6xxx/CVE-2019-6570.json @@ -46,7 +46,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Due to insufficient checking of user permissions, an attacker may access URLs that require special authorization.\n\nAn attacker must have access to a low privileged\naccount in order to exploit the vulnerability.\n" + "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Due to insufficient checking of user permissions, an attacker may access URLs that require special authorization. An attacker must have access to a low privileged account in order to exploit the vulnerability." } ] }, diff --git a/2020/25xxx/CVE-2020-25236.json b/2020/25xxx/CVE-2020-25236.json index abed636a1aa..77d4db9f11e 100644 --- a/2020/25xxx/CVE-2020-25236.json +++ b/2020/25xxx/CVE-2020-25236.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). The control logic (CL) the LOGO! 8 executes could be manipulated in a way that could cause the device\nexecuting the CL to improperly handle the manipulation and crash. After successful execution of the attack, the device needs to be manually reset.\n" + "value": "A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). The control logic (CL) the LOGO! 8 executes could be manipulated in a way that could cause the device executing the CL to improperly handle the manipulation and crash. After successful execution of the attack, the device needs to be manually reset." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-783481.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-783481.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-783481.pdf" } ] } diff --git a/2020/25xxx/CVE-2020-25239.json b/2020/25xxx/CVE-2020-25239.json index 19c3d815dbd..e4e08bdda53 100644 --- a/2020/25xxx/CVE-2020-25239.json +++ b/2020/25xxx/CVE-2020-25239.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). The webserver could allow unauthorized actions via special urls for unpriviledged users. The settings of the UMC authorization server could be changed to add a rogue server by an attacker authenticating with unprivilege user rights.\n" + "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). The webserver could allow unauthorized actions via special urls for unpriviledged users. The settings of the UMC authorization server could be changed to add a rogue server by an attacker authenticating with unprivilege user rights." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf" } ] } diff --git a/2020/25xxx/CVE-2020-25240.json b/2020/25xxx/CVE-2020-25240.json index e11601631ff..1a75b03e88d 100644 --- a/2020/25xxx/CVE-2020-25240.json +++ b/2020/25xxx/CVE-2020-25240.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). Unpriviledged users can access services when guessing the url. An attacker could impact availability, integrity and gain information from logs and templates of the service.\n" + "value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). Unpriviledged users can access services when guessing the url. An attacker could impact availability, integrity and gain information from logs and templates of the service." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-731317.pdf" } ] } diff --git a/2020/25xxx/CVE-2020-25241.json b/2020/25xxx/CVE-2020-25241.json index f35768d9dc4..52a9a917ec3 100644 --- a/2020/25xxx/CVE-2020-25241.json +++ b/2020/25xxx/CVE-2020-25241.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.\n" + "value": "A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28385.json b/2020/28xxx/CVE-2020-28385.json index 58c636bc1fe..88eada0d38a 100644 --- a/2020/28xxx/CVE-2020-28385.json +++ b/2020/28xxx/CVE-2020-28385.json @@ -73,8 +73,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28387.json b/2020/28xxx/CVE-2020-28387.json index f9f59a2fa59..f354ca60bad 100644 --- a/2020/28xxx/CVE-2020-28387.json +++ b/2020/28xxx/CVE-2020-28387.json @@ -56,15 +56,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923)\n" + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923)" } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2020/28xxx/CVE-2020-28388.json b/2020/28xxx/CVE-2020-28388.json index 296ed836eb1..e4e3ddf2b5d 100644 --- a/2020/28xxx/CVE-2020-28388.json +++ b/2020/28xxx/CVE-2020-28388.json @@ -66,7 +66,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2012.12), PLUSCONTROL 1st Gen (All versions). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones.\n" + "value": "A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2012.12), PLUSCONTROL 1st Gen (All versions). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones." } ] }, @@ -84,4 +84,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7580.json b/2020/7xxx/CVE-2020-7580.json index e2e8d7bc2d9..b47c3b03d5c 100644 --- a/2020/7xxx/CVE-2020-7580.json +++ b/2020/7xxx/CVE-2020-7580.json @@ -286,7 +286,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC Automation Tool (All versions), SIMATIC NET PC software (All versions V16 < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (All versions < V5.6 SP2 HF3), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC WinCC OA V3.16 (All versions < P018), SIMATIC WinCC OA V3.17 (All versions < P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions), SINEMA Server (All versions), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A component within the affected application regularly calls a helper binary with SYSTEM privileges while the call path is not quoted.\n" + "value": "A vulnerability has been identified in SIMATIC Automation Tool (All versions), SIMATIC NET PC software (All versions V16 < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (All versions < V5.6 SP2 HF3), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC WinCC OA V3.16 (All versions < P018), SIMATIC WinCC OA V3.17 (All versions < P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions), SINEMA Server (All versions), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A component within the affected application regularly calls a helper binary with SYSTEM privileges while the call path is not quoted." } ] }, diff --git a/2020/7xxx/CVE-2020-7581.json b/2020/7xxx/CVE-2020-7581.json index 4734a43e124..389ff8da61b 100644 --- a/2020/7xxx/CVE-2020-7581.json +++ b/2020/7xxx/CVE-2020-7581.json @@ -176,7 +176,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted.\n" + "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted." } ] }, diff --git a/2020/7xxx/CVE-2020-7587.json b/2020/7xxx/CVE-2020-7587.json index 50ad3668107..9682479cc68 100644 --- a/2020/7xxx/CVE-2020-7587.json +++ b/2020/7xxx/CVE-2020-7587.json @@ -196,7 +196,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could\ncause a partial remote Denial-of-Service, that would cause the service\nto restart itself.\n\nOn some cases the vulnerability could leak random information from the\nremote service.\n" + "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could cause a partial remote Denial-of-Service, that would cause the service to restart itself. On some cases the vulnerability could leak random information from the remote service." } ] }, diff --git a/2020/7xxx/CVE-2020-7588.json b/2020/7xxx/CVE-2020-7588.json index 73d6fde84d9..9b3f31bafce 100644 --- a/2020/7xxx/CVE-2020-7588.json +++ b/2020/7xxx/CVE-2020-7588.json @@ -196,7 +196,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a\npartial remote Denial-of-Service, that would cause the service to restart\nitself.\n" + "value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES <= V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES <= V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote Denial-of-Service, that would cause the service to restart itself." } ] }, diff --git a/2021/25xxx/CVE-2021-25667.json b/2021/25xxx/CVE-2021-25667.json index f621ad16fda..7a8d30c8b79 100644 --- a/2021/25xxx/CVE-2021-25667.json +++ b/2021/25xxx/CVE-2021-25667.json @@ -116,15 +116,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3), SCALANCE M-800 (All versions >= V4.3), SCALANCE S615 (All versions >= V4.3), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE X300WG (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XR500 (All versions < V6.2), SCALANCE Xx200 Family (All versions < V4.1). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could \nallow a remote attacker to trigger a denial-of-service condition or potentially remote code execution.\n\nSuccessful exploitation requires the passive listening feature of the device to be active.\n" + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3), SCALANCE M-800 (All versions >= V4.3), SCALANCE S615 (All versions >= V4.3), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE X300WG (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XR500 (All versions < V6.2), SCALANCE Xx200 Family (All versions < V4.1). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25672.json b/2021/25xxx/CVE-2021-25672.json index bb513a786d9..989ac803f6b 100644 --- a/2021/25xxx/CVE-2021-25672.json +++ b/2021/25xxx/CVE-2021-25672.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Mendix Forgot Password Appstore module (All Versions < V3.2.1). The Forgot Password Marketplace module does not properly control access. An attacker could take over accounts.\n" + "value": "A vulnerability has been identified in Mendix Forgot Password Appstore module (All Versions < V3.2.1). The Forgot Password Marketplace module does not properly control access. An attacker could take over accounts." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917115.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917115.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917115.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25673.json b/2021/25xxx/CVE-2021-25673.json index 70b4b993f98..bae11f9134e 100644 --- a/2021/25xxx/CVE-2021-25673.json +++ b/2021/25xxx/CVE-2021-25673.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, the application could enter an infinite loop, become unresponsive and must be restarted to restore the service.\n" + "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, the application could enter an infinite loop, become unresponsive and must be restarted to restore the service." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25674.json b/2021/25xxx/CVE-2021-25674.json index a627127396c..9b50fde0f64 100644 --- a/2021/25xxx/CVE-2021-25674.json +++ b/2021/25xxx/CVE-2021-25674.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a NULL pointer deference condition could cause the application to terminate unexpectedly and must be restarted to restore the service.\n" + "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a NULL pointer deference condition could cause the application to terminate unexpectedly and must be restarted to restore the service." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25675.json b/2021/25xxx/CVE-2021-25675.json index f38c4bb5539..f50f587e002 100644 --- a/2021/25xxx/CVE-2021-25675.json +++ b/2021/25xxx/CVE-2021-25675.json @@ -46,15 +46,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a divide by zero operation could occur and cause the application to terminate unexpectedly and must be restarted to restore the service.\n" + "value": "A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a divide by zero operation could occur and cause the application to terminate unexpectedly and must be restarted to restore the service." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-256092.pdf" } ] } diff --git a/2021/25xxx/CVE-2021-25676.json b/2021/25xxx/CVE-2021-25676.json index eb934ee1320..20d7bb47e1a 100644 --- a/2021/25xxx/CVE-2021-25676.json +++ b/2021/25xxx/CVE-2021-25676.json @@ -76,15 +76,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically.\n" + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically." } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-296266.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-296266.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-296266.pdf" } ] } diff --git a/2021/27xxx/CVE-2021-27380.json b/2021/27xxx/CVE-2021-27380.json index 8a3db197c93..92070f3a5bc 100644 --- a/2021/27xxx/CVE-2021-27380.json +++ b/2021/27xxx/CVE-2021-27380.json @@ -66,15 +66,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3), Solid Edge SE2021 (SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12532)\n" + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3), Solid Edge SE2021 (SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12532)" } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2021/27xxx/CVE-2021-27381.json b/2021/27xxx/CVE-2021-27381.json index 1d96586a51d..e9a4727ad2c 100644 --- a/2021/27xxx/CVE-2021-27381.json +++ b/2021/27xxx/CVE-2021-27381.json @@ -56,15 +56,16 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534)\n" + "value": "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534)" } ] }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" + "refsource": "MISC", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf" } ] } diff --git a/2021/27xxx/CVE-2021-27890.json b/2021/27xxx/CVE-2021-27890.json index c2b8b0c3b22..02cf3a1a655 100644 --- a/2021/27xxx/CVE-2021-27890.json +++ b/2021/27xxx/CVE-2021-27890.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27890", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27890", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerablity in MyBB before 1.8.26 via theme properties included in theme XML files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mybb/mybb/security/advisories/GHSA-r34m-ccm8-mfhq", + "url": "https://github.com/mybb/mybb/security/advisories/GHSA-r34m-ccm8-mfhq" } ] } diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json index 6bce2aa58cf..8b7581d10f6 100644 --- a/2021/27xxx/CVE-2021-27946.json +++ b/2021/27xxx/CVE-2021-27946.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27946", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27946", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mybb/mybb/security/advisories/GHSA-23m9-w75q-ph4p", + "url": "https://github.com/mybb/mybb/security/advisories/GHSA-23m9-w75q-ph4p" } ] } diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json index 2c05915b449..43fd3438f2a 100644 --- a/2021/27xxx/CVE-2021-27947.json +++ b/2021/27xxx/CVE-2021-27947.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27947", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27947", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mybb/mybb/security/advisories/GHSA-jjx8-8mcp-7h65", + "url": "https://github.com/mybb/mybb/security/advisories/GHSA-jjx8-8mcp-7h65" } ] } From 98ed5e95d8b4b224e46ff395e58a7b48b4217fb5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 18:01:00 +0000 Subject: [PATCH 344/845] "-Synchronized-Data." --- 2020/24xxx/CVE-2020-24982.json | 56 +++++++++++++++++++--- 2020/24xxx/CVE-2020-24985.json | 56 +++++++++++++++++++--- 2020/28xxx/CVE-2020-28149.json | 56 +++++++++++++++++++--- 2020/29xxx/CVE-2020-29555.json | 56 +++++++++++++++++++--- 2020/29xxx/CVE-2020-29556.json | 56 +++++++++++++++++++--- 2021/20xxx/CVE-2021-20286.json | 55 +++++++++++++++++++-- 2021/22xxx/CVE-2021-22191.json | 87 ++++++++++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27946.json | 2 +- 2021/27xxx/CVE-2021-27947.json | 2 +- 2021/27xxx/CVE-2021-27948.json | 56 +++++++++++++++++++--- 2021/27xxx/CVE-2021-27949.json | 56 +++++++++++++++++++--- 2021/28xxx/CVE-2021-28363.json | 61 +++++++++++++++++++++--- 12 files changed, 542 insertions(+), 57 deletions(-) diff --git a/2020/24xxx/CVE-2020-24982.json b/2020/24xxx/CVE-2020-24982.json index 87dd81d622f..865a9fc4268 100644 --- a/2020/24xxx/CVE-2020-24982.json +++ b/2020/24xxx/CVE-2020-24982.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24982", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24982", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Quadbase ExpressDashboard (EDAB) 7 Update 9. It allows CSRF. An attacker may be able to trick an authenticated user into changing the email address associated with their account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://c41nc.co.uk/cve-2020-24982/", + "url": "https://c41nc.co.uk/cve-2020-24982/" } ] } diff --git a/2020/24xxx/CVE-2020-24985.json b/2020/24xxx/CVE-2020-24985.json index 1678dcf5c0c..23d43059449 100644 --- a/2020/24xxx/CVE-2020-24985.json +++ b/2020/24xxx/CVE-2020-24985.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24985", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24985", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Quadbase EspressReports ES 7 Update 9. An authenticated user is able to navigate to the MenuPage section of the application, and change the frmsrc parameter value to retrieve and execute external files or payloads." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://c41nc.co.uk/cve-2020-24985/", + "url": "https://c41nc.co.uk/cve-2020-24985/" } ] } diff --git a/2020/28xxx/CVE-2020-28149.json b/2020/28xxx/CVE-2020-28149.json index 1df896b263a..995c2819ee6 100644 --- a/2020/28xxx/CVE-2020-28149.json +++ b/2020/28xxx/CVE-2020-28149.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28149", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28149", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "myDBR 5.8.3/4262 is affected by: Cross Site Scripting (XSS). The impact is: execute arbitrary code (remote). The component is: CSRF Token. The attack vector is: CSRF token injection to XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://c41nc.co.uk/cve-2020-28149/", + "url": "https://c41nc.co.uk/cve-2020-28149/" } ] } diff --git a/2020/29xxx/CVE-2020-29555.json b/2020/29xxx/CVE-2020-29555.json index 490a76b5690..f38fc0b8611 100644 --- a/2020/29xxx/CVE-2020-29555.json +++ b/2020/29xxx/CVE-2020-29555.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29555", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29555", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The BackupDelete functionality in Grav CMS through 1.7.0-rc.17 allows an authenticated attacker to delete arbitrary files on the underlying server by exploiting a path-traversal technique. (This vulnerability can also be exploited by an unauthenticated attacker due to a lack of CSRF protection.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/", + "url": "https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/" } ] } diff --git a/2020/29xxx/CVE-2020-29556.json b/2020/29xxx/CVE-2020-29556.json index 3108d4cca15..b7680f428b0 100644 --- a/2020/29xxx/CVE-2020-29556.json +++ b/2020/29xxx/CVE-2020-29556.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29556", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29556", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Backup functionality in Grav CMS through 1.7.0-rc.17 allows an authenticated attacker to read arbitrary local files on the underlying server by exploiting a path-traversal technique. (This vulnerability can also be exploited by an unauthenticated attacker due to a lack of CSRF protection.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/", + "url": "https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/" } ] } diff --git a/2021/20xxx/CVE-2021-20286.json b/2021/20xxx/CVE-2021-20286.json index ad2ac9976de..f1c6ebcd7ae 100644 --- a/2021/20xxx/CVE-2021-20286.json +++ b/2021/20xxx/CVE-2021-20286.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20286", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "libnbd", + "version": { + "version_data": [ + { + "version_value": "libnbd 1.7.3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-617" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1934727", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934727" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0", + "url": "https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service." } ] } diff --git a/2021/22xxx/CVE-2021-22191.json b/2021/22xxx/CVE-2021-22191.json index 70c986b8042..8f577f2b4f2 100644 --- a/2021/22xxx/CVE-2021-22191.json +++ b/2021/22xxx/CVE-2021-22191.json @@ -4,15 +4,94 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22191", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Wireshark Foundation", + "product": { + "product_data": [ + { + "product_name": "Wireshark", + "version": { + "version_data": [ + { + "version_value": ">=3.4.0, <3.4.4" + }, + { + "version_value": ">=3.2.0, <3.2.12" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "External control of file name or path in Wireshark" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.wireshark.org/security/wnpa-sec-2021-03.html", + "url": "https://www.wireshark.org/security/wnpa-sec-2021-03.html", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/wireshark/wireshark/-/issues/17232", + "url": "https://gitlab.com/wireshark/wireshark/-/issues/17232", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22191.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22191.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Lukas Euler" + } + ] } \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json index 8b7581d10f6..73324fd83cd 100644 --- a/2021/27xxx/CVE-2021-27946.json +++ b/2021/27xxx/CVE-2021-27946.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3)." } ] }, diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json index 43fd3438f2a..0d0fac2fe5d 100644 --- a/2021/27xxx/CVE-2021-27947.json +++ b/2021/27xxx/CVE-2021-27947.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management. (issue 2 of 3)." } ] }, diff --git a/2021/27xxx/CVE-2021-27948.json b/2021/27xxx/CVE-2021-27948.json index 9b811dacc4b..e790a7bfc83 100644 --- a/2021/27xxx/CVE-2021-27948.json +++ b/2021/27xxx/CVE-2021-27948.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27948", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27948", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via User Groups. (issue 3 of 3)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mybb/mybb/security/advisories/GHSA-3p9w-2q65-r6g2", + "url": "https://github.com/mybb/mybb/security/advisories/GHSA-3p9w-2q65-r6g2" } ] } diff --git a/2021/27xxx/CVE-2021-27949.json b/2021/27xxx/CVE-2021-27949.json index 740b9f8f158..7e54a295bf2 100644 --- a/2021/27xxx/CVE-2021-27949.json +++ b/2021/27xxx/CVE-2021-27949.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27949", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27949", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site Scripting vulnerability in MyBB before 1.8.26 via Custom moderator tools." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mybb/mybb/security/advisories/GHSA-cmmr-39v8-8rx2", + "url": "https://github.com/mybb/mybb/security/advisories/GHSA-cmmr-39v8-8rx2" } ] } diff --git a/2021/28xxx/CVE-2021-28363.json b/2021/28xxx/CVE-2021-28363.json index c2dd3ef5958..bb0f12c553d 100644 --- a/2021/28xxx/CVE-2021-28363.json +++ b/2021/28xxx/CVE-2021-28363.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28363", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28363", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/urllib3/urllib3/commits/main", + "refsource": "MISC", + "name": "https://github.com/urllib3/urllib3/commits/main" + }, + { + "refsource": "CONFIRM", + "name": "https://pypi.org/project/urllib3/1.26.4/", + "url": "https://pypi.org/project/urllib3/1.26.4/" } ] } From 1ae37d9aec842a828aab44efdebb799c53ef033e Mon Sep 17 00:00:00 2001 From: Swayam Sarangi <52279915+ssarangi1202@users.noreply.github.com> Date: Tue, 16 Mar 2021 00:05:23 +0530 Subject: [PATCH 345/845] Publish CVE-2021-23879 SB is already live --- 2021/23xxx/CVE-2021-23879.json | 90 +++++++++++++++++++++++++++++++--- 1 file changed, 83 insertions(+), 7 deletions(-) diff --git a/2021/23xxx/CVE-2021-23879.json b/2021/23xxx/CVE-2021-23879.json index 5780fbe0198..ffd4c36ea87 100644 --- a/2021/23xxx/CVE-2021-23879.json +++ b/2021/23xxx/CVE-2021-23879.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@mcafee.com", + "DATE_PUBLIC": "2021-09-03T00:00:00.000Z", "ID": "CVE-2021-23879", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Unquoted service path vulnerability in McAfee Endpoint Product Removal (EPR) Tool prior to 21.2 allows local administrators to execute arbitrary code, with higher-level privileges, via execution from a compromised folder. The tool did not enforce and protect the execution path. Local admin privileges are required to place the files in the required location." }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Endpoint Product Removal Tool", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "21.x", + "version_value": "21.2" + } + ] + } + } + ] + }, + "vendor_name": "McAfee, LLC" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "McAfee credits Lockheed Martin Red Team for responsibly reporting this flaw." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unquoted service path vulnerability in McAfee Endpoint Product Removal (EPR) Tool prior to 21.2 allows local administrators to execute arbitrary code, with higher-level privileges, via execution from a compromised folder. The tool did not enforce and protect the execution path. Local admin privileges are required to place the files in the required location." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10351", + "refsource": "CONFIRM", + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10351" + } + ] + }, + "source": { + "discovery": "EXTERNAL" } -} \ No newline at end of file +} From 99557f21df56b4855144d45ef80f967b97afe514 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 19:00:46 +0000 Subject: [PATCH 346/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27946.json | 2 +- 2021/27xxx/CVE-2021-27947.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json index 73324fd83cd..8b7581d10f6 100644 --- a/2021/27xxx/CVE-2021-27946.json +++ b/2021/27xxx/CVE-2021-27946.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3)." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count." } ] }, diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json index 0d0fac2fe5d..43fd3438f2a 100644 --- a/2021/27xxx/CVE-2021-27947.json +++ b/2021/27xxx/CVE-2021-27947.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management. (issue 2 of 3)." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management." } ] }, From ef45cde4a1e463b022a1abfb17178bb931b88493 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 19:01:02 +0000 Subject: [PATCH 347/845] "-Synchronized-Data." --- 2020/29xxx/CVE-2020-29553.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27946.json | 2 +- 2021/27xxx/CVE-2021-27947.json | 2 +- 2021/3xxx/CVE-2021-3150.json | 56 ++++++++++++++++++++++++++++++---- 4 files changed, 102 insertions(+), 14 deletions(-) diff --git a/2020/29xxx/CVE-2020-29553.json b/2020/29xxx/CVE-2020-29553.json index 475fdb75817..2d3e1cce4a7 100644 --- a/2020/29xxx/CVE-2020-29553.json +++ b/2020/29xxx/CVE-2020-29553.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-29553", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-29553", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Scheduler in Grav CMS through 1.7.0-rc.17 allows an attacker to execute a system command by tricking an admin into visiting a malicious website (CSRF)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/", + "url": "https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/" } ] } diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json index 8b7581d10f6..73324fd83cd 100644 --- a/2021/27xxx/CVE-2021-27946.json +++ b/2021/27xxx/CVE-2021-27946.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3)." } ] }, diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json index 43fd3438f2a..0d0fac2fe5d 100644 --- a/2021/27xxx/CVE-2021-27947.json +++ b/2021/27xxx/CVE-2021-27947.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management. (issue 2 of 3)." } ] }, diff --git a/2021/3xxx/CVE-2021-3150.json b/2021/3xxx/CVE-2021-3150.json index ddf299ed3f6..7d74e3007e3 100644 --- a/2021/3xxx/CVE-2021-3150.json +++ b/2021/3xxx/CVE-2021-3150.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3150", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3150", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability on the Delete Personal Data page in Cryptshare Server before 4.8.0 allows an attacker to inject arbitrary web script or HTML via the user name. The issue is fixed with the version 4.8.1" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://wiki.cryptshare.com/display/CSM/Update+from+v4.7.1+to+v4.8.1", + "url": "https://wiki.cryptshare.com/display/CSM/Update+from+v4.7.1+to+v4.8.1" } ] } From 4fa4dbc61b3b9a129884a2bd15f30cf1a4756fbb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 20:00:42 +0000 Subject: [PATCH 348/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27946.json | 2 +- 2021/27xxx/CVE-2021-27947.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json index 73324fd83cd..8b7581d10f6 100644 --- a/2021/27xxx/CVE-2021-27946.json +++ b/2021/27xxx/CVE-2021-27946.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3)." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count." } ] }, diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json index 0d0fac2fe5d..43fd3438f2a 100644 --- a/2021/27xxx/CVE-2021-27947.json +++ b/2021/27xxx/CVE-2021-27947.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management. (issue 2 of 3)." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management." } ] }, From ac773cf13261beae731fa3aef536f2e827496b30 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 20:00:56 +0000 Subject: [PATCH 349/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27946.json | 2 +- 2021/27xxx/CVE-2021-27947.json | 2 +- 2021/3xxx/CVE-2021-3443.json | 18 ++++++++++++++++++ 3 files changed, 20 insertions(+), 2 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3443.json diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json index 8b7581d10f6..73324fd83cd 100644 --- a/2021/27xxx/CVE-2021-27946.json +++ b/2021/27xxx/CVE-2021-27946.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3)." } ] }, diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json index 43fd3438f2a..0d0fac2fe5d 100644 --- a/2021/27xxx/CVE-2021-27947.json +++ b/2021/27xxx/CVE-2021-27947.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management." + "value": "SQL Injection vulnerability in MyBB before 1.8.26 via the Copy Forum feature in Forum Management. (issue 2 of 3)." } ] }, diff --git a/2021/3xxx/CVE-2021-3443.json b/2021/3xxx/CVE-2021-3443.json new file mode 100644 index 00000000000..a9daf6d1f09 --- /dev/null +++ b/2021/3xxx/CVE-2021-3443.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3443", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From c88b01549bff69f5b7294473c47588cb274ca454 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 21:00:40 +0000 Subject: [PATCH 350/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 8f91a718c43..d22f01aa474 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -505,6 +505,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210315 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210315 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E" } ] } From e4130f672cf47ef54942fc4124cd4b904f21d0a2 Mon Sep 17 00:00:00 2001 From: Hasnain Lakhani Date: Mon, 15 Mar 2021 14:10:34 -0700 Subject: [PATCH 351/845] Adding CVE-2021-24029 --- 2021/24xxx/CVE-2021-24029.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 76 insertions(+), 6 deletions(-) diff --git a/2021/24xxx/CVE-2021-24029.json b/2021/24xxx/CVE-2021-24029.json index 49835b1bbe8..c131f8adcf6 100644 --- a/2021/24xxx/CVE-2021-24029.json +++ b/2021/24xxx/CVE-2021-24029.json @@ -1,17 +1,87 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@fb.com", + "DATE_ASSIGNED": "2021-03-10", "ID": "CVE-2021-24029", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Facebook", + "product": { + "product_data": [ + { + "product_name": "mvfst", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "a67083ff4b8dcbb7ee2839da6338032030d712b0" + }, + { + "version_affected": "<", + "version_value": "a67083ff4b8dcbb7ee2839da6338032030d712b0" + } + ] + } + }, + { + "product_name": "proxygen", + "version": { + "version_data": [ + { + "version_affected": "!>=", + "version_value": "v2021.03.15.00" + }, + { + "version_affected": "<", + "version_value": "v2021.03.15.00" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da6338032030d712b0 and proxygen versions prior to v2021.03.15.00." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reachable Assertion (CWE-617)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0", + "url": "https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0" + }, + { + "refsource": "CONFIRM", + "name": "https://www.facebook.com/security/advisories/cve-2021-24029", + "url": "https://www.facebook.com/security/advisories/cve-2021-24029" } ] } From 1ef2e829ebb365e64180e348d6f96b1c3dea11db Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 22:00:42 +0000 Subject: [PATCH 352/845] "-Synchronized-Data." --- 2020/22xxx/CVE-2020-22427.json | 2 +- 2020/25xxx/CVE-2020-25649.json | 5 +++ 2020/27xxx/CVE-2020-27278.json | 50 ++++++++++++++++++++++-- 2020/27xxx/CVE-2020-27282.json | 50 ++++++++++++++++++++++-- 2020/27xxx/CVE-2020-27290.json | 50 ++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20279.json | 55 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20280.json | 55 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20281.json | 55 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20282.json | 55 ++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20283.json | 55 ++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21300.json | 5 +++ 2021/26xxx/CVE-2021-26987.json | 70 ++++++++++++++++++++++++++++++++-- 2021/3xxx/CVE-2021-3418.json | 50 ++++++++++++++++++++++-- 13 files changed, 526 insertions(+), 31 deletions(-) diff --git a/2020/22xxx/CVE-2020-22427.json b/2020/22xxx/CVE-2020-22427.json index b3020572128..922a0667927 100644 --- a/2020/22xxx/CVE-2020-22427.json +++ b/2020/22xxx/CVE-2020-22427.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "NagiosXI 5.6.11 is affected by a remote code execution (RCE) vulnerability. An authenticated user can inject additional commands into a request." + "value": "** DISPUTED ** NagiosXI 5.6.11 is affected by a remote code execution (RCE) vulnerability. An authenticated nagiosadmin user can inject additional commands into a request. NOTE: the vendor disputes whether the CVE and its references are actionable because all technical details are omitted, and the only option is to pay for a subscription service where technical details may be disclosed at an unspecified later time." } ] }, diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json index 72d9eff8ec2..030016ae085 100644 --- a/2020/25xxx/CVE-2020-25649.json +++ b/2020/25xxx/CVE-2020-25649.json @@ -268,6 +268,11 @@ "refsource": "MLIST", "name": "[hive-issues] 20210223 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649", "url": "https://lists.apache.org/thread.html/rd57c7582adc90e233f23f3727db3df9115b27a823b92374f11453f34@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210315 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649", + "url": "https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27278.json b/2020/27xxx/CVE-2020-27278.json index 920dcf5e4ed..edffd154798 100644 --- a/2020/27xxx/CVE-2020-27278.json +++ b/2020/27xxx/CVE-2020-27278.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27278", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Hamilton Medical AG, T1-Ventillator", + "version": { + "version_data": [ + { + "version_value": "Versions 2.2.3 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "USE OF HARD-CODED CREDENTIALS CWE-798" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-047-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-047-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Hamilton Medical AG,T1-Ventillator versions 2.2.3 and prior, hard-coded credentials in the ventilator allow attackers with physical access to obtain admin privileges for the device\u2019s configuration interface." } ] } diff --git a/2020/27xxx/CVE-2020-27282.json b/2020/27xxx/CVE-2020-27282.json index 109a2d8254c..800872768d1 100644 --- a/2020/27xxx/CVE-2020-27282.json +++ b/2020/27xxx/CVE-2020-27282.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27282", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Hamilton Medical AG, T1-Ventillator", + "version": { + "version_data": [ + { + "version_value": "Versions 2.2.3 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "MISSING XML VALIDATION CWE-112" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-047-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-047-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Hamilton Medical AG,T1-Ventillator versions 2.2.3 and prior, an XML validation vulnerability in the ventilator allows privileged attackers with physical access to render the device persistently unusable by uploading specially crafted configuration files." } ] } diff --git a/2020/27xxx/CVE-2020-27290.json b/2020/27xxx/CVE-2020-27290.json index cff3c6b01be..ef3c57d918d 100644 --- a/2020/27xxx/CVE-2020-27290.json +++ b/2020/27xxx/CVE-2020-27290.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27290", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Hamilton Medical AG, T1-Ventillator", + "version": { + "version_data": [ + { + "version_value": "Versions 2.2.3 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-047-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-047-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Hamilton Medical AG,T1-Ventillator versions 2.2.3 and prior, an information disclosure vulnerability in the ventilator allows attackers with physical access to the configuration interface's logs to get valid checksums for tampered configuration files." } ] } diff --git a/2021/20xxx/CVE-2021-20279.json b/2021/20xxx/CVE-2021-20279.json index 949e8ec7a08..c5b96609631 100644 --- a/2021/20xxx/CVE-2021-20279.json +++ b/2021/20xxx/CVE-2021-20279.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20279", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "moodle", + "version": { + "version_data": [ + { + "version_value": "Fixed in 3.10.2, 3.9.5, 3.8.8, 3.5.17" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939033", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939033" + }, + { + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=419650", + "url": "https://moodle.org/mod/forum/discuss.php?d=419650" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The ID number user profile field required additional sanitizing to prevent a stored XSS risk in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17." } ] } diff --git a/2021/20xxx/CVE-2021-20280.json b/2021/20xxx/CVE-2021-20280.json index 981f3bef7fd..e4518d10713 100644 --- a/2021/20xxx/CVE-2021-20280.json +++ b/2021/20xxx/CVE-2021-20280.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20280", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "moodle", + "version": { + "version_data": [ + { + "version_value": "Fixed in 3.10.2, 3.9.5, 3.8.8, 3.5.17" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939037", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939037" + }, + { + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=419651", + "url": "https://moodle.org/mod/forum/discuss.php?d=419651" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17." } ] } diff --git a/2021/20xxx/CVE-2021-20281.json b/2021/20xxx/CVE-2021-20281.json index 87c8344f413..e01debb374a 100644 --- a/2021/20xxx/CVE-2021-20281.json +++ b/2021/20xxx/CVE-2021-20281.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20281", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "moodle", + "version": { + "version_data": [ + { + "version_value": "Fixed in 3.10.2, 3.9.5, 3.8.8, 3.5.17" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939041", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939041" + }, + { + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=419652", + "url": "https://moodle.org/mod/forum/discuss.php?d=419652" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17." } ] } diff --git a/2021/20xxx/CVE-2021-20282.json b/2021/20xxx/CVE-2021-20282.json index 03acaddd3a6..942ea152e50 100644 --- a/2021/20xxx/CVE-2021-20282.json +++ b/2021/20xxx/CVE-2021-20282.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20282", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "moodle", + "version": { + "version_data": [ + { + "version_value": "Fixed in 3.10.2, 3.9.5, 3.8.8, 3.5.17" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939046", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939046" + }, + { + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=419653", + "url": "https://moodle.org/mod/forum/discuss.php?d=419653" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When creating a user account, it was possible to verify the account without having access to the verification email link/secret in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17." } ] } diff --git a/2021/20xxx/CVE-2021-20283.json b/2021/20xxx/CVE-2021-20283.json index f083dd0aafe..d678215a026 100644 --- a/2021/20xxx/CVE-2021-20283.json +++ b/2021/20xxx/CVE-2021-20283.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20283", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "moodle", + "version": { + "version_data": [ + { + "version_value": "Fixed in 3.10.2, 3.9.5, 3.8.8, 3.5.17" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939051", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939051" + }, + { + "refsource": "MISC", + "name": "https://moodle.org/mod/forum/discuss.php?d=419654", + "url": "https://moodle.org/mod/forum/discuss.php?d=419654" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The web service responsible for fetching other users' enrolled courses did not validate that the requesting user had permission to view that information in each course in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17." } ] } diff --git a/2021/21xxx/CVE-2021-21300.json b/2021/21xxx/CVE-2021-21300.json index 6bff58528b7..8c85bbb799d 100644 --- a/2021/21xxx/CVE-2021-21300.json +++ b/2021/21xxx/CVE-2021-21300.json @@ -142,6 +142,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-63fcbd126e", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-ffd0b2108d", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/" } ] }, diff --git a/2021/26xxx/CVE-2021-26987.json b/2021/26xxx/CVE-2021-26987.json index 3120dd662df..68e3ec37b44 100644 --- a/2021/26xxx/CVE-2021-26987.json +++ b/2021/26xxx/CVE-2021-26987.json @@ -4,14 +4,78 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-26987", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Element Plug-in for vCenter Server", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + }, + { + "product_name": "Management Services for Element Software and NetApp HCI", + "version": { + "version_data": [ + { + "version_value": "versions prior to 2.17.56" + } + ] + } + }, + { + "product_name": "NetApp SolidFire & HCI Management Node", + "version": { + "version_data": [ + { + "version_value": "versions through 12.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210315-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210315-0001/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Element Plug-in for vCenter Server incorporates SpringBoot Framework. SpringBoot Framework versions prior to 1.3.2 are susceptible to a vulnerability which when successfully exploited could lead to Remote Code Execution. All versions of Element Plug-in for vCenter Server, Management Services versions prior to 2.17.56 and Management Node versions through 12.2 contain vulnerable versions of SpringBoot Framework." } ] } diff --git a/2021/3xxx/CVE-2021-3418.json b/2021/3xxx/CVE-2021-3418.json index 5e0f3b6e251..f922c50f4ce 100644 --- a/2021/3xxx/CVE-2021-3418.json +++ b/2021/3xxx/CVE-2021-3418.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3418", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "grub2", + "version": { + "version_data": [ + { + "version_value": "Fixed in 2.06" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1933757", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933757" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grbu2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism." } ] } From ce7b4a59b926f744a4654bd15db02e0c98490772 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 15 Mar 2021 23:00:43 +0000 Subject: [PATCH 353/845] "-Synchronized-Data." --- 2021/27xxx/CVE-2021-27230.json | 71 +++++++++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28363.json | 10 +++++ 2 files changed, 75 insertions(+), 6 deletions(-) diff --git a/2021/27xxx/CVE-2021-27230.json b/2021/27xxx/CVE-2021-27230.json index c334eed5329..3c1ca6d3b55 100644 --- a/2021/27xxx/CVE-2021-27230.json +++ b/2021/27xxx/CVE-2021-27230.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27230", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27230", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://hackerone.com/reports/1093444", + "refsource": "MISC", + "name": "https://hackerone.com/reports/1093444" + }, + { + "url": "https://expressionengine.com/features", + "refsource": "MISC", + "name": "https://expressionengine.com/features" + }, + { + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2021/Mar/32", + "url": "http://seclists.org/fulldisclosure/2021/Mar/32" + }, + { + "refsource": "MISC", + "name": "http://karmainsecurity.com/KIS-2021-03", + "url": "http://karmainsecurity.com/KIS-2021-03" } ] } diff --git a/2021/28xxx/CVE-2021-28363.json b/2021/28xxx/CVE-2021-28363.json index bb0f12c553d..59532adbc93 100644 --- a/2021/28xxx/CVE-2021-28363.json +++ b/2021/28xxx/CVE-2021-28363.json @@ -61,6 +61,16 @@ "refsource": "CONFIRM", "name": "https://pypi.org/project/urllib3/1.26.4/", "url": "https://pypi.org/project/urllib3/1.26.4/" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0", + "url": "https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r", + "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r" } ] } From 170b22e66ab15e94aaaea829160ead42b00bcd4e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 00:00:45 +0000 Subject: [PATCH 354/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 10 ++++++++++ 2020/27xxx/CVE-2020-27223.json | 35 ++++++++++++++++++++++++++++++++++ 2021/27xxx/CVE-2021-27230.json | 5 +++++ 2021/27xxx/CVE-2021-27964.json | 5 +++++ 4 files changed, 55 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index bb79fea8488..33424ab1c64 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -203,6 +203,16 @@ "refsource": "MLIST", "name": "[thrift-user] 20210312 RE: Thrift 0.13 micro for CVE-2020-13949?", "url": "https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210315 [GitHub] [hbase] saintstack commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210315 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 46be0b0e5f3..80647275a52 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -311,6 +311,41 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E", "url": "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-issues] 20210315 [jira] [Assigned] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-reviews] 20210315 [GitHub] [spark] xkrogen opened a new pull request #31846: [SPARK-34752] Bump Jetty to 9.4.37 to address CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-reviews] 20210315 [GitHub] [spark] AmplabJenkins commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-issues] 20210315 [jira] [Updated] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-issues] 20210315 [jira] [Commented] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-issues] 20210315 [jira] [Created] (SPARK-34752) Upgrade Jetty to 9.3.37 to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-issues] 20210315 [jira] [Updated] (SPARK-34752) Upgrade Jetty to 9.3.37 to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E" } ] } diff --git a/2021/27xxx/CVE-2021-27230.json b/2021/27xxx/CVE-2021-27230.json index 3c1ca6d3b55..f9e75fbe0a5 100644 --- a/2021/27xxx/CVE-2021-27230.json +++ b/2021/27xxx/CVE-2021-27230.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://karmainsecurity.com/KIS-2021-03", "url": "http://karmainsecurity.com/KIS-2021-03" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html", + "url": "http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html" } ] } diff --git a/2021/27xxx/CVE-2021-27964.json b/2021/27xxx/CVE-2021-27964.json index 739b39f73ba..35713f775cb 100644 --- a/2021/27xxx/CVE-2021-27964.json +++ b/2021/27xxx/CVE-2021-27964.json @@ -61,6 +61,11 @@ "url": "https://www.sonlogger.com/releasenotes", "refsource": "MISC", "name": "https://www.sonlogger.com/releasenotes" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html", + "url": "http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html" } ] } From 112c8a58836d598a6e258d223291c7f4a3a885f3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 01:00:42 +0000 Subject: [PATCH 355/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3444.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3444.json diff --git a/2021/3xxx/CVE-2021-3444.json b/2021/3xxx/CVE-2021-3444.json new file mode 100644 index 00000000000..e49965f2503 --- /dev/null +++ b/2021/3xxx/CVE-2021-3444.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3444", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 1f30d45325fe3e346840dd246bbb36a53c2a1a2e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 02:00:38 +0000 Subject: [PATCH 356/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28484.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28484.json diff --git a/2021/28xxx/CVE-2021-28484.json b/2021/28xxx/CVE-2021-28484.json new file mode 100644 index 00000000000..6da9ec547cf --- /dev/null +++ b/2021/28xxx/CVE-2021-28484.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28484", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 4e07f70f2c5a28005ededdfa1ca6a498d4ef6abd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 03:00:40 +0000 Subject: [PATCH 357/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28485.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28486.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28487.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28488.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28489.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28490.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28491.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28492.json | 18 ++++++++++++++++++ 8 files changed, 144 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28485.json create mode 100644 2021/28xxx/CVE-2021-28486.json create mode 100644 2021/28xxx/CVE-2021-28487.json create mode 100644 2021/28xxx/CVE-2021-28488.json create mode 100644 2021/28xxx/CVE-2021-28489.json create mode 100644 2021/28xxx/CVE-2021-28490.json create mode 100644 2021/28xxx/CVE-2021-28491.json create mode 100644 2021/28xxx/CVE-2021-28492.json diff --git a/2021/28xxx/CVE-2021-28485.json b/2021/28xxx/CVE-2021-28485.json new file mode 100644 index 00000000000..7a41f8bfa79 --- /dev/null +++ b/2021/28xxx/CVE-2021-28485.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28485", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28486.json b/2021/28xxx/CVE-2021-28486.json new file mode 100644 index 00000000000..de6df504699 --- /dev/null +++ b/2021/28xxx/CVE-2021-28486.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28486", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28487.json b/2021/28xxx/CVE-2021-28487.json new file mode 100644 index 00000000000..0dc44fa18da --- /dev/null +++ b/2021/28xxx/CVE-2021-28487.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28487", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28488.json b/2021/28xxx/CVE-2021-28488.json new file mode 100644 index 00000000000..51cdbcf1cf2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28488.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28488", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28489.json b/2021/28xxx/CVE-2021-28489.json new file mode 100644 index 00000000000..7b509606e32 --- /dev/null +++ b/2021/28xxx/CVE-2021-28489.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28489", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28490.json b/2021/28xxx/CVE-2021-28490.json new file mode 100644 index 00000000000..67a90d064a6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28490.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28490", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28491.json b/2021/28xxx/CVE-2021-28491.json new file mode 100644 index 00000000000..f257970769d --- /dev/null +++ b/2021/28xxx/CVE-2021-28491.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28491", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28492.json b/2021/28xxx/CVE-2021-28492.json new file mode 100644 index 00000000000..119a1af6b70 --- /dev/null +++ b/2021/28xxx/CVE-2021-28492.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28492", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 6c497495ada39e9c90df3fd9d16eae57765dedbd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 06:00:42 +0000 Subject: [PATCH 358/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27223.json | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 80647275a52..b941a374445 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -346,6 +346,21 @@ "refsource": "MLIST", "name": "[spark-issues] 20210315 [jira] [Updated] (SPARK-34752) Upgrade Jetty to 9.3.37 to fix CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-issues] 20210315 [jira] [Resolved] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-reviews] 20210315 [GitHub] [spark] HyukjinKwon commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-reviews] 20210315 [GitHub] [spark] HyukjinKwon closed pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E" } ] } From 05d01631a5b144bff7c079dc7345dd7f96eac7b8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 08:00:42 +0000 Subject: [PATCH 359/845] "-Synchronized-Data." --- 2021/24xxx/CVE-2021-24122.json | 5 +++++ 2021/25xxx/CVE-2021-25122.json | 5 +++++ 2021/25xxx/CVE-2021-25329.json | 5 +++++ 3 files changed, 15 insertions(+) diff --git a/2021/24xxx/CVE-2021-24122.json b/2021/24xxx/CVE-2021-24122.json index b602716826c..05bdcc3e0f3 100644 --- a/2021/24xxx/CVE-2021-24122.json +++ b/2021/24xxx/CVE-2021-24122.json @@ -129,6 +129,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210212-0008/", "url": "https://security.netapp.com/advisory/ntap-20210212-0008/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index 423d99cd6d7..f7c26a9658e 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -113,6 +113,11 @@ "refsource": "MLIST", "name": "[tomcat-users] 20210305 Re: [SECURITY] CVE-2021-25122 Apache Tomcat h2c request mix-up", "url": "https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25329.json b/2021/25xxx/CVE-2021-25329.json index da14359c7e6..62dfd8fb58f 100644 --- a/2021/25xxx/CVE-2021-25329.json +++ b/2021/25xxx/CVE-2021-25329.json @@ -114,6 +114,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210301 CVE-2021-25329: Apache Tomcat Incomplete fix for CVE-2020-9484", "url": "http://www.openwall.com/lists/oss-security/2021/03/01/2" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" } ] }, From faeda156077b6678240024d83a453afb392b311d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 10:00:41 +0000 Subject: [PATCH 360/845] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11974.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/11xxx/CVE-2020-11974.json b/2020/11xxx/CVE-2020-11974.json index cb89a467a91..7f5643793d1 100644 --- a/2020/11xxx/CVE-2020-11974.json +++ b/2020/11xxx/CVE-2020-11974.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[dolphinscheduler-commits] 20210223 [GitHub] [incubator-dolphinscheduler] sonarcloud[bot] removed a comment on pull request #4851: [FIX-CVE-2020-11974] fix MySQLDataSource Security", "url": "https://lists.apache.org/thread.html/r33452d7b99a293bcf8f3e4bd664943847e2602e03a9e45d09d3f508a@%3Ccommits.dolphinscheduler.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[dolphinscheduler-commits] 20210316 [GitHub] [incubator-dolphinscheduler] CalvinKirs opened a new pull request #5063: [1.3.6-prepare][#4851]fix MySQL datasource jdbc connect parameters #4851", + "url": "https://lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E" } ] }, From cd40c6d2fe4ffdbc3c499905f03f4717a08de9e6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 12:00:47 +0000 Subject: [PATCH 361/845] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27216.json | 5 +++++ 2020/28xxx/CVE-2020-28466.json | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index d22f01aa474..e54fe3014fd 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -510,6 +510,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210315 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210316 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/28xxx/CVE-2020-28466.json b/2020/28xxx/CVE-2020-28466.json index 6a3e2e235a2..9abd0800727 100644 --- a/2020/28xxx/CVE-2020-28466.json +++ b/2020/28xxx/CVE-2020-28466.json @@ -56,6 +56,11 @@ "refsource": "MISC", "url": "https://github.com/nats-io/nats-server/pull/1731", "name": "https://github.com/nats-io/nats-server/pull/1731" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210315 [CVE-2020-28466][CVE-2021-3127] NATS.io vulnerabilities", + "url": "http://www.openwall.com/lists/oss-security/2021/03/16/1" } ] }, From 87407732fb4821538df8136a7b79157823372db5 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Tue, 16 Mar 2021 12:56:23 +0000 Subject: [PATCH 362/845] Add CVE-2020-1926 --- 2020/1xxx/CVE-2020-1926.json | 80 ++++++++++++++++++++++++++++++++---- 1 file changed, 73 insertions(+), 7 deletions(-) diff --git a/2020/1xxx/CVE-2020-1926.json b/2020/1xxx/CVE-2020-1926.json index 05bfdd6c4ec..3eeae71820c 100644 --- a/2020/1xxx/CVE-2020-1926.json +++ b/2020/1xxx/CVE-2020-1926.json @@ -1,18 +1,84 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-1926", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Timing attack in Cookie signature verification" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Hive", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Apache Hive", + "version_value": "2.3.8" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Apache Hive would like to thank S. Wasin for reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-208 Information Exposure Through Timing Discrepancy" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://issues.apache.org/jira/browse/HIVE-22708" + }, + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E" + } + ] + }, + "source": { + "defect": [ + "HIVE-22708" + ], + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From 2f55faed23598dd52e6e6457f94221e76d88c904 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 13:00:46 +0000 Subject: [PATCH 363/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index 33424ab1c64..eb463596eb5 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -213,6 +213,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210315 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210316 [GitHub] [hbase] pankaj72981 commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E" } ] }, From e435d79e76a91a0415d1ac148ca0d713d956cc6d Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Tue, 16 Mar 2021 09:49:45 -0400 Subject: [PATCH 364/845] IBM20210316-94945 Added CVE-2020-4851, CVE-2020-4890, CVE-2020-4891 --- 2020/4xxx/CVE-2020-4851.json | 111 ++++++++++++++++++++++++++++++----- 2020/4xxx/CVE-2020-4890.json | 111 ++++++++++++++++++++++++++++++----- 2020/4xxx/CVE-2020-4891.json | 111 ++++++++++++++++++++++++++++++----- 3 files changed, 288 insertions(+), 45 deletions(-) diff --git a/2020/4xxx/CVE-2020-4851.json b/2020/4xxx/CVE-2020-4851.json index 02490c0245b..81a4c921dab 100644 --- a/2020/4xxx/CVE-2020-4851.json +++ b/2020/4xxx/CVE-2020-4851.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4851", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_type" : "CVE", + "references" : { + "reference_data" : [ + { + "url" : "https://www.ibm.com/support/pages/node/6405774", + "refsource" : "CONFIRM", + "name" : "https://www.ibm.com/support/pages/node/6405774", + "title" : "IBM Security Bulletin 6405774 (Spectrum Scale)" + }, + { + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190450", + "title" : "X-Force Vulnerability Report", + "name" : "ibm-spectrum-cve20204851-log-poisoning (190450)" + } + ] + }, + "data_version" : "4.0", + "CVE_data_meta" : { + "STATE" : "PUBLIC", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2021-03-15T00:00:00", + "ID" : "CVE-2020-4851" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "5.0.0" + }, + { + "version_value" : "5.0.5.4" + }, + { + "version_value" : "5.1.0" + }, + { + "version_value" : "5.1.0.1" + } + ] + }, + "product_name" : "Spectrum Scale" + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user to poison log files which could impact support and development efforts. IBM X-Force ID: 190450.", + "lang" : "eng" + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "A" : "N", + "SCORE" : "4.000", + "I" : "N", + "AV" : "L", + "UI" : "N", + "C" : "L", + "PR" : "N", + "AC" : "L", + "S" : "U" + }, + "TM" : { + "RC" : "C", + "E" : "U", + "RL" : "O" + } + } + }, + "data_format" : "MITRE", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Data Manipulation" + } + ] + } + ] + } +} diff --git a/2020/4xxx/CVE-2020-4890.json b/2020/4xxx/CVE-2020-4890.json index 13cda19fc5d..6f797524d6d 100644 --- a/2020/4xxx/CVE-2020-4890.json +++ b/2020/4xxx/CVE-2020-4890.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4890", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_format" : "MITRE", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Denial of Service", + "lang" : "eng" + } + ] + } + ] + }, + "impact" : { + "cvssv3" : { + "TM" : { + "RL" : "O", + "E" : "U", + "RC" : "C" + }, + "BM" : { + "A" : "H", + "SCORE" : "4.400", + "AV" : "L", + "I" : "N", + "UI" : "N", + "C" : "N", + "PR" : "H", + "AC" : "L", + "S" : "U" + } + } + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "5.0.0" + }, + { + "version_value" : "5.0.5.5" + }, + { + "version_value" : "5.1.0" + }, + { + "version_value" : "5.1.0.2" + } + ] + }, + "product_name" : "Spectrum Scale" + } + ] + }, + "vendor_name" : "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user with a valid role to the REST API to cause a denial of service due to weak or absense of rate limiting. IBM X-Force ID: 190973." + } + ] + }, + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC", + "DATE_PUBLIC" : "2021-03-15T00:00:00", + "ID" : "CVE-2020-4890" + }, + "data_version" : "4.0", + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6430147", + "title" : "IBM Security Bulletin 6430147 (Spectrum Scale)", + "url" : "https://www.ibm.com/support/pages/node/6430147", + "refsource" : "CONFIRM" + }, + { + "title" : "X-Force Vulnerability Report", + "name" : "ibm-spectrum-cve20204890-dos (190973)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190973" + } + ] + }, + "data_type" : "CVE" +} diff --git a/2020/4xxx/CVE-2020-4891.json b/2020/4xxx/CVE-2020-4891.json index 77cdef0b53a..1f004ded867 100644 --- a/2020/4xxx/CVE-2020-4891.json +++ b/2020/4xxx/CVE-2020-4891.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-4891", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "data_format" : "MITRE", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Obtain Information", + "lang" : "eng" + } + ] + } + ] + }, + "impact" : { + "cvssv3" : { + "TM" : { + "E" : "U", + "RC" : "C", + "RL" : "O" + }, + "BM" : { + "UI" : "N", + "AV" : "L", + "I" : "N", + "C" : "H", + "A" : "N", + "SCORE" : "6.200", + "S" : "U", + "PR" : "N", + "AC" : "L" + } + } + }, + "description" : { + "description_data" : [ + { + "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 uses an inadequate account lockout setting that could allow a local user er to brute force Rest API account credentials. IBM X-Force ID: 190974.", + "lang" : "eng" + } + ] + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "vendor_name" : "IBM", + "product" : { + "product_data" : [ + { + "version" : { + "version_data" : [ + { + "version_value" : "5.0.0" + }, + { + "version_value" : "5.0.5.5" + }, + { + "version_value" : "5.1.0" + }, + { + "version_value" : "5.1.0.2" + } + ] + }, + "product_name" : "Spectrum Scale" + } + ] + } } - ] - } -} \ No newline at end of file + ] + } + }, + "CVE_data_meta" : { + "ID" : "CVE-2020-4891", + "DATE_PUBLIC" : "2021-03-15T00:00:00", + "ASSIGNER" : "psirt@us.ibm.com", + "STATE" : "PUBLIC" + }, + "data_version" : "4.0", + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/pages/node/6430147", + "title" : "IBM Security Bulletin 6430147 (Spectrum Scale)", + "url" : "https://www.ibm.com/support/pages/node/6430147", + "refsource" : "CONFIRM" + }, + { + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190974", + "title" : "X-Force Vulnerability Report", + "name" : "ibm-spectrum-cve20204891-info-disc (190974)" + } + ] + }, + "data_type" : "CVE" +} From f575ac7e97b310083df91b41b072552f481bfcf7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 14:00:45 +0000 Subject: [PATCH 365/845] "-Synchronized-Data." --- 2002/0xxx/CVE-2002-0184.json | 2 +- 2020/13xxx/CVE-2020-13949.json | 10 ++ 2020/1xxx/CVE-2020-1926.json | 12 ++- 2020/4xxx/CVE-2020-4851.json | 190 ++++++++++++++++---------------- 2020/4xxx/CVE-2020-4890.json | 192 ++++++++++++++++----------------- 2020/4xxx/CVE-2020-4891.json | 192 ++++++++++++++++----------------- 2021/3xxx/CVE-2021-3156.json | 2 +- 7 files changed, 306 insertions(+), 294 deletions(-) diff --git a/2002/0xxx/CVE-2002-0184.json b/2002/0xxx/CVE-2002-0184.json index 3e9dcbea929..a120601b682 100644 --- a/2002/0xxx/CVE-2002-0184.json +++ b/2002/0xxx/CVE-2002-0184.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Heap-based buffer overflow in sudo before 1.6.6 may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded." + "value": "Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded." } ] }, diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index eb463596eb5..c7949a448eb 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -218,6 +218,16 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210316 [GitHub] [hbase] pankaj72981 commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210316 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210316 [GitHub] [hbase] pankaj72981 merged pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/1xxx/CVE-2020-1926.json b/2020/1xxx/CVE-2020-1926.json index 3eeae71820c..d80d1add35e 100644 --- a/2020/1xxx/CVE-2020-1926.json +++ b/2020/1xxx/CVE-2020-1926.json @@ -66,12 +66,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://issues.apache.org/jira/browse/HIVE-22708" + "refsource": "MISC", + "url": "https://issues.apache.org/jira/browse/HIVE-22708", + "name": "https://issues.apache.org/jira/browse/HIVE-22708" }, { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E" + "refsource": "MISC", + "url": "https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E", + "name": "https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E" } ] }, @@ -81,4 +83,4 @@ ], "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4851.json b/2020/4xxx/CVE-2020-4851.json index 81a4c921dab..0405e6a38a1 100644 --- a/2020/4xxx/CVE-2020-4851.json +++ b/2020/4xxx/CVE-2020-4851.json @@ -1,99 +1,99 @@ { - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6405774", - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6405774", - "title" : "IBM Security Bulletin 6405774 (Spectrum Scale)" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190450", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-spectrum-cve20204851-log-poisoning (190450)" - } - ] - }, - "data_version" : "4.0", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2021-03-15T00:00:00", - "ID" : "CVE-2020-4851" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_type": "CVE", + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "5.0.0" - }, - { - "version_value" : "5.0.5.4" - }, - { - "version_value" : "5.1.0" - }, - { - "version_value" : "5.1.0.1" - } - ] - }, - "product_name" : "Spectrum Scale" - } - ] - } + "url": "https://www.ibm.com/support/pages/node/6405774", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6405774", + "title": "IBM Security Bulletin 6405774 (Spectrum Scale)" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190450", + "title": "X-Force Vulnerability Report", + "name": "ibm-spectrum-cve20204851-log-poisoning (190450)" } - ] - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user to poison log files which could impact support and development efforts. IBM X-Force ID: 190450.", - "lang" : "eng" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "A" : "N", - "SCORE" : "4.000", - "I" : "N", - "AV" : "L", - "UI" : "N", - "C" : "L", - "PR" : "N", - "AC" : "L", - "S" : "U" - }, - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - } - } - }, - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Data Manipulation" - } + ] + }, + "data_version": "4.0", + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2021-03-15T00:00:00", + "ID": "CVE-2020-4851" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "5.0.0" + }, + { + "version_value": "5.0.5.4" + }, + { + "version_value": "5.1.0" + }, + { + "version_value": "5.1.0.1" + } + ] + }, + "product_name": "Spectrum Scale" + } + ] + } + } ] - } - ] - } -} + } + }, + "description": { + "description_data": [ + { + "value": "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user to poison log files which could impact support and development efforts. IBM X-Force ID: 190450.", + "lang": "eng" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "A": "N", + "SCORE": "4.000", + "I": "N", + "AV": "L", + "UI": "N", + "C": "L", + "PR": "N", + "AC": "L", + "S": "U" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Data Manipulation" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4890.json b/2020/4xxx/CVE-2020-4890.json index 6f797524d6d..f3d76ecc913 100644 --- a/2020/4xxx/CVE-2020-4890.json +++ b/2020/4xxx/CVE-2020-4890.json @@ -1,99 +1,99 @@ { - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Denial of Service", - "lang" : "eng" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - }, - "BM" : { - "A" : "H", - "SCORE" : "4.400", - "AV" : "L", - "I" : "N", - "UI" : "N", - "C" : "N", - "PR" : "H", - "AC" : "L", - "S" : "U" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "5.0.0" - }, - { - "version_value" : "5.0.5.5" - }, - { - "version_value" : "5.1.0" - }, - { - "version_value" : "5.1.0.2" - } - ] - }, - "product_name" : "Spectrum Scale" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "value": "Denial of Service", + "lang": "eng" + } + ] } - ] - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user with a valid role to the REST API to cause a denial of service due to weak or absense of rate limiting. IBM X-Force ID: 190973." - } - ] - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2021-03-15T00:00:00", - "ID" : "CVE-2020-4890" - }, - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6430147", - "title" : "IBM Security Bulletin 6430147 (Spectrum Scale)", - "url" : "https://www.ibm.com/support/pages/node/6430147", - "refsource" : "CONFIRM" - }, - { - "title" : "X-Force Vulnerability Report", - "name" : "ibm-spectrum-cve20204890-dos (190973)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190973" - } - ] - }, - "data_type" : "CVE" -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "A": "H", + "SCORE": "4.400", + "AV": "L", + "I": "N", + "UI": "N", + "C": "N", + "PR": "H", + "AC": "L", + "S": "U" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "5.0.0" + }, + { + "version_value": "5.0.5.5" + }, + { + "version_value": "5.1.0" + }, + { + "version_value": "5.1.0.2" + } + ] + }, + "product_name": "Spectrum Scale" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user with a valid role to the REST API to cause a denial of service due to weak or absense of rate limiting. IBM X-Force ID: 190973." + } + ] + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "DATE_PUBLIC": "2021-03-15T00:00:00", + "ID": "CVE-2020-4890" + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6430147", + "title": "IBM Security Bulletin 6430147 (Spectrum Scale)", + "url": "https://www.ibm.com/support/pages/node/6430147", + "refsource": "CONFIRM" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-spectrum-cve20204890-dos (190973)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190973" + } + ] + }, + "data_type": "CVE" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4891.json b/2020/4xxx/CVE-2020-4891.json index 1f004ded867..d940ee32aa1 100644 --- a/2020/4xxx/CVE-2020-4891.json +++ b/2020/4xxx/CVE-2020-4891.json @@ -1,99 +1,99 @@ { - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - }, - "BM" : { - "UI" : "N", - "AV" : "L", - "I" : "N", - "C" : "H", - "A" : "N", - "SCORE" : "6.200", - "S" : "U", - "PR" : "N", - "AC" : "L" - } - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 uses an inadequate account lockout setting that could allow a local user er to brute force Rest API account credentials. IBM X-Force ID: 190974.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "5.0.0" - }, - { - "version_value" : "5.0.5.5" - }, - { - "version_value" : "5.1.0" - }, - { - "version_value" : "5.1.0.2" - } - ] - }, - "product_name" : "Spectrum Scale" - } - ] - } + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] } - ] - } - }, - "CVE_data_meta" : { - "ID" : "CVE-2020-4891", - "DATE_PUBLIC" : "2021-03-15T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/node/6430147", - "title" : "IBM Security Bulletin 6430147 (Spectrum Scale)", - "url" : "https://www.ibm.com/support/pages/node/6430147", - "refsource" : "CONFIRM" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190974", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-spectrum-cve20204891-info-disc (190974)" - } - ] - }, - "data_type" : "CVE" -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "UI": "N", + "AV": "L", + "I": "N", + "C": "H", + "A": "N", + "SCORE": "6.200", + "S": "U", + "PR": "N", + "AC": "L" + } + } + }, + "description": { + "description_data": [ + { + "value": "IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 uses an inadequate account lockout setting that could allow a local user er to brute force Rest API account credentials. IBM X-Force ID: 190974.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "5.0.0" + }, + { + "version_value": "5.0.5.5" + }, + { + "version_value": "5.1.0" + }, + { + "version_value": "5.1.0.2" + } + ] + }, + "product_name": "Spectrum Scale" + } + ] + } + } + ] + } + }, + "CVE_data_meta": { + "ID": "CVE-2020-4891", + "DATE_PUBLIC": "2021-03-15T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/node/6430147", + "title": "IBM Security Bulletin 6430147 (Spectrum Scale)", + "url": "https://www.ibm.com/support/pages/node/6430147", + "refsource": "CONFIRM" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190974", + "title": "X-Force Vulnerability Report", + "name": "ibm-spectrum-cve20204891-info-disc (190974)" + } + ] + }, + "data_type": "CVE" +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3156.json b/2021/3xxx/CVE-2021-3156.json index c4596cff9d4..58ffc040098 100644 --- a/2021/3xxx/CVE-2021-3156.json +++ b/2021/3xxx/CVE-2021-3156.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via \"sudoedit -s\" and a command-line argument that ends with a single backslash character." + "value": "Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via \"sudoedit -s\" and a command-line argument that ends with a single backslash character." } ] }, From 5a0174587dac13ff8ecb3540456823d47754dc51 Mon Sep 17 00:00:00 2001 From: Amy Ressler Date: Tue, 16 Mar 2021 14:02:54 +0000 Subject: [PATCH 366/845] Descriptions for CVEs fixed in Chrome Release-2-M89 --- 2021/21xxx/CVE-2021-21191.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21192.json | 53 +++++++++++++++++++++++++++++++--- 2021/21xxx/CVE-2021-21193.json | 53 +++++++++++++++++++++++++++++++--- 3 files changed, 147 insertions(+), 12 deletions(-) diff --git a/2021/21xxx/CVE-2021-21191.json b/2021/21xxx/CVE-2021-21191.json index ea5dcc5fc93..f0c2099a8de 100644 --- a/2021/21xxx/CVE-2021-21191.json +++ b/2021/21xxx/CVE-2021-21191.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21191", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.90", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1167357" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in WebRTC in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21192.json b/2021/21xxx/CVE-2021-21192.json index a97dcb4c575..9d7c207f7e2 100644 --- a/2021/21xxx/CVE-2021-21192.json +++ b/2021/21xxx/CVE-2021-21192.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21192", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.90", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap buffer overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1181387" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Heap buffer overflow in tab groups in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} diff --git a/2021/21xxx/CVE-2021-21193.json b/2021/21xxx/CVE-2021-21193.json index 7aef51c642d..4d535b971df 100644 --- a/2021/21xxx/CVE-2021-21193.json +++ b/2021/21xxx/CVE-2021-21193.json @@ -4,15 +4,60 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21193", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "chrome-cve-admin@google.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Chrome", + "version": { + "version_data": [ + { + "version_value": "89.0.4389.90", + "version_affected": "<" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://crbug.com/1186287" + }, + { + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] } -} \ No newline at end of file +} From 33fd0be8373576587df663eae8e73344e1443ee1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 15:00:44 +0000 Subject: [PATCH 367/845] "-Synchronized-Data." --- 2020/24xxx/CVE-2020-24263.json | 56 ++++++++++++++++++++++--- 2020/24xxx/CVE-2020-24264.json | 56 ++++++++++++++++++++++--- 2020/28xxx/CVE-2020-28466.json | 5 +++ 2021/1xxx/CVE-2021-1645.json | 5 +++ 2021/21xxx/CVE-2021-21191.json | 13 ++++-- 2021/21xxx/CVE-2021-21192.json | 13 ++++-- 2021/21xxx/CVE-2021-21193.json | 13 ++++-- 2021/28xxx/CVE-2021-28493.json | 18 ++++++++ 2021/28xxx/CVE-2021-28494.json | 18 ++++++++ 2021/28xxx/CVE-2021-28495.json | 18 ++++++++ 2021/28xxx/CVE-2021-28496.json | 18 ++++++++ 2021/28xxx/CVE-2021-28497.json | 18 ++++++++ 2021/28xxx/CVE-2021-28498.json | 18 ++++++++ 2021/28xxx/CVE-2021-28499.json | 18 ++++++++ 2021/28xxx/CVE-2021-28500.json | 18 ++++++++ 2021/28xxx/CVE-2021-28501.json | 18 ++++++++ 2021/28xxx/CVE-2021-28502.json | 18 ++++++++ 2021/28xxx/CVE-2021-28503.json | 18 ++++++++ 2021/28xxx/CVE-2021-28504.json | 18 ++++++++ 2021/28xxx/CVE-2021-28505.json | 18 ++++++++ 2021/28xxx/CVE-2021-28506.json | 18 ++++++++ 2021/28xxx/CVE-2021-28507.json | 18 ++++++++ 2021/28xxx/CVE-2021-28508.json | 18 ++++++++ 2021/28xxx/CVE-2021-28509.json | 18 ++++++++ 2021/28xxx/CVE-2021-28510.json | 18 ++++++++ 2021/28xxx/CVE-2021-28511.json | 18 ++++++++ 2021/28xxx/CVE-2021-28512.json | 18 ++++++++ 2021/28xxx/CVE-2021-28513.json | 18 ++++++++ 2021/28xxx/CVE-2021-28514.json | 18 ++++++++ 2021/28xxx/CVE-2021-28515.json | 18 ++++++++ 2021/28xxx/CVE-2021-28516.json | 18 ++++++++ 2021/28xxx/CVE-2021-28517.json | 18 ++++++++ 2021/28xxx/CVE-2021-28518.json | 18 ++++++++ 2021/28xxx/CVE-2021-28519.json | 18 ++++++++ 2021/28xxx/CVE-2021-28520.json | 18 ++++++++ 2021/28xxx/CVE-2021-28521.json | 18 ++++++++ 2021/28xxx/CVE-2021-28522.json | 18 ++++++++ 2021/28xxx/CVE-2021-28523.json | 18 ++++++++ 2021/28xxx/CVE-2021-28524.json | 18 ++++++++ 2021/28xxx/CVE-2021-28525.json | 18 ++++++++ 2021/28xxx/CVE-2021-28526.json | 18 ++++++++ 2021/28xxx/CVE-2021-28527.json | 18 ++++++++ 2021/28xxx/CVE-2021-28528.json | 18 ++++++++ 2021/28xxx/CVE-2021-28529.json | 18 ++++++++ 2021/28xxx/CVE-2021-28530.json | 18 ++++++++ 2021/28xxx/CVE-2021-28531.json | 18 ++++++++ 2021/28xxx/CVE-2021-28532.json | 18 ++++++++ 2021/28xxx/CVE-2021-28533.json | 18 ++++++++ 2021/28xxx/CVE-2021-28534.json | 18 ++++++++ 2021/28xxx/CVE-2021-28535.json | 18 ++++++++ 2021/28xxx/CVE-2021-28536.json | 18 ++++++++ 2021/28xxx/CVE-2021-28537.json | 18 ++++++++ 2021/28xxx/CVE-2021-28538.json | 18 ++++++++ 2021/28xxx/CVE-2021-28539.json | 18 ++++++++ 2021/28xxx/CVE-2021-28540.json | 18 ++++++++ 2021/28xxx/CVE-2021-28541.json | 18 ++++++++ 2021/28xxx/CVE-2021-28542.json | 18 ++++++++ 2021/28xxx/CVE-2021-28543.json | 76 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28544.json | 18 ++++++++ 2021/3xxx/CVE-2021-3445.json | 18 ++++++++ 60 files changed, 1149 insertions(+), 24 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28493.json create mode 100644 2021/28xxx/CVE-2021-28494.json create mode 100644 2021/28xxx/CVE-2021-28495.json create mode 100644 2021/28xxx/CVE-2021-28496.json create mode 100644 2021/28xxx/CVE-2021-28497.json create mode 100644 2021/28xxx/CVE-2021-28498.json create mode 100644 2021/28xxx/CVE-2021-28499.json create mode 100644 2021/28xxx/CVE-2021-28500.json create mode 100644 2021/28xxx/CVE-2021-28501.json create mode 100644 2021/28xxx/CVE-2021-28502.json create mode 100644 2021/28xxx/CVE-2021-28503.json create mode 100644 2021/28xxx/CVE-2021-28504.json create mode 100644 2021/28xxx/CVE-2021-28505.json create mode 100644 2021/28xxx/CVE-2021-28506.json create mode 100644 2021/28xxx/CVE-2021-28507.json create mode 100644 2021/28xxx/CVE-2021-28508.json create mode 100644 2021/28xxx/CVE-2021-28509.json create mode 100644 2021/28xxx/CVE-2021-28510.json create mode 100644 2021/28xxx/CVE-2021-28511.json create mode 100644 2021/28xxx/CVE-2021-28512.json create mode 100644 2021/28xxx/CVE-2021-28513.json create mode 100644 2021/28xxx/CVE-2021-28514.json create mode 100644 2021/28xxx/CVE-2021-28515.json create mode 100644 2021/28xxx/CVE-2021-28516.json create mode 100644 2021/28xxx/CVE-2021-28517.json create mode 100644 2021/28xxx/CVE-2021-28518.json create mode 100644 2021/28xxx/CVE-2021-28519.json create mode 100644 2021/28xxx/CVE-2021-28520.json create mode 100644 2021/28xxx/CVE-2021-28521.json create mode 100644 2021/28xxx/CVE-2021-28522.json create mode 100644 2021/28xxx/CVE-2021-28523.json create mode 100644 2021/28xxx/CVE-2021-28524.json create mode 100644 2021/28xxx/CVE-2021-28525.json create mode 100644 2021/28xxx/CVE-2021-28526.json create mode 100644 2021/28xxx/CVE-2021-28527.json create mode 100644 2021/28xxx/CVE-2021-28528.json create mode 100644 2021/28xxx/CVE-2021-28529.json create mode 100644 2021/28xxx/CVE-2021-28530.json create mode 100644 2021/28xxx/CVE-2021-28531.json create mode 100644 2021/28xxx/CVE-2021-28532.json create mode 100644 2021/28xxx/CVE-2021-28533.json create mode 100644 2021/28xxx/CVE-2021-28534.json create mode 100644 2021/28xxx/CVE-2021-28535.json create mode 100644 2021/28xxx/CVE-2021-28536.json create mode 100644 2021/28xxx/CVE-2021-28537.json create mode 100644 2021/28xxx/CVE-2021-28538.json create mode 100644 2021/28xxx/CVE-2021-28539.json create mode 100644 2021/28xxx/CVE-2021-28540.json create mode 100644 2021/28xxx/CVE-2021-28541.json create mode 100644 2021/28xxx/CVE-2021-28542.json create mode 100644 2021/28xxx/CVE-2021-28543.json create mode 100644 2021/28xxx/CVE-2021-28544.json create mode 100644 2021/3xxx/CVE-2021-3445.json diff --git a/2020/24xxx/CVE-2020-24263.json b/2020/24xxx/CVE-2020-24263.json index e5cca5fbd0f..4b9a720a4cf 100644 --- a/2020/24xxx/CVE-2020-24263.json +++ b/2020/24xxx/CVE-2020-24263.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24263", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24263", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Portainer 1.24.1 and earlier is affected by an insecure permissions vulnerability that may lead to remote arbitrary code execution. A non-admin user is allowed to spawn new containers with critical capabilities such as SYS_MODULE, which can be used to take over the Docker host." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/portainer/portainer/issues/4105", + "refsource": "MISC", + "name": "https://github.com/portainer/portainer/issues/4105" } ] } diff --git a/2020/24xxx/CVE-2020-24264.json b/2020/24xxx/CVE-2020-24264.json index 512bdce4735..61bfb8376f0 100644 --- a/2020/24xxx/CVE-2020-24264.json +++ b/2020/24xxx/CVE-2020-24264.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24264", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24264", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/portainer/portainer/issues/4106", + "refsource": "MISC", + "name": "https://github.com/portainer/portainer/issues/4106" } ] } diff --git a/2020/28xxx/CVE-2020-28466.json b/2020/28xxx/CVE-2020-28466.json index 9abd0800727..c0a55f088ed 100644 --- a/2020/28xxx/CVE-2020-28466.json +++ b/2020/28xxx/CVE-2020-28466.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210315 [CVE-2020-28466][CVE-2021-3127] NATS.io vulnerabilities", "url": "http://www.openwall.com/lists/oss-security/2021/03/16/1" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210315 [CVE-2020-28466][CVE-2021-3127] NATS.io vulnerabilities", + "url": "http://www.openwall.com/lists/oss-security/2021/03/16/2" } ] }, diff --git a/2021/1xxx/CVE-2021-1645.json b/2021/1xxx/CVE-2021-1645.json index e106a7b5001..ba06477c0b5 100644 --- a/2021/1xxx/CVE-2021-1645.json +++ b/2021/1xxx/CVE-2021-1645.json @@ -207,6 +207,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1645", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1645" + }, + { + "refsource": "FULLDISC", + "name": "20210316 [CSA-2021-002] DP API ineffective in Windows containers", + "url": "http://seclists.org/fulldisclosure/2021/Mar/33" } ] } diff --git a/2021/21xxx/CVE-2021-21191.json b/2021/21xxx/CVE-2021-21191.json index f0c2099a8de..e58698641b6 100644 --- a/2021/21xxx/CVE-2021-21191.json +++ b/2021/21xxx/CVE-2021-21191.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21191", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1167357" + "url": "https://crbug.com/1167357", + "refsource": "MISC", + "name": "https://crbug.com/1167357" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21192.json b/2021/21xxx/CVE-2021-21192.json index 9d7c207f7e2..1cd7a87e931 100644 --- a/2021/21xxx/CVE-2021-21192.json +++ b/2021/21xxx/CVE-2021-21192.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21192", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1181387" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" + "url": "https://crbug.com/1181387", + "refsource": "MISC", + "name": "https://crbug.com/1181387" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/21xxx/CVE-2021-21193.json b/2021/21xxx/CVE-2021-21193.json index 4d535b971df..ddcd4b6e242 100644 --- a/2021/21xxx/CVE-2021-21193.json +++ b/2021/21xxx/CVE-2021-21193.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21193", - "ASSIGNER": "chrome-cve-admin@google.com" + "ASSIGNER": "chrome-cve-admin@google.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -45,10 +46,14 @@ "references": { "reference_data": [ { - "url": "https://crbug.com/1186287" + "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html", + "refsource": "MISC", + "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" }, { - "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html" + "url": "https://crbug.com/1186287", + "refsource": "MISC", + "name": "https://crbug.com/1186287" } ] }, @@ -60,4 +65,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28493.json b/2021/28xxx/CVE-2021-28493.json new file mode 100644 index 00000000000..3d67e65ad43 --- /dev/null +++ b/2021/28xxx/CVE-2021-28493.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28493", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28494.json b/2021/28xxx/CVE-2021-28494.json new file mode 100644 index 00000000000..3395f3571bb --- /dev/null +++ b/2021/28xxx/CVE-2021-28494.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28494", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28495.json b/2021/28xxx/CVE-2021-28495.json new file mode 100644 index 00000000000..09830f2271d --- /dev/null +++ b/2021/28xxx/CVE-2021-28495.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28495", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28496.json b/2021/28xxx/CVE-2021-28496.json new file mode 100644 index 00000000000..da362495693 --- /dev/null +++ b/2021/28xxx/CVE-2021-28496.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28496", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28497.json b/2021/28xxx/CVE-2021-28497.json new file mode 100644 index 00000000000..1fd5bc0c1aa --- /dev/null +++ b/2021/28xxx/CVE-2021-28497.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28497", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28498.json b/2021/28xxx/CVE-2021-28498.json new file mode 100644 index 00000000000..387b4fd2dfb --- /dev/null +++ b/2021/28xxx/CVE-2021-28498.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28498", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28499.json b/2021/28xxx/CVE-2021-28499.json new file mode 100644 index 00000000000..c678f13e0d0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28499.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28499", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28500.json b/2021/28xxx/CVE-2021-28500.json new file mode 100644 index 00000000000..87df20e725f --- /dev/null +++ b/2021/28xxx/CVE-2021-28500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28501.json b/2021/28xxx/CVE-2021-28501.json new file mode 100644 index 00000000000..b1af0b43f40 --- /dev/null +++ b/2021/28xxx/CVE-2021-28501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28502.json b/2021/28xxx/CVE-2021-28502.json new file mode 100644 index 00000000000..d4bcef8bb9c --- /dev/null +++ b/2021/28xxx/CVE-2021-28502.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28502", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28503.json b/2021/28xxx/CVE-2021-28503.json new file mode 100644 index 00000000000..c41a3fd2cda --- /dev/null +++ b/2021/28xxx/CVE-2021-28503.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28503", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28504.json b/2021/28xxx/CVE-2021-28504.json new file mode 100644 index 00000000000..d174ef8fe64 --- /dev/null +++ b/2021/28xxx/CVE-2021-28504.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28504", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28505.json b/2021/28xxx/CVE-2021-28505.json new file mode 100644 index 00000000000..6719bcf748f --- /dev/null +++ b/2021/28xxx/CVE-2021-28505.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28505", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28506.json b/2021/28xxx/CVE-2021-28506.json new file mode 100644 index 00000000000..40bac4d2370 --- /dev/null +++ b/2021/28xxx/CVE-2021-28506.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28506", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28507.json b/2021/28xxx/CVE-2021-28507.json new file mode 100644 index 00000000000..858c9e5ed3c --- /dev/null +++ b/2021/28xxx/CVE-2021-28507.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28507", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28508.json b/2021/28xxx/CVE-2021-28508.json new file mode 100644 index 00000000000..5b371cc9efb --- /dev/null +++ b/2021/28xxx/CVE-2021-28508.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28508", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28509.json b/2021/28xxx/CVE-2021-28509.json new file mode 100644 index 00000000000..b965e9fb02b --- /dev/null +++ b/2021/28xxx/CVE-2021-28509.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28509", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28510.json b/2021/28xxx/CVE-2021-28510.json new file mode 100644 index 00000000000..2bd7a92c09b --- /dev/null +++ b/2021/28xxx/CVE-2021-28510.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28510", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28511.json b/2021/28xxx/CVE-2021-28511.json new file mode 100644 index 00000000000..3b8c333c655 --- /dev/null +++ b/2021/28xxx/CVE-2021-28511.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28511", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28512.json b/2021/28xxx/CVE-2021-28512.json new file mode 100644 index 00000000000..3e92d2ca33b --- /dev/null +++ b/2021/28xxx/CVE-2021-28512.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28512", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28513.json b/2021/28xxx/CVE-2021-28513.json new file mode 100644 index 00000000000..6edf2739790 --- /dev/null +++ b/2021/28xxx/CVE-2021-28513.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28513", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28514.json b/2021/28xxx/CVE-2021-28514.json new file mode 100644 index 00000000000..f2ca7235cf3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28514.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28514", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28515.json b/2021/28xxx/CVE-2021-28515.json new file mode 100644 index 00000000000..4a154226616 --- /dev/null +++ b/2021/28xxx/CVE-2021-28515.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28515", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28516.json b/2021/28xxx/CVE-2021-28516.json new file mode 100644 index 00000000000..d6f8b033c7d --- /dev/null +++ b/2021/28xxx/CVE-2021-28516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28517.json b/2021/28xxx/CVE-2021-28517.json new file mode 100644 index 00000000000..21e912eb9f3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28518.json b/2021/28xxx/CVE-2021-28518.json new file mode 100644 index 00000000000..51df3e6bdcf --- /dev/null +++ b/2021/28xxx/CVE-2021-28518.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28518", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28519.json b/2021/28xxx/CVE-2021-28519.json new file mode 100644 index 00000000000..b086eebe8c5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28520.json b/2021/28xxx/CVE-2021-28520.json new file mode 100644 index 00000000000..6608e5efec6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28520.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28520", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28521.json b/2021/28xxx/CVE-2021-28521.json new file mode 100644 index 00000000000..dd583aa71ba --- /dev/null +++ b/2021/28xxx/CVE-2021-28521.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28521", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28522.json b/2021/28xxx/CVE-2021-28522.json new file mode 100644 index 00000000000..6cef118d5c2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28522.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28522", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28523.json b/2021/28xxx/CVE-2021-28523.json new file mode 100644 index 00000000000..6557eda5ba2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28523.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28523", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28524.json b/2021/28xxx/CVE-2021-28524.json new file mode 100644 index 00000000000..82c8410f5a2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28524.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28524", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28525.json b/2021/28xxx/CVE-2021-28525.json new file mode 100644 index 00000000000..6a6b3cd7598 --- /dev/null +++ b/2021/28xxx/CVE-2021-28525.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28525", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28526.json b/2021/28xxx/CVE-2021-28526.json new file mode 100644 index 00000000000..f78a76a63e6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28526.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28526", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28527.json b/2021/28xxx/CVE-2021-28527.json new file mode 100644 index 00000000000..dcea78c4cce --- /dev/null +++ b/2021/28xxx/CVE-2021-28527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28528.json b/2021/28xxx/CVE-2021-28528.json new file mode 100644 index 00000000000..a62ff581e66 --- /dev/null +++ b/2021/28xxx/CVE-2021-28528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28529.json b/2021/28xxx/CVE-2021-28529.json new file mode 100644 index 00000000000..ffb3440833a --- /dev/null +++ b/2021/28xxx/CVE-2021-28529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28530.json b/2021/28xxx/CVE-2021-28530.json new file mode 100644 index 00000000000..dc0aa1228b6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28531.json b/2021/28xxx/CVE-2021-28531.json new file mode 100644 index 00000000000..3d5377e077a --- /dev/null +++ b/2021/28xxx/CVE-2021-28531.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28531", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28532.json b/2021/28xxx/CVE-2021-28532.json new file mode 100644 index 00000000000..7cb11b77a31 --- /dev/null +++ b/2021/28xxx/CVE-2021-28532.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28532", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28533.json b/2021/28xxx/CVE-2021-28533.json new file mode 100644 index 00000000000..a275b32694b --- /dev/null +++ b/2021/28xxx/CVE-2021-28533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28534.json b/2021/28xxx/CVE-2021-28534.json new file mode 100644 index 00000000000..c88874c860d --- /dev/null +++ b/2021/28xxx/CVE-2021-28534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28535.json b/2021/28xxx/CVE-2021-28535.json new file mode 100644 index 00000000000..99dbb170690 --- /dev/null +++ b/2021/28xxx/CVE-2021-28535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28536.json b/2021/28xxx/CVE-2021-28536.json new file mode 100644 index 00000000000..78bcb03a249 --- /dev/null +++ b/2021/28xxx/CVE-2021-28536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28537.json b/2021/28xxx/CVE-2021-28537.json new file mode 100644 index 00000000000..858c1141242 --- /dev/null +++ b/2021/28xxx/CVE-2021-28537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28538.json b/2021/28xxx/CVE-2021-28538.json new file mode 100644 index 00000000000..b06c17fb813 --- /dev/null +++ b/2021/28xxx/CVE-2021-28538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28539.json b/2021/28xxx/CVE-2021-28539.json new file mode 100644 index 00000000000..5878913ef01 --- /dev/null +++ b/2021/28xxx/CVE-2021-28539.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28539", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28540.json b/2021/28xxx/CVE-2021-28540.json new file mode 100644 index 00000000000..25e294fb906 --- /dev/null +++ b/2021/28xxx/CVE-2021-28540.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28540", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28541.json b/2021/28xxx/CVE-2021-28541.json new file mode 100644 index 00000000000..5e487b75bac --- /dev/null +++ b/2021/28xxx/CVE-2021-28541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28542.json b/2021/28xxx/CVE-2021-28542.json new file mode 100644 index 00000000000..b6617d96ae8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28543.json b/2021/28xxx/CVE-2021-28543.json new file mode 100644 index 00000000000..eec56f7db80 --- /dev/null +++ b/2021/28xxx/CVE-2021-28543.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28543", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://varnish-cache.org/security/VSV00006.html", + "refsource": "MISC", + "name": "https://varnish-cache.org/security/VSV00006.html" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:H/AV:N/A:L/C:N/I:N/PR:N/S:C/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28544.json b/2021/28xxx/CVE-2021-28544.json new file mode 100644 index 00000000000..15080cb3ad8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3445.json b/2021/3xxx/CVE-2021-3445.json new file mode 100644 index 00000000000..48d706bc560 --- /dev/null +++ b/2021/3xxx/CVE-2021-3445.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3445", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 3ddeb81cb29d41dc3862a53e6ae5653cbb02e5c7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 16:00:44 +0000 Subject: [PATCH 368/845] "-Synchronized-Data." --- 2019/17xxx/CVE-2019-17571.json | 5 +++ 2020/13xxx/CVE-2020-13956.json | 15 +++++++++ 2021/1xxx/CVE-2021-1645.json | 5 +++ 2021/22xxx/CVE-2021-22887.json | 55 ++++++++++++++++++++++++++++-- 2021/25xxx/CVE-2021-25916.json | 55 ++++++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27889.json | 2 +- 2021/27xxx/CVE-2021-27938.json | 61 ++++++++++++++++++++++++++++++---- 7 files changed, 185 insertions(+), 13 deletions(-) diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index 1ebf3912c81..7369ad030af 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -453,6 +453,11 @@ "refsource": "MLIST", "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tinkerpop-dev] 20210316 [jira] [Created] (TINKERPOP-2534) Log4j flagged as critical security violation", + "url": "https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 05d3a0398e0..7c390b79e0f 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -118,6 +118,21 @@ "refsource": "MLIST", "name": "[hive-gitbox] 20210302 [GitHub] [hive] hsnusonic closed pull request #2032: HIVE-24837 Upgrade httpclient to 4.5.13+ due to CVE-2020-13956", "url": "https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[solr-issues] 20210316 [jira] [Resolved] (SOLR-15270) upgrade httpclient to address CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[solr-issues] 20210316 [jira] [Created] (SOLR-15269) upgrade httpclient to address CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[solr-issues] 20210316 [jira] [Created] (SOLR-15270) upgrade httpclient to address CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E" } ] }, diff --git a/2021/1xxx/CVE-2021-1645.json b/2021/1xxx/CVE-2021-1645.json index ba06477c0b5..59f425c54c2 100644 --- a/2021/1xxx/CVE-2021-1645.json +++ b/2021/1xxx/CVE-2021-1645.json @@ -212,6 +212,11 @@ "refsource": "FULLDISC", "name": "20210316 [CSA-2021-002] DP API ineffective in Windows containers", "url": "http://seclists.org/fulldisclosure/2021/Mar/33" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html", + "url": "http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html" } ] } diff --git a/2021/22xxx/CVE-2021-22887.json b/2021/22xxx/CVE-2021-22887.json index 5bb40ebc900..ede6514f9a2 100644 --- a/2021/22xxx/CVE-2021-22887.json +++ b/2021/22xxx/CVE-2021-22887.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-22887", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PSA5000, PSA7000", + "version": { + "version_data": [ + { + "version_value": "Fixed in 3.0d" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Embedded Malicious Code (CWE-506)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712", + "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712" + }, + { + "refsource": "MISC", + "name": "https://www.supermicro.com/en/support/security/Trickbot", + "url": "https://www.supermicro.com/en/support/security/Trickbot" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the BIOS of Pulse Secure (PSA-Series Hardware) models PSA5000 and PSA7000 could allow an attacker to compromise BIOS firmware. This vulnerability can be exploited only as part of an attack chain. Before an attacker can compromise the BIOS, they must exploit the device." } ] } diff --git a/2021/25xxx/CVE-2021-25916.json b/2021/25xxx/CVE-2021-25916.json index 4146d7d5418..743463a56b7 100644 --- a/2021/25xxx/CVE-2021-25916.json +++ b/2021/25xxx/CVE-2021-25916.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-25916", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "patchmerge", + "version": { + "version_data": [ + { + "version_value": "1.0.0, 1.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916" + }, + { + "refsource": "MISC", + "name": "https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12", + "url": "https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2021/27xxx/CVE-2021-27889.json b/2021/27xxx/CVE-2021-27889.json index edcee4cf3a0..3303826b20e 100644 --- a/2021/27xxx/CVE-2021-27889.json +++ b/2021/27xxx/CVE-2021-27889.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Cross-site Scriptiong (XSS) vulnerability in MyBB before 1.8.26 via Nested Auto URL when parsing messages." + "value": "Cross-site Scripting (XSS) vulnerability in MyBB before 1.8.26 via Nested Auto URL when parsing messages." } ] }, diff --git a/2021/27xxx/CVE-2021-27938.json b/2021/27xxx/CVE-2021-27938.json index 5c149abddbd..a7847c0fd3d 100644 --- a/2021/27xxx/CVE-2021-27938.json +++ b/2021/27xxx/CVE-2021-27938.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27938", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27938", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/symbiote/silverstripe-queuedjobs/releases", + "refsource": "MISC", + "name": "https://github.com/symbiote/silverstripe-queuedjobs/releases" + }, + { + "refsource": "CONFIRM", + "name": "https://www.silverstripe.org/download/security-releases/cve-2021-27938", + "url": "https://www.silverstripe.org/download/security-releases/cve-2021-27938" } ] } From 70ae31934b42e1898efc66cb0219440fdeb4e3f0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 17:00:41 +0000 Subject: [PATCH 369/845] "-Synchronized-Data." --- 2020/28xxx/CVE-2020-28899.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27217.json | 5 +++ 2 files changed, 55 insertions(+), 6 deletions(-) diff --git a/2020/28xxx/CVE-2020-28899.json b/2020/28xxx/CVE-2020-28899.json index 0c21827e230..0e37f4eef6e 100644 --- a/2020/28xxx/CVE-2020-28899.json +++ b/2020/28xxx/CVE-2020-28899.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28899", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28899", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Web CGI Script on ZyXEL LTE4506-M606 V1.00(ABDO.2)C0 devices does not require authentication, which allows remote unauthenticated attackers (via crafted JSON action data to /cgi-bin/gui.cgi) to use all features provided by the router. Examples: change the router password, retrieve the Wi-Fi passphrase, send an SMS message, or modify the IP forwarding to access the internal network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.zyxel.com/support/Zyxel-security-advisory-for-CGI-vulnerability-of-LTE.shtml", + "url": "https://www.zyxel.com/support/Zyxel-security-advisory-for-CGI-vulnerability-of-LTE.shtml" } ] } diff --git a/2021/27xxx/CVE-2021-27217.json b/2021/27xxx/CVE-2021-27217.json index 56bcf2561c3..94242acb9bf 100644 --- a/2021/27xxx/CVE-2021-27217.json +++ b/2021/27xxx/CVE-2021-27217.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://www.yubico.com/support/security-advisories/ysa-2021-01/", "url": "https://www.yubico.com/support/security-advisories/ysa-2021-01/" + }, + { + "refsource": "MISC", + "name": "https://blog.inhq.net/posts/yubico-libyubihsm-vuln2", + "url": "https://blog.inhq.net/posts/yubico-libyubihsm-vuln2" } ] } From 09611938ecadff4c242ccb179949451cf835e0de Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 18:00:47 +0000 Subject: [PATCH 370/845] "-Synchronized-Data." --- 2020/25xxx/CVE-2020-25649.json | 10 ++++++++++ 2020/27xxx/CVE-2020-27216.json | 5 +++++ 2020/27xxx/CVE-2020-27223.json | 5 +++++ 2021/21xxx/CVE-2021-21290.json | 5 +++++ 2021/28xxx/CVE-2021-28545.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28546.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28547.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28548.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28549.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28550.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28551.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28552.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28553.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28554.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28555.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28556.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28557.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28558.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28559.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28560.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28561.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28562.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28563.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28564.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28565.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28566.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28567.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28568.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28569.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28570.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28571.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28572.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28573.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28574.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28575.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28576.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28577.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28578.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28579.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28580.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28581.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28582.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28583.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28584.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28585.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28586.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28587.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28588.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28589.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28590.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28591.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28592.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28593.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28594.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28595.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28596.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28597.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28598.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28599.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28600.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28601.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28602.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28603.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28604.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28605.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28606.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28607.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28608.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28609.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28610.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28611.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28612.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28613.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28614.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28615.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28616.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28617.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28618.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28619.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28620.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28621.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28622.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28623.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28624.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28625.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28626.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28627.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28628.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28629.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28630.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28631.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28632.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28633.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28634.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28635.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28636.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28637.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28638.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28639.json | 18 ++++++++++++++++++ 99 files changed, 1735 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28545.json create mode 100644 2021/28xxx/CVE-2021-28546.json create mode 100644 2021/28xxx/CVE-2021-28547.json create mode 100644 2021/28xxx/CVE-2021-28548.json create mode 100644 2021/28xxx/CVE-2021-28549.json create mode 100644 2021/28xxx/CVE-2021-28550.json create mode 100644 2021/28xxx/CVE-2021-28551.json create mode 100644 2021/28xxx/CVE-2021-28552.json create mode 100644 2021/28xxx/CVE-2021-28553.json create mode 100644 2021/28xxx/CVE-2021-28554.json create mode 100644 2021/28xxx/CVE-2021-28555.json create mode 100644 2021/28xxx/CVE-2021-28556.json create mode 100644 2021/28xxx/CVE-2021-28557.json create mode 100644 2021/28xxx/CVE-2021-28558.json create mode 100644 2021/28xxx/CVE-2021-28559.json create mode 100644 2021/28xxx/CVE-2021-28560.json create mode 100644 2021/28xxx/CVE-2021-28561.json create mode 100644 2021/28xxx/CVE-2021-28562.json create mode 100644 2021/28xxx/CVE-2021-28563.json create mode 100644 2021/28xxx/CVE-2021-28564.json create mode 100644 2021/28xxx/CVE-2021-28565.json create mode 100644 2021/28xxx/CVE-2021-28566.json create mode 100644 2021/28xxx/CVE-2021-28567.json create mode 100644 2021/28xxx/CVE-2021-28568.json create mode 100644 2021/28xxx/CVE-2021-28569.json create mode 100644 2021/28xxx/CVE-2021-28570.json create mode 100644 2021/28xxx/CVE-2021-28571.json create mode 100644 2021/28xxx/CVE-2021-28572.json create mode 100644 2021/28xxx/CVE-2021-28573.json create mode 100644 2021/28xxx/CVE-2021-28574.json create mode 100644 2021/28xxx/CVE-2021-28575.json create mode 100644 2021/28xxx/CVE-2021-28576.json create mode 100644 2021/28xxx/CVE-2021-28577.json create mode 100644 2021/28xxx/CVE-2021-28578.json create mode 100644 2021/28xxx/CVE-2021-28579.json create mode 100644 2021/28xxx/CVE-2021-28580.json create mode 100644 2021/28xxx/CVE-2021-28581.json create mode 100644 2021/28xxx/CVE-2021-28582.json create mode 100644 2021/28xxx/CVE-2021-28583.json create mode 100644 2021/28xxx/CVE-2021-28584.json create mode 100644 2021/28xxx/CVE-2021-28585.json create mode 100644 2021/28xxx/CVE-2021-28586.json create mode 100644 2021/28xxx/CVE-2021-28587.json create mode 100644 2021/28xxx/CVE-2021-28588.json create mode 100644 2021/28xxx/CVE-2021-28589.json create mode 100644 2021/28xxx/CVE-2021-28590.json create mode 100644 2021/28xxx/CVE-2021-28591.json create mode 100644 2021/28xxx/CVE-2021-28592.json create mode 100644 2021/28xxx/CVE-2021-28593.json create mode 100644 2021/28xxx/CVE-2021-28594.json create mode 100644 2021/28xxx/CVE-2021-28595.json create mode 100644 2021/28xxx/CVE-2021-28596.json create mode 100644 2021/28xxx/CVE-2021-28597.json create mode 100644 2021/28xxx/CVE-2021-28598.json create mode 100644 2021/28xxx/CVE-2021-28599.json create mode 100644 2021/28xxx/CVE-2021-28600.json create mode 100644 2021/28xxx/CVE-2021-28601.json create mode 100644 2021/28xxx/CVE-2021-28602.json create mode 100644 2021/28xxx/CVE-2021-28603.json create mode 100644 2021/28xxx/CVE-2021-28604.json create mode 100644 2021/28xxx/CVE-2021-28605.json create mode 100644 2021/28xxx/CVE-2021-28606.json create mode 100644 2021/28xxx/CVE-2021-28607.json create mode 100644 2021/28xxx/CVE-2021-28608.json create mode 100644 2021/28xxx/CVE-2021-28609.json create mode 100644 2021/28xxx/CVE-2021-28610.json create mode 100644 2021/28xxx/CVE-2021-28611.json create mode 100644 2021/28xxx/CVE-2021-28612.json create mode 100644 2021/28xxx/CVE-2021-28613.json create mode 100644 2021/28xxx/CVE-2021-28614.json create mode 100644 2021/28xxx/CVE-2021-28615.json create mode 100644 2021/28xxx/CVE-2021-28616.json create mode 100644 2021/28xxx/CVE-2021-28617.json create mode 100644 2021/28xxx/CVE-2021-28618.json create mode 100644 2021/28xxx/CVE-2021-28619.json create mode 100644 2021/28xxx/CVE-2021-28620.json create mode 100644 2021/28xxx/CVE-2021-28621.json create mode 100644 2021/28xxx/CVE-2021-28622.json create mode 100644 2021/28xxx/CVE-2021-28623.json create mode 100644 2021/28xxx/CVE-2021-28624.json create mode 100644 2021/28xxx/CVE-2021-28625.json create mode 100644 2021/28xxx/CVE-2021-28626.json create mode 100644 2021/28xxx/CVE-2021-28627.json create mode 100644 2021/28xxx/CVE-2021-28628.json create mode 100644 2021/28xxx/CVE-2021-28629.json create mode 100644 2021/28xxx/CVE-2021-28630.json create mode 100644 2021/28xxx/CVE-2021-28631.json create mode 100644 2021/28xxx/CVE-2021-28632.json create mode 100644 2021/28xxx/CVE-2021-28633.json create mode 100644 2021/28xxx/CVE-2021-28634.json create mode 100644 2021/28xxx/CVE-2021-28635.json create mode 100644 2021/28xxx/CVE-2021-28636.json create mode 100644 2021/28xxx/CVE-2021-28637.json create mode 100644 2021/28xxx/CVE-2021-28638.json create mode 100644 2021/28xxx/CVE-2021-28639.json diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json index 030016ae085..f78846383e1 100644 --- a/2020/25xxx/CVE-2020-25649.json +++ b/2020/25xxx/CVE-2020-25649.json @@ -273,6 +273,16 @@ "refsource": "MLIST", "name": "[hive-issues] 20210315 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649", "url": "https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210316 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649", + "url": "https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[turbine-commits] 20210316 svn commit: r1887732 - in /turbine/fulcrum/trunk/json: ./ jackson/ jackson/src/test/org/apache/fulcrum/json/jackson/ jackson2/ jackson2/src/test/org/apache/fulcrum/json/jackson/ jackson2/src/test/org/apache/fulcrum/json/jackson/mixins/", + "url": "https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E" } ] }, diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index e54fe3014fd..eeff4848cc3 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -515,6 +515,11 @@ "refsource": "MLIST", "name": "[beam-issues] 20210316 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[beam-issues] 20210316 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216", + "url": "https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index b941a374445..76177f52554 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -361,6 +361,11 @@ "refsource": "MLIST", "name": "[spark-reviews] 20210315 [GitHub] [spark] HyukjinKwon closed pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[spark-reviews] 20210316 [GitHub] [spark] xkrogen commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223", + "url": "https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E" } ] } diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 170311f77f4..cdceed0836c 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -161,6 +161,11 @@ "refsource": "MLIST", "name": "[zookeeper-dev] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability", "url": "https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[tinkerpop-dev] 20210316 [jira] [Created] (TINKERPOP-2535) Netty 4.1.52 flagged as medium security violation", + "url": "https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E" } ] }, diff --git a/2021/28xxx/CVE-2021-28545.json b/2021/28xxx/CVE-2021-28545.json new file mode 100644 index 00000000000..216430ce534 --- /dev/null +++ b/2021/28xxx/CVE-2021-28545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28546.json b/2021/28xxx/CVE-2021-28546.json new file mode 100644 index 00000000000..239f66d5e76 --- /dev/null +++ b/2021/28xxx/CVE-2021-28546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28547.json b/2021/28xxx/CVE-2021-28547.json new file mode 100644 index 00000000000..9c5a5f08c7d --- /dev/null +++ b/2021/28xxx/CVE-2021-28547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28548.json b/2021/28xxx/CVE-2021-28548.json new file mode 100644 index 00000000000..1e80b284dcc --- /dev/null +++ b/2021/28xxx/CVE-2021-28548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28549.json b/2021/28xxx/CVE-2021-28549.json new file mode 100644 index 00000000000..de8b0565ef7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28550.json b/2021/28xxx/CVE-2021-28550.json new file mode 100644 index 00000000000..63c8cf8505d --- /dev/null +++ b/2021/28xxx/CVE-2021-28550.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28550", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28551.json b/2021/28xxx/CVE-2021-28551.json new file mode 100644 index 00000000000..ee36f72ab39 --- /dev/null +++ b/2021/28xxx/CVE-2021-28551.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28551", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28552.json b/2021/28xxx/CVE-2021-28552.json new file mode 100644 index 00000000000..e7b607458a9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28552", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28553.json b/2021/28xxx/CVE-2021-28553.json new file mode 100644 index 00000000000..fff3b8150fa --- /dev/null +++ b/2021/28xxx/CVE-2021-28553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28554.json b/2021/28xxx/CVE-2021-28554.json new file mode 100644 index 00000000000..f7c22df3a41 --- /dev/null +++ b/2021/28xxx/CVE-2021-28554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28554", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28555.json b/2021/28xxx/CVE-2021-28555.json new file mode 100644 index 00000000000..bb76e6ca344 --- /dev/null +++ b/2021/28xxx/CVE-2021-28555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28555", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28556.json b/2021/28xxx/CVE-2021-28556.json new file mode 100644 index 00000000000..6fee2da01bb --- /dev/null +++ b/2021/28xxx/CVE-2021-28556.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28556", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28557.json b/2021/28xxx/CVE-2021-28557.json new file mode 100644 index 00000000000..b689a8a217f --- /dev/null +++ b/2021/28xxx/CVE-2021-28557.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28557", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28558.json b/2021/28xxx/CVE-2021-28558.json new file mode 100644 index 00000000000..4260127547c --- /dev/null +++ b/2021/28xxx/CVE-2021-28558.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28558", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28559.json b/2021/28xxx/CVE-2021-28559.json new file mode 100644 index 00000000000..13088e3fe86 --- /dev/null +++ b/2021/28xxx/CVE-2021-28559.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28559", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28560.json b/2021/28xxx/CVE-2021-28560.json new file mode 100644 index 00000000000..feb5f0e0fa4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28560.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28560", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28561.json b/2021/28xxx/CVE-2021-28561.json new file mode 100644 index 00000000000..176eda6fa16 --- /dev/null +++ b/2021/28xxx/CVE-2021-28561.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28561", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28562.json b/2021/28xxx/CVE-2021-28562.json new file mode 100644 index 00000000000..33fd365b6c0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28563.json b/2021/28xxx/CVE-2021-28563.json new file mode 100644 index 00000000000..84fddb7fe22 --- /dev/null +++ b/2021/28xxx/CVE-2021-28563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28564.json b/2021/28xxx/CVE-2021-28564.json new file mode 100644 index 00000000000..b7f00b3624d --- /dev/null +++ b/2021/28xxx/CVE-2021-28564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28565.json b/2021/28xxx/CVE-2021-28565.json new file mode 100644 index 00000000000..21ba0164ba9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28565.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28565", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28566.json b/2021/28xxx/CVE-2021-28566.json new file mode 100644 index 00000000000..b0ba28b778f --- /dev/null +++ b/2021/28xxx/CVE-2021-28566.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28566", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28567.json b/2021/28xxx/CVE-2021-28567.json new file mode 100644 index 00000000000..9e7706a90f1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28568.json b/2021/28xxx/CVE-2021-28568.json new file mode 100644 index 00000000000..f913de3968b --- /dev/null +++ b/2021/28xxx/CVE-2021-28568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28569.json b/2021/28xxx/CVE-2021-28569.json new file mode 100644 index 00000000000..7fd55837f93 --- /dev/null +++ b/2021/28xxx/CVE-2021-28569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28570.json b/2021/28xxx/CVE-2021-28570.json new file mode 100644 index 00000000000..32c10e1b3e6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28571.json b/2021/28xxx/CVE-2021-28571.json new file mode 100644 index 00000000000..ae5fa56ceb6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28572.json b/2021/28xxx/CVE-2021-28572.json new file mode 100644 index 00000000000..4900e3af6a0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28573.json b/2021/28xxx/CVE-2021-28573.json new file mode 100644 index 00000000000..8ee83110ad7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28574.json b/2021/28xxx/CVE-2021-28574.json new file mode 100644 index 00000000000..6ee5cfe5b6b --- /dev/null +++ b/2021/28xxx/CVE-2021-28574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28575.json b/2021/28xxx/CVE-2021-28575.json new file mode 100644 index 00000000000..97c7006c37c --- /dev/null +++ b/2021/28xxx/CVE-2021-28575.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28575", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28576.json b/2021/28xxx/CVE-2021-28576.json new file mode 100644 index 00000000000..0cf0bb1d77b --- /dev/null +++ b/2021/28xxx/CVE-2021-28576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28576", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28577.json b/2021/28xxx/CVE-2021-28577.json new file mode 100644 index 00000000000..35495579bfc --- /dev/null +++ b/2021/28xxx/CVE-2021-28577.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28577", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28578.json b/2021/28xxx/CVE-2021-28578.json new file mode 100644 index 00000000000..caa08ad2596 --- /dev/null +++ b/2021/28xxx/CVE-2021-28578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28578", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28579.json b/2021/28xxx/CVE-2021-28579.json new file mode 100644 index 00000000000..2c74bc07794 --- /dev/null +++ b/2021/28xxx/CVE-2021-28579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28579", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28580.json b/2021/28xxx/CVE-2021-28580.json new file mode 100644 index 00000000000..3e777094786 --- /dev/null +++ b/2021/28xxx/CVE-2021-28580.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28580", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28581.json b/2021/28xxx/CVE-2021-28581.json new file mode 100644 index 00000000000..57923f81e7c --- /dev/null +++ b/2021/28xxx/CVE-2021-28581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28581", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28582.json b/2021/28xxx/CVE-2021-28582.json new file mode 100644 index 00000000000..ad1daeedddf --- /dev/null +++ b/2021/28xxx/CVE-2021-28582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28583.json b/2021/28xxx/CVE-2021-28583.json new file mode 100644 index 00000000000..3cb5d6e21f8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28583", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28584.json b/2021/28xxx/CVE-2021-28584.json new file mode 100644 index 00000000000..c43062c3931 --- /dev/null +++ b/2021/28xxx/CVE-2021-28584.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28584", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28585.json b/2021/28xxx/CVE-2021-28585.json new file mode 100644 index 00000000000..a5e38a97f1a --- /dev/null +++ b/2021/28xxx/CVE-2021-28585.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28585", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28586.json b/2021/28xxx/CVE-2021-28586.json new file mode 100644 index 00000000000..d0bb1c151be --- /dev/null +++ b/2021/28xxx/CVE-2021-28586.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28586", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28587.json b/2021/28xxx/CVE-2021-28587.json new file mode 100644 index 00000000000..3fb5721227d --- /dev/null +++ b/2021/28xxx/CVE-2021-28587.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28587", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28588.json b/2021/28xxx/CVE-2021-28588.json new file mode 100644 index 00000000000..f2a214dd2ed --- /dev/null +++ b/2021/28xxx/CVE-2021-28588.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28588", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28589.json b/2021/28xxx/CVE-2021-28589.json new file mode 100644 index 00000000000..af349adcef8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28589.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28589", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28590.json b/2021/28xxx/CVE-2021-28590.json new file mode 100644 index 00000000000..06a4237ac3b --- /dev/null +++ b/2021/28xxx/CVE-2021-28590.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28590", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28591.json b/2021/28xxx/CVE-2021-28591.json new file mode 100644 index 00000000000..8ea8a64ae9c --- /dev/null +++ b/2021/28xxx/CVE-2021-28591.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28591", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28592.json b/2021/28xxx/CVE-2021-28592.json new file mode 100644 index 00000000000..d4de91c2510 --- /dev/null +++ b/2021/28xxx/CVE-2021-28592.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28592", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28593.json b/2021/28xxx/CVE-2021-28593.json new file mode 100644 index 00000000000..2688fb4f48b --- /dev/null +++ b/2021/28xxx/CVE-2021-28593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28593", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28594.json b/2021/28xxx/CVE-2021-28594.json new file mode 100644 index 00000000000..6bad60aa6ea --- /dev/null +++ b/2021/28xxx/CVE-2021-28594.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28594", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28595.json b/2021/28xxx/CVE-2021-28595.json new file mode 100644 index 00000000000..6fb14ed44bf --- /dev/null +++ b/2021/28xxx/CVE-2021-28595.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28595", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28596.json b/2021/28xxx/CVE-2021-28596.json new file mode 100644 index 00000000000..4796b659fec --- /dev/null +++ b/2021/28xxx/CVE-2021-28596.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28596", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28597.json b/2021/28xxx/CVE-2021-28597.json new file mode 100644 index 00000000000..0b3b69961b2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28597.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28597", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28598.json b/2021/28xxx/CVE-2021-28598.json new file mode 100644 index 00000000000..5a57af1dc79 --- /dev/null +++ b/2021/28xxx/CVE-2021-28598.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28598", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28599.json b/2021/28xxx/CVE-2021-28599.json new file mode 100644 index 00000000000..ee227d2fa94 --- /dev/null +++ b/2021/28xxx/CVE-2021-28599.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28599", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28600.json b/2021/28xxx/CVE-2021-28600.json new file mode 100644 index 00000000000..ffc3a49a152 --- /dev/null +++ b/2021/28xxx/CVE-2021-28600.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28600", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28601.json b/2021/28xxx/CVE-2021-28601.json new file mode 100644 index 00000000000..56159f57bc4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28601.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28601", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28602.json b/2021/28xxx/CVE-2021-28602.json new file mode 100644 index 00000000000..ad22ed816de --- /dev/null +++ b/2021/28xxx/CVE-2021-28602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28603.json b/2021/28xxx/CVE-2021-28603.json new file mode 100644 index 00000000000..aac6cc1a3e7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28604.json b/2021/28xxx/CVE-2021-28604.json new file mode 100644 index 00000000000..9a279ee3a61 --- /dev/null +++ b/2021/28xxx/CVE-2021-28604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28605.json b/2021/28xxx/CVE-2021-28605.json new file mode 100644 index 00000000000..cf89a91f65c --- /dev/null +++ b/2021/28xxx/CVE-2021-28605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28606.json b/2021/28xxx/CVE-2021-28606.json new file mode 100644 index 00000000000..41851cac9e7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28607.json b/2021/28xxx/CVE-2021-28607.json new file mode 100644 index 00000000000..40f351b019e --- /dev/null +++ b/2021/28xxx/CVE-2021-28607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28608.json b/2021/28xxx/CVE-2021-28608.json new file mode 100644 index 00000000000..00101220557 --- /dev/null +++ b/2021/28xxx/CVE-2021-28608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28609.json b/2021/28xxx/CVE-2021-28609.json new file mode 100644 index 00000000000..34c30f2b511 --- /dev/null +++ b/2021/28xxx/CVE-2021-28609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28610.json b/2021/28xxx/CVE-2021-28610.json new file mode 100644 index 00000000000..d4128221e9b --- /dev/null +++ b/2021/28xxx/CVE-2021-28610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28611.json b/2021/28xxx/CVE-2021-28611.json new file mode 100644 index 00000000000..c2b96ddbc2a --- /dev/null +++ b/2021/28xxx/CVE-2021-28611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28612.json b/2021/28xxx/CVE-2021-28612.json new file mode 100644 index 00000000000..76beb55f534 --- /dev/null +++ b/2021/28xxx/CVE-2021-28612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28613.json b/2021/28xxx/CVE-2021-28613.json new file mode 100644 index 00000000000..8a36f870428 --- /dev/null +++ b/2021/28xxx/CVE-2021-28613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28614.json b/2021/28xxx/CVE-2021-28614.json new file mode 100644 index 00000000000..97c41db9740 --- /dev/null +++ b/2021/28xxx/CVE-2021-28614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28615.json b/2021/28xxx/CVE-2021-28615.json new file mode 100644 index 00000000000..428b30fdc85 --- /dev/null +++ b/2021/28xxx/CVE-2021-28615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28616.json b/2021/28xxx/CVE-2021-28616.json new file mode 100644 index 00000000000..b888bcea0b0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28617.json b/2021/28xxx/CVE-2021-28617.json new file mode 100644 index 00000000000..90442a485f5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28617", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28618.json b/2021/28xxx/CVE-2021-28618.json new file mode 100644 index 00000000000..9e2cabf813a --- /dev/null +++ b/2021/28xxx/CVE-2021-28618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28618", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28619.json b/2021/28xxx/CVE-2021-28619.json new file mode 100644 index 00000000000..9f898a56cbb --- /dev/null +++ b/2021/28xxx/CVE-2021-28619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28620.json b/2021/28xxx/CVE-2021-28620.json new file mode 100644 index 00000000000..b7eebf437f9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28621.json b/2021/28xxx/CVE-2021-28621.json new file mode 100644 index 00000000000..1540e7769f9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28622.json b/2021/28xxx/CVE-2021-28622.json new file mode 100644 index 00000000000..cff6851baf1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28623.json b/2021/28xxx/CVE-2021-28623.json new file mode 100644 index 00000000000..795a7feb406 --- /dev/null +++ b/2021/28xxx/CVE-2021-28623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28624.json b/2021/28xxx/CVE-2021-28624.json new file mode 100644 index 00000000000..3558a10d56e --- /dev/null +++ b/2021/28xxx/CVE-2021-28624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28625.json b/2021/28xxx/CVE-2021-28625.json new file mode 100644 index 00000000000..c0b97e76755 --- /dev/null +++ b/2021/28xxx/CVE-2021-28625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28626.json b/2021/28xxx/CVE-2021-28626.json new file mode 100644 index 00000000000..a628d8d5684 --- /dev/null +++ b/2021/28xxx/CVE-2021-28626.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28626", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28627.json b/2021/28xxx/CVE-2021-28627.json new file mode 100644 index 00000000000..61cf69141c1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28628.json b/2021/28xxx/CVE-2021-28628.json new file mode 100644 index 00000000000..ed16f791dbf --- /dev/null +++ b/2021/28xxx/CVE-2021-28628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28629.json b/2021/28xxx/CVE-2021-28629.json new file mode 100644 index 00000000000..f48dd76f7fc --- /dev/null +++ b/2021/28xxx/CVE-2021-28629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28630.json b/2021/28xxx/CVE-2021-28630.json new file mode 100644 index 00000000000..d402535bdc0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28631.json b/2021/28xxx/CVE-2021-28631.json new file mode 100644 index 00000000000..a45734996f5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28632.json b/2021/28xxx/CVE-2021-28632.json new file mode 100644 index 00000000000..0e5e8f7182a --- /dev/null +++ b/2021/28xxx/CVE-2021-28632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28633.json b/2021/28xxx/CVE-2021-28633.json new file mode 100644 index 00000000000..b66fb4d5f7d --- /dev/null +++ b/2021/28xxx/CVE-2021-28633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28634.json b/2021/28xxx/CVE-2021-28634.json new file mode 100644 index 00000000000..d1df950c6bd --- /dev/null +++ b/2021/28xxx/CVE-2021-28634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28635.json b/2021/28xxx/CVE-2021-28635.json new file mode 100644 index 00000000000..45b08565c89 --- /dev/null +++ b/2021/28xxx/CVE-2021-28635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28636.json b/2021/28xxx/CVE-2021-28636.json new file mode 100644 index 00000000000..a5a9ab86e1a --- /dev/null +++ b/2021/28xxx/CVE-2021-28636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28637.json b/2021/28xxx/CVE-2021-28637.json new file mode 100644 index 00000000000..3c555e138a0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28638.json b/2021/28xxx/CVE-2021-28638.json new file mode 100644 index 00000000000..9d4769d09ec --- /dev/null +++ b/2021/28xxx/CVE-2021-28638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28639.json b/2021/28xxx/CVE-2021-28639.json new file mode 100644 index 00000000000..6b981695f7b --- /dev/null +++ b/2021/28xxx/CVE-2021-28639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 2d47a6342637231ca6541aace029fa1564d5c4a6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 18:01:03 +0000 Subject: [PATCH 371/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28640.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28641.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28642.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28643.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28644.json | 18 ++++++++++++++++++ 5 files changed, 90 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28640.json create mode 100644 2021/28xxx/CVE-2021-28641.json create mode 100644 2021/28xxx/CVE-2021-28642.json create mode 100644 2021/28xxx/CVE-2021-28643.json create mode 100644 2021/28xxx/CVE-2021-28644.json diff --git a/2021/28xxx/CVE-2021-28640.json b/2021/28xxx/CVE-2021-28640.json new file mode 100644 index 00000000000..3e0dc6fe9fd --- /dev/null +++ b/2021/28xxx/CVE-2021-28640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28641.json b/2021/28xxx/CVE-2021-28641.json new file mode 100644 index 00000000000..55e72ffd986 --- /dev/null +++ b/2021/28xxx/CVE-2021-28641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28642.json b/2021/28xxx/CVE-2021-28642.json new file mode 100644 index 00000000000..f20afc2efea --- /dev/null +++ b/2021/28xxx/CVE-2021-28642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28643.json b/2021/28xxx/CVE-2021-28643.json new file mode 100644 index 00000000000..a3b04690a0f --- /dev/null +++ b/2021/28xxx/CVE-2021-28643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28644.json b/2021/28xxx/CVE-2021-28644.json new file mode 100644 index 00000000000..a6c73b31e10 --- /dev/null +++ b/2021/28xxx/CVE-2021-28644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 73e892d05f64714be66b5d0843d2f2f859704f4b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 19:00:47 +0000 Subject: [PATCH 372/845] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3446.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3446.json diff --git a/2021/3xxx/CVE-2021-3446.json b/2021/3xxx/CVE-2021-3446.json new file mode 100644 index 00000000000..1874ac16c62 --- /dev/null +++ b/2021/3xxx/CVE-2021-3446.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3446", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From c4d4fdd8b42e5f2f98f0d73127d173c4d38f4332 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 20:00:44 +0000 Subject: [PATCH 373/845] "-Synchronized-Data." --- 2020/35xxx/CVE-2020-35220.json | 58 ++++------------------------------ 2020/35xxx/CVE-2020-35222.json | 58 ++++------------------------------ 2020/35xxx/CVE-2020-35232.json | 58 ++++------------------------------ 2020/35xxx/CVE-2020-35782.json | 7 +++- 2020/35xxx/CVE-2020-35783.json | 7 +++- 2020/35xxx/CVE-2020-35801.json | 7 +++- 2021/28xxx/CVE-2021-28294.json | 56 ++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28295.json | 56 ++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28380.json | 56 ++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28381.json | 56 ++++++++++++++++++++++++++++---- 2021/3xxx/CVE-2021-3127.json | 56 ++++++++++++++++++++++++++++---- 11 files changed, 289 insertions(+), 186 deletions(-) diff --git a/2020/35xxx/CVE-2020-35220.json b/2020/35xxx/CVE-2020-35220.json index 614066734c2..5078e631c4d 100644 --- a/2020/35xxx/CVE-2020-35220.json +++ b/2020/35xxx/CVE-2020-35220.json @@ -1,61 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2020-35220", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35220", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "A TFTP server was found to be active by default on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices. It allows remote authenticated users to update the switch firmware." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", - "refsource": "MISC", - "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35801. Reason: This candidate is a reservation duplicate of CVE-2020-35801. Notes: All CVE users should reference CVE-2020-35801 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2020/35xxx/CVE-2020-35222.json b/2020/35xxx/CVE-2020-35222.json index 8e4f7b479d9..9d21213237e 100644 --- a/2020/35xxx/CVE-2020-35222.json +++ b/2020/35xxx/CVE-2020-35222.json @@ -1,61 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2020-35222", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35222", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "The NSDP protocol version implemented on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows unauthenticated remote attackers to obtain all the switch configuration parameters by sending the corresponding read requests." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", - "refsource": "MISC", - "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35783. Reason: This candidate is a reservation duplicate of CVE-2020-35783. Notes: All CVE users should reference CVE-2020-35783 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2020/35xxx/CVE-2020-35232.json b/2020/35xxx/CVE-2020-35232.json index dc476802cf5..a3c87a064ee 100644 --- a/2020/35xxx/CVE-2020-35232.json +++ b/2020/35xxx/CVE-2020-35232.json @@ -1,61 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2020-35232", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35232", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "The TFTP firmware update mechanism on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices does not properly implement firmware validations, allowing remote attackers to write arbitrary data to internal memory." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", - "refsource": "MISC", - "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35782. Reason: This candidate is a reservation duplicate of CVE-2020-35782. Notes: All CVE users should reference CVE-2020-35782 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2020/35xxx/CVE-2020-35782.json b/2020/35xxx/CVE-2020-35782.json index 855b03cc607..150ef69b2fd 100644 --- a/2020/35xxx/CVE-2020-35782.json +++ b/2020/35xxx/CVE-2020-35782.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48." + "value": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48. The TFTP firmware update mechanism does not properly implement firmware validations, allowing remote attackers to write arbitrary data to internal memory." } ] }, @@ -56,6 +56,11 @@ "url": "https://kb.netgear.com/000062636/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0378", "refsource": "MISC", "name": "https://kb.netgear.com/000062636/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0378" + }, + { + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] }, diff --git a/2020/35xxx/CVE-2020-35783.json b/2020/35xxx/CVE-2020-35783.json index 1bbf1cca87c..6acf07de4c5 100644 --- a/2020/35xxx/CVE-2020-35783.json +++ b/2020/35xxx/CVE-2020-35783.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects JGS516PE before 2.6.0.48, GS116Ev2 before 2.6.0.48, JGS524Ev2 before 2.6.0.48, and JGS524PE before 2.6.0.48." + "value": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects JGS516PE before 2.6.0.48, GS116Ev2 before 2.6.0.48, JGS524Ev2 before 2.6.0.48, and JGS524PE before 2.6.0.48. The NSDP protocol version allows unauthenticated remote attackers to obtain all the switch configuration parameters by sending the corresponding read requests." } ] }, @@ -56,6 +56,11 @@ "url": "https://kb.netgear.com/000062637/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0383", "refsource": "MISC", "name": "https://kb.netgear.com/000062637/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0383" + }, + { + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] }, diff --git a/2020/35xxx/CVE-2020-35801.json b/2020/35xxx/CVE-2020-35801.json index 5aeeff107bf..7c0739fa5f1 100644 --- a/2020/35xxx/CVE-2020-35801.json +++ b/2020/35xxx/CVE-2020-35801.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48." + "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48. A TFTP server was found to be active by default. It allows remote authenticated users to update the switch firmware." } ] }, @@ -56,6 +56,11 @@ "url": "https://kb.netgear.com/000062635/Security-Advisory-for-Security-Misconfiguration-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0376", "refsource": "MISC", "name": "https://kb.netgear.com/000062635/Security-Advisory-for-Security-Misconfiguration-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0376" + }, + { + "refsource": "MISC", + "name": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/", + "url": "https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/" } ] }, diff --git a/2021/28xxx/CVE-2021-28294.json b/2021/28xxx/CVE-2021-28294.json index 293e6730245..295a477989d 100644 --- a/2021/28xxx/CVE-2021-28294.json +++ b/2021/28xxx/CVE-2021-28294.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28294", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28294", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Ordering System 1.0 is vulnerable to arbitrary file upload through /onlineordering/GPST/store/initiateorder.php, which may lead to remote code execution (RCE)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49615", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49615" } ] } diff --git a/2021/28xxx/CVE-2021-28295.json b/2021/28xxx/CVE-2021-28295.json index 04f14bb32d7..605d28cb3dc 100644 --- a/2021/28xxx/CVE-2021-28295.json +++ b/2021/28xxx/CVE-2021-28295.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28295", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28295", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Ordering System 1.0 is vulnerable to unauthenticated SQL injection through /onlineordering/GPST/admin/design.php, which may lead to database information disclosure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/49618", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49618" } ] } diff --git a/2021/28xxx/CVE-2021-28380.json b/2021/28xxx/CVE-2021-28380.json index 04d3315ac95..03b09d2edc8 100644 --- a/2021/28xxx/CVE-2021-28380.json +++ b/2021/28xxx/CVE-2021-28380.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28380", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28380", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The aimeos (aka Aimeos shop and e-commerce framework) extension before 19.10.12 and 20.x before 20.10.5 for TYPO3 allows XSS via a backend user account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://typo3.org/security/advisory/typo3-ext-sa-2021-003", + "url": "https://typo3.org/security/advisory/typo3-ext-sa-2021-003" } ] } diff --git a/2021/28xxx/CVE-2021-28381.json b/2021/28xxx/CVE-2021-28381.json index 88ff298b303..0602b8a8834 100644 --- a/2021/28xxx/CVE-2021-28381.json +++ b/2021/28xxx/CVE-2021-28381.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28381", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28381", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://typo3.org/security/advisory/typo3-ext-sa-2021-001", + "url": "https://typo3.org/security/advisory/typo3-ext-sa-2021-001" } ] } diff --git a/2021/3xxx/CVE-2021-3127.json b/2021/3xxx/CVE-2021-3127.json index cd36d8fd39a..0713b73a1ae 100644 --- a/2021/3xxx/CVE-2021-3127.json +++ b/2021/3xxx/CVE-2021-3127.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3127", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3127", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://advisories.nats.io/CVE/CVE-2021-3127.txt", + "url": "https://advisories.nats.io/CVE/CVE-2021-3127.txt" } ] } From 0a01209f779c8e13a8632d14f359de86a0e92e1b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 21:00:47 +0000 Subject: [PATCH 374/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20218.json | 55 ++++++++++++++++++++++++++++++++-- 2021/28xxx/CVE-2021-28645.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28646.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28647.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28648.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28649.json | 18 +++++++++++ 2021/3xxx/CVE-2021-3447.json | 18 +++++++++++ 2021/3xxx/CVE-2021-3448.json | 18 +++++++++++ 8 files changed, 178 insertions(+), 3 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28645.json create mode 100644 2021/28xxx/CVE-2021-28646.json create mode 100644 2021/28xxx/CVE-2021-28647.json create mode 100644 2021/28xxx/CVE-2021-28648.json create mode 100644 2021/28xxx/CVE-2021-28649.json create mode 100644 2021/3xxx/CVE-2021-3447.json create mode 100644 2021/3xxx/CVE-2021-3448.json diff --git a/2021/20xxx/CVE-2021-20218.json b/2021/20xxx/CVE-2021-20218.json index 70e25ae11be..41e4faa44f3 100644 --- a/2021/20xxx/CVE-2021-20218.json +++ b/2021/20xxx/CVE-2021-20218.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20218", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "fabric8-kubernetes-client", + "version": { + "version_data": [ + { + "version_value": "kubernetes-client-4.2.0 and after" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1923405", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923405" + }, + { + "refsource": "MISC", + "name": "https://github.com/fabric8io/kubernetes-client/issues/2715", + "url": "https://github.com/fabric8io/kubernetes-client/issues/2715" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2" } ] } diff --git a/2021/28xxx/CVE-2021-28645.json b/2021/28xxx/CVE-2021-28645.json new file mode 100644 index 00000000000..aade6b21b5b --- /dev/null +++ b/2021/28xxx/CVE-2021-28645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28646.json b/2021/28xxx/CVE-2021-28646.json new file mode 100644 index 00000000000..6f936eb2718 --- /dev/null +++ b/2021/28xxx/CVE-2021-28646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28647.json b/2021/28xxx/CVE-2021-28647.json new file mode 100644 index 00000000000..edcc8dc72b7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28648.json b/2021/28xxx/CVE-2021-28648.json new file mode 100644 index 00000000000..f5686dbe26a --- /dev/null +++ b/2021/28xxx/CVE-2021-28648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28649.json b/2021/28xxx/CVE-2021-28649.json new file mode 100644 index 00000000000..4a2e893ad0b --- /dev/null +++ b/2021/28xxx/CVE-2021-28649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3447.json b/2021/3xxx/CVE-2021-3447.json new file mode 100644 index 00000000000..5116c21facf --- /dev/null +++ b/2021/3xxx/CVE-2021-3447.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3447", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3448.json b/2021/3xxx/CVE-2021-3448.json new file mode 100644 index 00000000000..77dd96bd844 --- /dev/null +++ b/2021/3xxx/CVE-2021-3448.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3448", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From c2b6315be60ea02025a0e08b3128b1237867e672 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Mar 2021 22:00:50 +0000 Subject: [PATCH 375/845] "-Synchronized-Data." --- 2019/3xxx/CVE-2019-3853.json | 14 ++++---- 2019/3xxx/CVE-2019-3897.json | 58 ++++++++++++++++++++++++++++++---- 2019/3xxx/CVE-2019-3898.json | 14 ++++---- 2019/3xxx/CVE-2019-3903.json | 14 ++++---- 2020/26xxx/CVE-2020-26238.json | 10 ++++++ 2021/3xxx/CVE-2021-3344.json | 50 +++++++++++++++++++++++++++-- 6 files changed, 129 insertions(+), 31 deletions(-) diff --git a/2019/3xxx/CVE-2019-3853.json b/2019/3xxx/CVE-2019-3853.json index 02651d98347..c5e57cff181 100644 --- a/2019/3xxx/CVE-2019-3853.json +++ b/2019/3xxx/CVE-2019-3853.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-3853", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-3853", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2019/3xxx/CVE-2019-3897.json b/2019/3xxx/CVE-2019-3897.json index a1714e5995c..d0385006b01 100644 --- a/2019/3xxx/CVE-2019-3897.json +++ b/2019/3xxx/CVE-2019-3897.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-3897", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-3897", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "redhat-certification", + "version": { + "version_data": [ + { + "version_value": "As shipped with Red Hat Certification 6 and 7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593768", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593768" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue." } ] } diff --git a/2019/3xxx/CVE-2019-3898.json b/2019/3xxx/CVE-2019-3898.json index 3f8ff97b5f8..254eb32e2cf 100644 --- a/2019/3xxx/CVE-2019-3898.json +++ b/2019/3xxx/CVE-2019-3898.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-3898", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-3898", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2019/3xxx/CVE-2019-3903.json b/2019/3xxx/CVE-2019-3903.json index e98fde29f10..dd7318fd9f4 100644 --- a/2019/3xxx/CVE-2019-3903.json +++ b/2019/3xxx/CVE-2019-3903.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-3903", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-3903", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2020/26xxx/CVE-2020-26238.json b/2020/26xxx/CVE-2020-26238.json index 04543fbdf0e..7f8b69e20ff 100644 --- a/2020/26xxx/CVE-2020-26238.json +++ b/2020/26xxx/CVE-2020-26238.json @@ -83,6 +83,16 @@ "name": "https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e", "refsource": "MISC", "url": "https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210316 [jira] [Assigned] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20210316 [jira] [Created] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E" } ] }, diff --git a/2021/3xxx/CVE-2021-3344.json b/2021/3xxx/CVE-2021-3344.json index 13d66250931..05e0c6e64ea 100644 --- a/2021/3xxx/CVE-2021-3344.json +++ b/2021/3xxx/CVE-2021-3344.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3344", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "openshift/builder", + "version": { + "version_data": [ + { + "version_value": "before github.com/openshift/builder v0.0.0-20210125201112-7901cb396121" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-522" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1921450", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921450" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This affects github.com/openshift/builder v0.0.0-20210125201112-7901cb396121 and before." } ] } From 47cf8a7350c3e47e06cf9311bc24722ad9916f9d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 00:00:50 +0000 Subject: [PATCH 376/845] "-Synchronized-Data." --- 2020/10xxx/CVE-2020-10004.json | 5 +++++ 2020/10xxx/CVE-2020-10013.json | 5 +++++ 2020/13xxx/CVE-2020-13933.json | 5 +++++ 2020/17xxx/CVE-2020-17510.json | 5 +++++ 2020/26xxx/CVE-2020-26238.json | 5 +++++ 2020/9xxx/CVE-2020-9972.json | 10 ++++++++++ 2021/22xxx/CVE-2021-22643.json | 10 ++++++++++ 2021/22xxx/CVE-2021-22645.json | 5 +++++ 2021/22xxx/CVE-2021-22647.json | 25 +++++++++++++++++++++++++ 2021/22xxx/CVE-2021-22649.json | 10 ++++++++++ 2021/22xxx/CVE-2021-22651.json | 5 +++++ 11 files changed, 90 insertions(+) diff --git a/2020/10xxx/CVE-2020-10004.json b/2020/10xxx/CVE-2020-10004.json index 0aa2217cb24..5909b59e93d 100644 --- a/2020/10xxx/CVE-2020-10004.json +++ b/2020/10xxx/CVE-2020-10004.json @@ -56,6 +56,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT211930", + "url": "https://support.apple.com/kb/HT211930" + }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211931", diff --git a/2020/10xxx/CVE-2020-10013.json b/2020/10xxx/CVE-2020-10013.json index d9ee322ea40..7faf7b17642 100644 --- a/2020/10xxx/CVE-2020-10013.json +++ b/2020/10xxx/CVE-2020-10013.json @@ -56,6 +56,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT211849", + "url": "https://support.apple.com/kb/HT211849" + }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211843", diff --git a/2020/13xxx/CVE-2020-13933.json b/2020/13xxx/CVE-2020-13933.json index 5922c87bebd..e7b0e9d022b 100644 --- a/2020/13xxx/CVE-2020-13933.json +++ b/2020/13xxx/CVE-2020-13933.json @@ -98,6 +98,11 @@ "refsource": "MLIST", "name": "[shiro-dev] 20210130 Re: Request for assistance to backport CVE-2020-13933 fix", "url": "https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix", + "url": "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E" } ] }, diff --git a/2020/17xxx/CVE-2020-17510.json b/2020/17xxx/CVE-2020-17510.json index 1415a8ab4b4..a10ff922fcf 100644 --- a/2020/17xxx/CVE-2020-17510.json +++ b/2020/17xxx/CVE-2020-17510.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[shiro-dev] 20210130 Re: Request for assistance to backport CVE-2020-13933 fix", "url": "https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix", + "url": "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E" } ] }, diff --git a/2020/26xxx/CVE-2020-26238.json b/2020/26xxx/CVE-2020-26238.json index 7f8b69e20ff..815d8140739 100644 --- a/2020/26xxx/CVE-2020-26238.json +++ b/2020/26xxx/CVE-2020-26238.json @@ -93,6 +93,11 @@ "refsource": "MLIST", "name": "[hive-dev] 20210316 [jira] [Created] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", "url": "https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210316 [jira] [Work started] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2020/9xxx/CVE-2020-9972.json b/2020/9xxx/CVE-2020-9972.json index 0f1d1a90ee2..ed711c2e21b 100644 --- a/2020/9xxx/CVE-2020-9972.json +++ b/2020/9xxx/CVE-2020-9972.json @@ -54,6 +54,16 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212011", "url": "https://support.apple.com/kb/HT212011" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212005", + "url": "https://support.apple.com/kb/HT212005" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212003", + "url": "https://support.apple.com/kb/HT212003" } ] }, diff --git a/2021/22xxx/CVE-2021-22643.json b/2021/22xxx/CVE-2021-22643.json index 015d1b8b0da..601c9b56377 100644 --- a/2021/22xxx/CVE-2021-22643.json +++ b/2021/22xxx/CVE-2021-22643.json @@ -83,6 +83,16 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/" } ] }, diff --git a/2021/22xxx/CVE-2021-22645.json b/2021/22xxx/CVE-2021-22645.json index 1162025f683..ec61ec9c887 100644 --- a/2021/22xxx/CVE-2021-22645.json +++ b/2021/22xxx/CVE-2021-22645.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/" } ] }, diff --git a/2021/22xxx/CVE-2021-22647.json b/2021/22xxx/CVE-2021-22647.json index 275f0b7033c..a6849f4863b 100644 --- a/2021/22xxx/CVE-2021-22647.json +++ b/2021/22xxx/CVE-2021-22647.json @@ -83,6 +83,31 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/" } ] }, diff --git a/2021/22xxx/CVE-2021-22649.json b/2021/22xxx/CVE-2021-22649.json index 78d26130380..49e07c302bd 100644 --- a/2021/22xxx/CVE-2021-22649.json +++ b/2021/22xxx/CVE-2021-22649.json @@ -83,6 +83,16 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/" } ] }, diff --git a/2021/22xxx/CVE-2021-22651.json b/2021/22xxx/CVE-2021-22651.json index bd1b245be76..f764f5dc8a1 100644 --- a/2021/22xxx/CVE-2021-22651.json +++ b/2021/22xxx/CVE-2021-22651.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/" } ] }, From 49f281534ad5653d0807c770750d66d496fc03fd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 02:00:44 +0000 Subject: [PATCH 377/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13936.json | 5 +++++ 2020/26xxx/CVE-2020-26238.json | 15 +++++++++++++++ 2 files changed, 20 insertions(+) diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json index 6ba1e521055..6be2192d4f5 100644 --- a/2020/13xxx/CVE-2020-13936.json +++ b/2020/13xxx/CVE-2020-13936.json @@ -89,6 +89,11 @@ "refsource": "MLIST", "name": "[announce] 20210310 CVE-2020-13936: Velocity Sandbox Bypass", "url": "https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210316 [GitHub] [druid] clintropolis opened a new pull request #11002: suppress CVE check for security fix", + "url": "https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd@%3Ccommits.druid.apache.org%3E" } ] }, diff --git a/2020/26xxx/CVE-2020-26238.json b/2020/26xxx/CVE-2020-26238.json index 815d8140739..11d03985796 100644 --- a/2020/26xxx/CVE-2020-26238.json +++ b/2020/26xxx/CVE-2020-26238.json @@ -98,6 +98,21 @@ "refsource": "MLIST", "name": "[hive-issues] 20210316 [jira] [Work started] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", "url": "https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-gitbox] 20210316 [GitHub] [hive] achennagiri opened a new pull request #2081: HIVE-24890: Upgrade the cron-utils library from 8.1.1 to 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210316 [jira] [Work logged] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210316 [jira] [Updated] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E" } ] }, From 4f488371744bc00e723d6276d04fed8384420953 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 04:00:48 +0000 Subject: [PATCH 378/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13574.json | 5 +++++ 2020/13xxx/CVE-2020-13575.json | 5 +++++ 2020/13xxx/CVE-2020-13576.json | 5 +++++ 2020/13xxx/CVE-2020-13577.json | 5 +++++ 2020/13xxx/CVE-2020-13578.json | 5 +++++ 2021/21xxx/CVE-2021-21367.json | 5 +++++ 2021/23xxx/CVE-2021-23351.json | 5 +++++ 7 files changed, 35 insertions(+) diff --git a/2020/13xxx/CVE-2020-13574.json b/2020/13xxx/CVE-2020-13574.json index 098e7a039a7..80b1530cafc 100644 --- a/2020/13xxx/CVE-2020-13574.json +++ b/2020/13xxx/CVE-2020-13574.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1185", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1185" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-faea36a9c3", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/" } ] }, diff --git a/2020/13xxx/CVE-2020-13575.json b/2020/13xxx/CVE-2020-13575.json index 90650cbffb1..7427e4f1214 100644 --- a/2020/13xxx/CVE-2020-13575.json +++ b/2020/13xxx/CVE-2020-13575.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-faea36a9c3", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/" } ] }, diff --git a/2020/13xxx/CVE-2020-13576.json b/2020/13xxx/CVE-2020-13576.json index 0ceea6895ce..743a8241620 100644 --- a/2020/13xxx/CVE-2020-13576.json +++ b/2020/13xxx/CVE-2020-13576.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-faea36a9c3", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/" } ] }, diff --git a/2020/13xxx/CVE-2020-13577.json b/2020/13xxx/CVE-2020-13577.json index 53dcc7768bf..2c04e5e2266 100644 --- a/2020/13xxx/CVE-2020-13577.json +++ b/2020/13xxx/CVE-2020-13577.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1188", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1188" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-faea36a9c3", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/" } ] }, diff --git a/2020/13xxx/CVE-2020-13578.json b/2020/13xxx/CVE-2020-13578.json index 89e32ac00a2..a600e4596da 100644 --- a/2020/13xxx/CVE-2020-13578.json +++ b/2020/13xxx/CVE-2020-13578.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-faea36a9c3", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/" } ] }, diff --git a/2021/21xxx/CVE-2021-21367.json b/2021/21xxx/CVE-2021-21367.json index 8393a86743a..b2314a1225d 100644 --- a/2021/21xxx/CVE-2021-21367.json +++ b/2021/21xxx/CVE-2021-21367.json @@ -83,6 +83,11 @@ "name": "https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907538abafe5225b67cc12c03e7645", "refsource": "MISC", "url": "https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907538abafe5225b67cc12c03e7645" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-3dedd41a06", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7TCGM4B45VLUJDCE5PHFYA5KBNHD4RA/" } ] }, diff --git a/2021/23xxx/CVE-2021-23351.json b/2021/23xxx/CVE-2021-23351.json index 853bb28ec32..59d5784ec91 100644 --- a/2021/23xxx/CVE-2021-23351.json +++ b/2021/23xxx/CVE-2021-23351.json @@ -66,6 +66,11 @@ "refsource": "MISC", "url": "https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b", "name": "https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-e01c1fe4cc", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46/" } ] }, From eb5234dd0503fad2050df6b80fc584099a213a54 Mon Sep 17 00:00:00 2001 From: QC-CNA <41291997+QC-CNA@users.noreply.github.com> Date: Wed, 17 Mar 2021 11:28:06 +0530 Subject: [PATCH 379/845] Qualcomm_3-17-2021 --- 2020/11xxx/CVE-2020-11166.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11171.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11186.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11188.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11189.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11190.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11192.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11199.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11218.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11220.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11221.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11222.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11226.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11227.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11228.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11230.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11290.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11299.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11305.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11308.json | 72 +++++++++++++++++++++++++++------- 2020/11xxx/CVE-2020-11309.json | 72 +++++++++++++++++++++++++++------- 21 files changed, 1218 insertions(+), 294 deletions(-) diff --git a/2020/11xxx/CVE-2020-11166.json b/2020/11xxx/CVE-2020-11166.json index bec496db1bf..9b21da10880 100644 --- a/2020/11xxx/CVE-2020-11166.json +++ b/2020/11xxx/CVE-2020-11166.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11166", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11166", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8084, APQ8096AU, AQT1000, AR6003, AR8151, CSR6030, CSRB31024, FSM10055, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9150, MDM9205, MDM9206, MDM9207, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9607, MDM9615, MDM9615M, MDM9625, MDM9628, MDM9630, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8018, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9635, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE1035, QFE1040, QFE1045, QFE1100, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2340, QFE2520, QFE2550, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX20, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6850, WFR1620, WGR7640, WHS9410, WSA8810, WSA8815, WTR1605, WTR1605L, WTR1625, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Potential out of bound read exception when UE receives unusually large number of padding octets in the beginning of ROHC header in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over-read Issue in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11171.json b/2020/11xxx/CVE-2020-11171.json index d09876ae483..956812d7d68 100644 --- a/2020/11xxx/CVE-2020-11171.json +++ b/2020/11xxx/CVE-2020-11171.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11171", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11171", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8096AU, AQT1000, AR6003, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9615, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8018, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8998, PMC1000H, PMD9607, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8998, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2520, QFE2550, QFE3100, QFE3320, QFE3340, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX20, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WTR1605L, WTR2955, WTR2965, WTR3905, WTR3925, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over-read Issue in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11186.json b/2020/11xxx/CVE-2020-11186.json index 59b038d6e2f..1589f3b19bf 100644 --- a/2020/11xxx/CVE-2020-11186.json +++ b/2020/11xxx/CVE-2020-11186.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11186", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11186", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile", + "version": { + "version_data": [ + { + "version_value": "CSRB31024, PM3003A, PM7150A, PM7150L, PM7250, PM7250B, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PMK8002, PMR525, PMX24, PMX55, QAT3516, QAT3518, QAT3519, QAT3555, QAT5515, QAT5522, QAT5533, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6564AU, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA8337, QDM2301, QDM2305, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET6110, QFS2530, QFS2580, QLN1021AQ, QLN1031, QLN1036AQ, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA5580, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6582, QPM6585, QPM8830, QPM8895, QTC800H, QTC801S, QTM525, QTM527, SA2150P, SA415M, SA515M, SD765, SD765G, SD768G, SD865 5G, SD870, SDR8150, SDR8250, SDR865, SDX55, SDX55M, SDXR2 5G, SM7250P, SMB1355, SMB1381, SMB1390, SMR525, SMR526, WCD9341, WCD9360, WCD9380, WCD9385, WCN3991, WCN3998, WSA8810, WSA8815" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Modem will enter into busy mode in an infinite loop while parsing histogram dimension due to improper validation of input received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Loop With Unreachable Exit Condition in Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11188.json b/2020/11xxx/CVE-2020-11188.json index 8c5243d45c7..05cd36de611 100644 --- a/2020/11xxx/CVE-2020-11188.json +++ b/2020/11xxx/CVE-2020-11188.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11188", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11188", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8084, APQ8096AU, AQT1000, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCC112, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE1035, QFE1040, QFE1045, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2340, QFE2520, QFE2550, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX20, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1350, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over-read in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11189.json b/2020/11xxx/CVE-2020-11189.json index 83811e05086..99b57f8be8e 100644 --- a/2020/11xxx/CVE-2020-11189.json +++ b/2020/11xxx/CVE-2020-11189.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11189", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11189", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8084, APQ8096AU, AQT1000, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9230, MDM9250, MDM9330, MDM9607, MDM9628, MDM9630, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9635, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE1035, QFE1040, QFE1045, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2340, QFE2520, QFE2550, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX20, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over-read in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11190.json b/2020/11xxx/CVE-2020-11190.json index 0fcdf566672..f1874987308 100644 --- a/2020/11xxx/CVE-2020-11190.json +++ b/2020/11xxx/CVE-2020-11190.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11190", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11190", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8084, APQ8096AU, AQT1000, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE1035, QFE1040, QFE1045, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2340, QFE2520, QFE2550, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX20, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over-read in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11192.json b/2020/11xxx/CVE-2020-11192.json index 1abc2b12bc2..c9371995648 100644 --- a/2020/11xxx/CVE-2020-11192.json +++ b/2020/11xxx/CVE-2020-11192.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11192", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11192", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8096AU, AQT1000, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8998, PMC1000H, PMD9607, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8998, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX24, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2520, QFE2550, QFE3100, QFE3320, QFE3340, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WTR2955, WTR2965, WTR3905, WTR3925, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Out of bound write while parsing SDP string due to missing check on null termination in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Copy Without Checking Size of Input in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11199.json b/2020/11xxx/CVE-2020-11199.json index b6d72af742e..77227c3da5e 100644 --- a/2020/11xxx/CVE-2020-11199.json +++ b/2020/11xxx/CVE-2020-11199.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11199", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11199", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, CSR8811, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8953, PM8996, PM8998, PMC1000H, PMD9607, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMK8003, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMM8996AU, PMP8074, PMR525, PMR735A, PMR735B, PMW3100, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA4024, QCA6174A, QCA6175A, QCA6234, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8072, QCA8075, QCA8081, QCA8337, QCA9367, QCA9377, QCA9379, QCA9888, QCA9889, QCA9984, QCC112, QCM2290, QCM4290, QCM6125, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5121, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN9000, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6100, QET6110, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2520, QFE2550, QFE3100, QFE3320, QFE3340, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA5581, QPA6560, QPA8673, QPA8675, QPA8686, QPA8688, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSM8250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD690 5G, SD710, SD712, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD7c, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SD888 5G, SDA429W, SDM429W, SDM630, SDM830, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1350, SMB1351, SMB1354, SMB1355, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB1396, SMB231, SMB2351, SMB358, SMR525, SMR526, SMR545, SMR546, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HLOS to access EL3 stack canary by just mapping imem region due to Improper access control and can lead to information exposure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Exposure in QTEE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11218.json b/2020/11xxx/CVE-2020-11218.json index 80928bd435f..cb96dbed678 100644 --- a/2020/11xxx/CVE-2020-11218.json +++ b/2020/11xxx/CVE-2020-11218.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11218", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11218", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile", + "version": { + "version_data": [ + { + "version_value": "APQ8017, APQ8053, AQT1000, AR8035, CSRB31024, FSM10055, MSM8917, MSM8920, MSM8940, MSM8953, PM3003A, PM4125, PM4250, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8937, PM8940, PM8953, PM8998, PMC1000H, PME605, PMI632, PMI8937, PMI8952, PMI8998, PMK8002, PMM855AU, PMR525, PMR735A, PMX24, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1500, QBT2000, QCA6174A, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564AU, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA8337, QCA9377, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QLN1021AQ, QLN1031, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4360, QPA4361, QPA5373, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC801S, QTM525, QTM527, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 675, SD 8C, SD 8CX, SD450, SD460, SD632, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD845, SD855, SD865 5G, SD870, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1358, SMB1380, SMB1381, SMB1390, SMB1395, SMB2351, SMR525, SMR526, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WGR7640, WHS9410, WSA8810, WSA8815, WTR2955, WTR2965, WTR3925" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in baseband when NW configures LTE betaOffset-RI-Index due to lack of data validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reachable Assertion in Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11220.json b/2020/11xxx/CVE-2020-11220.json index 0efcebb4d2a..91e73e312da 100644 --- a/2020/11xxx/CVE-2020-11220.json +++ b/2020/11xxx/CVE-2020-11220.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11220", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11220", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking", + "version": { + "version_data": [ + { + "version_value": "AQT1000, AR8035, PM4125, PM4250, PM6125, PM6150, PM6150A, PM6150L, PM6350, PM640A, PM640L, PM640P, PM7250B, PM8004, PM8005, PM8008, PM8350, PM855, PM855A, PM855B, PM855L, PM855P, PM8998, PMD9655, PMI632, PMI8998, PMK8002, PMK8003, PMM8195AU, PMM855AU, PMX24, PMX50, PMX55, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QBT1500, QBT2000, QCA6390, QCA6420, QCA6430, QCA6574A, QCA6574AU, QCA6595, QCA6696, QCA9984, QCM2290, QCM4290, QCS2290, QCS405, QCS4290, QDM2301, QDM2302, QET4101, QET5100, QPA4360, QPA4361, QPA5460, QPA6560, QPA8673, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC801S, QTM525, SA6155P, SA8155, SA8155P, SA8195P, SD 8C, SD 8CX, SD460, SD480, SD662, SD665, SD675, SD855, SD888 5G, SDM830, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR735, SDR735G, SDR8150, SDR8250, SDR865, SDX24, SDX50M, SDX55, SDX55M, SM4125, SMB1351, SMB1354, SMB1355, SMB1381, SMB1390, SMB1396, SMR526, SMR545, SMR546, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6850, WGR7640, WHS9410, WSA8810, WSA8815, WTR2965, WTR3925, WTR5975" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "While processing storage SCM commands there is a time of check or time of use window where a pointer used could be invalid at a specific time while executing the storage SCM call in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Time-of-check Time-of-use Race Condition in Storage" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11221.json b/2020/11xxx/CVE-2020-11221.json index 785f656f63f..123e7a47243 100644 --- a/2020/11xxx/CVE-2020-11221.json +++ b/2020/11xxx/CVE-2020-11221.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11221", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11221", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, CSR8811, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, MDM8207, MDM9150, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, PM3003A, PM4125, PM4250, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8998, PMC1000H, PMD9607, PMD9655, PMD9655AU, PME605, PMI632, PMI8998, PMK8002, PMK8003, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMM8996AU, PMR525, PMR735A, PMR735B, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4020, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8072, QCA8075, QCA8081, QCA8337, QCA9367, QCA9377, QCA9379, QCA9984, QCM2290, QCM4290, QCM6125, QCN5021, QCN5022, QCN5052, QCN5121, QCN5122, QCN5152, QCN9000, QCN9074, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6100, QET6110, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2550, QFE3100, QFE3320, QFE3440FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5460, QPA5580, QPA5581, QPA6560, QPA8673, QPA8675, QPA8686, QPA8688, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSM8250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, RSW8577, SA2150P, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD460, SD480, SD660, SD662, SD665, SD670, SD675, SD678, SD690 5G, SD710, SD712, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD7c, SD835, SD845, SD850, SD855, SD865 5G, SD870, SD888 5G, SDM630, SDM830, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1350, SMB1351, SMB1354, SMB1355, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB1396, SMB231, SMB2351, SMB358, SMR525, SMR526, SMR545, SMR546, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3925, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Usage of syscall by non-secure entity can allow extraction of secure QTEE diagnostic information in clear text form due to insufficient checks in the syscall handler and leads to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Exposure in QTEE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11222.json b/2020/11xxx/CVE-2020-11222.json index 2f78852c1cc..8f61f77a59b 100644 --- a/2020/11xxx/CVE-2020-11222.json +++ b/2020/11xxx/CVE-2020-11222.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11222", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11222", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile", + "version": { + "version_data": [ + { + "version_value": "APQ8017, APQ8053, AQT1000, AR8035, CSRB31024, MSM8917, MSM8920, MSM8940, MSM8953, MSM8976, MSM8976SG, PM3003A, PM4125, PM4250, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8937, PM8940, PM8952, PM8953, PM8956, PM8998, PMC1000H, PMI632, PMI8937, PMI8940, PMI8952, PMI8998, PMK8002, PMM855AU, PMR525, PMR735A, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1500, QBT2000, QCA6174A, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564AU, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA8337, QCA9377, QCA9379, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6110, QFE2101, QFE2550, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QLN1021AQ, QLN1031, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC801S, QTM525, QTM527, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD450, SD460, SD660, SD662, SD665, SD670, SD675, SD678, SD720G, SD730, SD765, SD765G, SD768G, SD845, SD855, SD865 5G, SD870, SDM630, SDR051, SDR052, SDR425, SDR660, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDX24, SDX50M, SDX55, SDX55M, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1351, SMB1354, SMB1355, SMB1358, SMB1380, SMB1381, SMB1390, SMB1395, SMB2351, SMR525, SMR526, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WTR2955, WTR2965, WTR3925" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer over read while processing MT SMS with maximum length due to improper length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over Read in Multi Mode Call Processor" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11226.json b/2020/11xxx/CVE-2020-11226.json index fa1ae9d9a44..a50adf3769a 100644 --- a/2020/11xxx/CVE-2020-11226.json +++ b/2020/11xxx/CVE-2020-11226.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11226", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11226", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8084, APQ8096AU, AQT1000, AR6003, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9150, MDM9205, MDM9206, MDM9207, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9607, MDM9615, MDM9615M, MDM9625, MDM9628, MDM9630, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8018, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9635, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4004, QCA4020, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCC112, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET6110, QFE1035, QFE1040, QFE1045, QFE1100, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2340, QFE2520, QFE2550, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDA429W, SDM429W, SDM630, SDR051, SDR052, SDR105, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1350, SMB1351, SMB1354, SMB1355, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WFR1620, WGR7640, WHS9410, WSA8810, WSA8815, WTR1605, WTR1605L, WTR1625, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Out of bound memory read in Data modem while unpacking data due to lack of offset length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Validation of Array Index in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11227.json b/2020/11xxx/CVE-2020-11227.json index 4b5b76f66b7..038c4e4886f 100644 --- a/2020/11xxx/CVE-2020-11227.json +++ b/2020/11xxx/CVE-2020-11227.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11227", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11227", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8084, APQ8096AU, AQT1000, AR6003, AR8035, AR8151, CSR6030, CSRB31024, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9150, MDM9206, MDM9207, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9607, MDM9615, MDM9615M, MDM9625, MDM9628, MDM9630, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8018, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8952, PM8953, PM8956, PM8996, PM8998, PMC1000H, PMD9607, PMD9635, PMD9645, PMD9655, PMD9655AU, PME605, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMM855AU, PMM8996AU, PMR525, PMR735A, PMW3100, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1000, QBT1500, QBT2000, QCA4020, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCC112, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6110, QFE1035, QFE1040, QFE1045, QFE1100, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2340, QFE2520, QFE2550, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QFS2530, QFS2580, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5580, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4650, QPM5541, QPM5577, QPM5579, QPM5621, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA8155, SA8155P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD710, SD712, SD720G, SD730, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD850, SD855, SD865 5G, SD870, SDM630, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDW3100, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SMB1350, SMB1351, SMB1354, SMB1355, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1395, SMB231, SMB2351, SMB358, SMB358S, SMR525, SMR526, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WFR1620, WGR7640, WHS9410, WSA8810, WSA8815, WTR1605, WTR1605L, WTR1625, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4605, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Out of bound write while parsing RTT/TTY packet parsing due to lack of check of buffer size before copying into buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Copy without Checking Size of destination in Data Modem" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11228.json b/2020/11xxx/CVE-2020-11228.json index b7ca3fa9a13..9eadaeea684 100644 --- a/2020/11xxx/CVE-2020-11228.json +++ b/2020/11xxx/CVE-2020-11228.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11228", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11228", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking", + "version": { + "version_data": [ + { + "version_value": "AQT1000, AR8035, PM3003A, PM4125, PM4250, PM6125, PM6150, PM6150A, PM6150L, PM6350, PM640A, PM640L, PM640P, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM855, PM855B, PM855L, PM855P, PM8998, PMC1000H, PMD9655, PMI632, PMI8998, PMK8002, PMK8003, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMX24, PMX55, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1500, QBT2000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8337, QCA9984, QCM2290, QCM4290, QCS2290, QCS405, QCS4290, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET6100, QET6110, QFS2530, QFS2580, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4360, QPA4361, QPA5460, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6325, QPM6375, QPM6582, QPM6585, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC801S, QTM525, QTM527, SA2150P, SA515M, SA6155P, SA8195P, SD 8C, SD 8CX, SD460, SD480, SD662, SD665, SD675, SD690 5G, SD750G, SD765, SD765G, SD768G, SD855, SD865 5G, SD870, SD888 5G, SDM830, SDR425, SDR660, SDR660G, SDR735, SDR735G, SDR8150, SDR8250, SDR865, SDX24, SDX55, SDX55M, SDXR2 5G, SM4125, SM7250P, SMB1351, SMB1354, SMB1355, SMB1381, SMB1390, SMB1395, SMB1396, SMB2351, SMR525, SMR526, SMR545, SMR546, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6750, WCN6850, WCN6851, WGR7640, WHS9410, WSA8810, WSA8815, WSA8830, WSA8835, WTR2965, WTR3925, WTR5975" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Part of RPM region was not protected from xblSec itself due to improper policy and leads to unprivileged access in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control in Core" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11230.json b/2020/11xxx/CVE-2020-11230.json index 310a2632d7e..26a6bf71310 100644 --- a/2020/11xxx/CVE-2020-11230.json +++ b/2020/11xxx/CVE-2020-11230.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11230", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11230", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile", + "version": { + "version_data": [ + { + "version_value": "AQT1000, FSM10055, PM3003A, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PMK7350, PMK8002, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMR525, PMR735A, PMR735B, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT2000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574AU, QCA6696, QDM2301, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET5100M, QET6100, QET6110, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5621, QPM5641, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8870, QPM8895, QSM7250, QTC800H, QTC801S, QTM525, QTM527, SA6145P, SA6150P, SA6155P, SA8150P, SA8155P, SA8195P, SD 8CX, SD765, SD765G, SD768G, SD855, SD865 5G, SD870, SD888 5G, SDR051, SDR052, SDR735, SDR735G, SDR8150, SDR8250, SDR865, SDX50M, SDX55, SDX55M, SDXR2 5G, SM7250P, SM7350, SMB1355, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMR525, SMR526, SMR545, SMR546, WCD9341, WCD9360, WCD9380, WCD9385, WCN3990, WCN3991, WCN3998, WCN6740, WCN6850, WCN6851, WCN6856, WHS9410, WSA8810, WSA8815, WSA8830, WSA8835" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Potential arbitrary memory corruption when the qseecom driver updates ion physical addresses in the buffer as it exposes a physical address to user land in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Time of Check Time of Use Race Condition in HLOS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11290.json b/2020/11xxx/CVE-2020-11290.json index 1467a60e012..ec239940285 100644 --- a/2020/11xxx/CVE-2020-11290.json +++ b/2020/11xxx/CVE-2020-11290.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11290", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11290", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8053, AQT1000, AR8031, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, MSM8909W, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8953, PM8998, PMD9655, PME605, PMI632, PMI8937, PMI8952, PMI8998, PMK7350, PMK8002, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMW3100, PMX24, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA4020, QCA6174A, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8337, QCA9377, QCA9379, QCC1110, QCM4290, QCM6125, QCS405, QCS4290, QCS603, QCS605, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1036AQ, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5621, QPM5641, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8870, QPM8895, QSM7250, QSM8250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC801S, QTM525, Qualcomm215, RSW8577, SA2150P, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SD205, SD210, SD429, SD439, SD450, SD460, SD632, SD660, SD662, SD665, SD670, SD675, SD710, SD765, SD765G, SD768G, SD845, SD855, SD865 5G, SD870, SD888 5G, SDA429W, SDM429W, SDM830, SDR425, SDR660, SDR660G, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDW3100, SDX24, SDX55, SDX55M, SDXR1, SDXR2 5G, SM7250P, SM7350, SMB1351, SMB1354, SMB1355, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMR525, SMR526, SMR545, SMR546, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3925, WTR4905, WTR5975" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Use after free condition in msm ioctl events due to race between the ioctl register and deregister events in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free in Display" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11299.json b/2020/11xxx/CVE-2020-11299.json index c534fcfde93..d882a3b9629 100644 --- a/2020/11xxx/CVE-2020-11299.json +++ b/2020/11xxx/CVE-2020-11299.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11299", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11299", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8053, APQ8064AU, APQ8096AU, AQT1000, AR8031, AR8151, CSRA6620, CSRA6640, FSM10055, FSM10056, MDM9206, MDM9650, MSM8909W, MSM8917, MSM8937, MSM8953, MSM8996AU, PM215, PM3003A, PM4125, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8953, PM8996, PM8998, PMD9607, PMD9655, PME605, PMI632, PMI8937, PMI8952, PMI8994, PMI8996, PMI8998, PMK7350, PMK8001, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMM8996AU, PMR525, PMR735A, PMR735B, PMW3100, PMX20, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1000, QBT1500, QBT2000, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA9367, QCA9377, QCA9379, QCM2290, QCM4290, QCM6125, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN1020, QLN1030, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5620, QPM5621, QPM5641, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSM8350, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, Qualcomm215, RGR7640AU, RSW8577, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD205, SD210, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD690 5G, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD820, SD821, SD835, SD845, SD855, SD865 5G, SD870, SD888 5G, SDA429W, SDM429W, SDM630, SDM830, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7350, SMB1350, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMB231, SMR525, SMR526, SMR545, SMR546, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow can occur in video while playing the non-standard clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Copy Without Checking Size Of Input in Video" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11305.json b/2020/11xxx/CVE-2020-11305.json index 5b536c46ed0..05a9d54f67c 100644 --- a/2020/11xxx/CVE-2020-11305.json +++ b/2020/11xxx/CVE-2020-11305.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11305", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11305", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8053, MDM9206, PM8909, PM8916, PM8953, PMD9607, PMI8952, QCA9367, QCA9377, SMB1358, SMB1360, SMB231, WCD9326, WCD9330, WCN3660B, WCN3680B, WSA8810, WSA8815, WTR2965" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Integer overflow in boot due to improper length check on arguments received in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Integer Overflow to Buffer Overflow in BOOT" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11308.json b/2020/11xxx/CVE-2020-11308.json index 556a980d1d3..822040577f0 100644 --- a/2020/11xxx/CVE-2020-11308.json +++ b/2020/11xxx/CVE-2020-11308.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11308", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11308", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music", + "version": { + "version_data": [ + { + "version_value": "APQ8009, AQT1000, AR8031, AR8035, AR8151, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, MDM9250, MDM9655, PM3003A, PM4125, PM4250, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM855P, PM8916, PM8998, PMC1000H, PMD9655, PME605, PMI632, PMI8998, PMK7350, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1000, QBT1500, QBT2000, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8337, QCA9377, QCM2290, QCM4290, QCM6125, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET4200AQ, QET5100, QET5100M, QET6100, QET6110, QFS2530, QFS2580, QFS2608, QFS2630, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5460, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5641, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6325, QPM6375, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC800T, QTC801S, QTM525, QTM527, RSW8577, SA2150P, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD460, SD480, SD660, SD662, SD665, SD670, SD675, SD678, SD690 5G, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD835, SD845, SD855, SD865 5G, SD870, SD888 5G, SDM630, SDM830, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7350, SMB1351, SMB1354, SMB1355, SMB1380, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMB2351, SMR525, SMR526, SMR545, SMR546, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2965, WTR3925, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow occurs when trying to convert ASCII string to Unicode string if the actual size is more than required in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Validation of Array Index in BOOT" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11309.json b/2020/11xxx/CVE-2020-11309.json index 5e36b8bc4bd..fcce8b9921b 100644 --- a/2020/11xxx/CVE-2020-11309.json +++ b/2020/11xxx/CVE-2020-11309.json @@ -1,18 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-11309", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2020-11309", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "APQ8009, APQ8009W, APQ8017, APQ8053, APQ8064AU, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, MDM9206, MDM9607, MDM9626, MDM9628, MDM9650, MSM8909W, MSM8917, MSM8953, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8953, PM8996, PM8998, PMC1000H, PMD9607, PMD9655, PME605, PMI632, PMI8937, PMI8952, PMI8994, PMI8996, PMI8998, PMK7350, PMK8001, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMM8996AU, PMR525, PMR735A, PMR735B, PMW3100, PMX20, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA4020, QCA6174A, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCC1110, QCM2290, QCM4290, QCM6125, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN1020, QLN1021AQ, QLN1030, QLN1031, QLN1036AQ, QLN4640, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA4361, QPA5373, QPA5460, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8675, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM2630, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5541, QPM5577, QPM5579, QPM5620, QPM5621, QPM5641, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6325, QPM6375, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC800S, QTC801S, QTM525, QTM527, Qualcomm215, RGR7640AU, RSW8577, SA2150P, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD690 5G, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD820, SD835, SD845, SD855, SD865 5G, SD870, SD888 5G, SDA429W, SDM429W, SDM830, SDR051, SDR052, SDR425, SDR660, SDR660G, SDR675, SDR735, SDR735G, SDR8150, SDR8250, SDR845, SDR865, SDW3100, SDX20, SDX20M, SDX24, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7350, SMB1350, SMB1351, SMB1354, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMB231, SMB2351, SMB358S, SMR525, SMR526, SMR545, SMR546, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3925, WTR4905, WTR5975, WTR6955" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." } - ] - } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Use after free in GPU driver while mapping the user memory to GPU memory due to improper check of referenced memory in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use-After-Free in Graphics" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" + } + ] + } } \ No newline at end of file From 0064f098ad5c48870e5ac490f4c43ce35a211212 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 06:00:46 +0000 Subject: [PATCH 380/845] "-Synchronized-Data." --- 2017/20xxx/CVE-2017-20002.json | 67 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28650.json | 62 +++++++++++++++++++++++++++++++ 2 files changed, 129 insertions(+) create mode 100644 2017/20xxx/CVE-2017-20002.json create mode 100644 2021/28xxx/CVE-2021-28650.json diff --git a/2017/20xxx/CVE-2017-20002.json b/2017/20xxx/CVE-2017-20002.json new file mode 100644 index 00000000000..96b2d96b6d9 --- /dev/null +++ b/2017/20xxx/CVE-2017-20002.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-20002", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Debian shadow package before 4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374", + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957", + "refsource": "MISC", + "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28650.json b/2021/28xxx/CVE-2021-28650.json new file mode 100644 index 00000000000..9aaf4201814 --- /dev/null +++ b/2021/28xxx/CVE-2021-28650.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28650", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "autoar-extractor.c in GNOME gnome-autoar before 0.3.1, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-36241." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/8109c368c6cfdb593faaf698c2bf5da32bb1ace4", + "refsource": "MISC", + "name": "https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/8109c368c6cfdb593faaf698c2bf5da32bb1ace4" + } + ] + } +} \ No newline at end of file From 1a4d78de984ff995a9b9921229223daeedb04409 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 07:00:48 +0000 Subject: [PATCH 381/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28651.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28652.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28653.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28654.json | 18 ++++++++++++++++++ 4 files changed, 72 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28651.json create mode 100644 2021/28xxx/CVE-2021-28652.json create mode 100644 2021/28xxx/CVE-2021-28653.json create mode 100644 2021/28xxx/CVE-2021-28654.json diff --git a/2021/28xxx/CVE-2021-28651.json b/2021/28xxx/CVE-2021-28651.json new file mode 100644 index 00000000000..c3ca9769ff4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28652.json b/2021/28xxx/CVE-2021-28652.json new file mode 100644 index 00000000000..d3bb1e29b68 --- /dev/null +++ b/2021/28xxx/CVE-2021-28652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28653.json b/2021/28xxx/CVE-2021-28653.json new file mode 100644 index 00000000000..1a2967ceb82 --- /dev/null +++ b/2021/28xxx/CVE-2021-28653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28654.json b/2021/28xxx/CVE-2021-28654.json new file mode 100644 index 00000000000..6e527c4f7dc --- /dev/null +++ b/2021/28xxx/CVE-2021-28654.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28654", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 5d7d262d4888e4f3a2e431f0fdfda9330e97a338 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 09:00:46 +0000 Subject: [PATCH 382/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28655.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28656.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28657.json | 18 ++++++++++++++++++ 3 files changed, 54 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28655.json create mode 100644 2021/28xxx/CVE-2021-28656.json create mode 100644 2021/28xxx/CVE-2021-28657.json diff --git a/2021/28xxx/CVE-2021-28655.json b/2021/28xxx/CVE-2021-28655.json new file mode 100644 index 00000000000..0728d13e556 --- /dev/null +++ b/2021/28xxx/CVE-2021-28655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28656.json b/2021/28xxx/CVE-2021-28656.json new file mode 100644 index 00000000000..cde79fe7084 --- /dev/null +++ b/2021/28xxx/CVE-2021-28656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28657.json b/2021/28xxx/CVE-2021-28657.json new file mode 100644 index 00000000000..bfab20e03d1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 5e443f9c38cd1ef5bf6e1ce7dacfb4043fe4baff Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Wed, 17 Mar 2021 09:02:34 +0000 Subject: [PATCH 383/845] Add missing CVE-2020-13924 for Ambari --- 2020/13xxx/CVE-2020-13924.json | 72 ++++++++++++++++++++++++++++++---- 1 file changed, 65 insertions(+), 7 deletions(-) diff --git a/2020/13xxx/CVE-2020-13924.json b/2020/13xxx/CVE-2020-13924.json index 1d7b0d90379..89be9b96c2b 100644 --- a/2020/13xxx/CVE-2020-13924.json +++ b/2020/13xxx/CVE-2020-13924.json @@ -1,18 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-13924", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Ambari", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Apache Ambari", + "version_value": "2.6.2.2" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "threedr3am" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Apache Ambari versions 2.6.2.2 and earlier, malicious users can construct file names for directory traversal and traverse to other directories to download files." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "directory traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://mail-archives.apache.org/mod_mbox/ambari-user/202102.mbox/%3CCAEJYuxEQZ_aPwJdAaSxPu-Dva%3Dhc7zZUx3-pzBORbd23g%2BGH1A%40mail.gmail.com%3E" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } -} \ No newline at end of file +} From 9437046fd215a99fa519085c6211f7a4d9be3fee Mon Sep 17 00:00:00 2001 From: unknown Date: Wed, 17 Mar 2021 17:07:17 +0800 Subject: [PATCH 384/845] Add TWCERT/CC CVE-2021-22859 CVE-2021-22860 --- 2021/22xxx/CVE-2021-22859.json | 97 +++++++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22860.json | 102 +++++++++++++++++++++++++++++++-- 2 files changed, 187 insertions(+), 12 deletions(-) diff --git a/2021/22xxx/CVE-2021-22859.json b/2021/22xxx/CVE-2021-22859.json index 12aa96906c3..58c451a84c3 100644 --- a/2021/22xxx/CVE-2021-22859.json +++ b/2021/22xxx/CVE-2021-22859.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2021-03-17T09:30:00.000Z", "ID": "CVE-2021-22859", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "EIC e-document system - SQL Injection" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "e-document system", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "0", + "version_value": "3.0.2" + } + ] + } + } + ] + }, + "vendor_name": "Excellent Infotek Corporation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The users’ data querying function of EIC e-document system does not filter the special characters which resulted in remote attackers can inject SQL syntax and execute arbitrary commands without privilege." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-4517-51e25-1.html" + }, + { + "refsource": "CONFIRM", + "url": "https://gist.github.com/tonykuo76/807c838b75879b0d327782dfcd2c3bea" + }, + { + "refsource": "CONFIRM", + "url": "https://www.chtsecurity.com/news/c974fd28-c19b-4003-82f3-818904057496" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to version 3.0.4" + } + ], + "source": { + "advisory": "TVN-202101010", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/22xxx/CVE-2021-22860.json b/2021/22xxx/CVE-2021-22860.json index e45259ffb67..64186cd60b8 100644 --- a/2021/22xxx/CVE-2021-22860.json +++ b/2021/22xxx/CVE-2021-22860.json @@ -1,18 +1,108 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2021-03-17T09:30:00.000Z", "ID": "CVE-2021-22860", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "EIC e-document system - Broken Authentication" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "e-document system", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "0", + "version_value": "3.0.2" + }, + { + "version_affected": "=", + "version_name": "0", + "version_value": "2.9" + } + ] + } + } + ] + }, + "vendor_name": "Excellent Infotek Corporation" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users’ credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Broken Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html" + }, + { + "refsource": "CONFIRM", + "url": "https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3" + }, + { + "refsource": "CONFIRM", + "url": "https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to version 3.0.4" + } + ], + "source": { + "advisory": "TVN-202101011", + "discovery": "EXTERNAL" } } \ No newline at end of file From 44b720e848484fe5373fc32cedb3589658fc8f4a Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Wed, 17 Mar 2021 09:15:02 +0000 Subject: [PATCH 385/845] Add missing CVE for Subversion RBP --- 2020/17xxx/CVE-2020-17525.json | 86 ++++++++++++++++++++++++++++++---- 1 file changed, 78 insertions(+), 8 deletions(-) diff --git a/2020/17xxx/CVE-2020-17525.json b/2020/17xxx/CVE-2020-17525.json index 33447275913..9e7551a44d3 100644 --- a/2020/17xxx/CVE-2020-17525.json +++ b/2020/17xxx/CVE-2020-17525.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2020-17525", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Remote unauthenticated denial-of-service in Subversion mod_authz_svn" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Subversion", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "mod_authz_svn", + "version_value": "1.14.1" + }, + { + "version_affected": "!", + "version_name": "mod_authz_svn", + "version_value": "1.10.7" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thomas Åkesson (simonsoft.se)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7" } ] - } -} \ No newline at end of file + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": {}, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "As a workaround, the use of in-repository authz rules files with the AuthzSVNReposRelativeAccessFile can be avoided by switching to an alternative configuration which fetches an authz rules file from the server's filesystem, rather than from an SVN repository." + } + ] +} From 4de49a0d8467cc771b5494d9c440391d87bc5cf0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 10:00:48 +0000 Subject: [PATCH 386/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13924.json | 7 ++++--- 2020/17xxx/CVE-2020-17525.json | 11 ++++++----- 2020/5xxx/CVE-2020-5398.json | 5 +++++ 2021/22xxx/CVE-2021-22859.json | 17 ++++++++++------- 2021/22xxx/CVE-2021-22860.json | 17 ++++++++++------- 5 files changed, 35 insertions(+), 22 deletions(-) diff --git a/2020/13xxx/CVE-2020-13924.json b/2020/13xxx/CVE-2020-13924.json index 89be9b96c2b..fc5b26be645 100644 --- a/2020/13xxx/CVE-2020-13924.json +++ b/2020/13xxx/CVE-2020-13924.json @@ -65,12 +65,13 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://mail-archives.apache.org/mod_mbox/ambari-user/202102.mbox/%3CCAEJYuxEQZ_aPwJdAaSxPu-Dva%3Dhc7zZUx3-pzBORbd23g%2BGH1A%40mail.gmail.com%3E" + "refsource": "MISC", + "url": "https://mail-archives.apache.org/mod_mbox/ambari-user/202102.mbox/%3CCAEJYuxEQZ_aPwJdAaSxPu-Dva%3Dhc7zZUx3-pzBORbd23g%2BGH1A%40mail.gmail.com%3E", + "name": "https://mail-archives.apache.org/mod_mbox/ambari-user/202102.mbox/%3CCAEJYuxEQZ_aPwJdAaSxPu-Dva%3Dhc7zZUx3-pzBORbd23g%2BGH1A%40mail.gmail.com%3E" } ] }, "source": { "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17525.json b/2020/17xxx/CVE-2020-17525.json index 9e7551a44d3..9f6443ea807 100644 --- a/2020/17xxx/CVE-2020-17525.json +++ b/2020/17xxx/CVE-2020-17525.json @@ -38,7 +38,7 @@ "credit": [ { "lang": "eng", - "value": "Thomas Åkesson (simonsoft.se)" + "value": "Thomas \u00c5kesson (simonsoft.se)" } ], "data_format": "MITRE", @@ -48,7 +48,7 @@ "description_data": [ { "lang": "eng", - "value": "Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7" + "value": "Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7" } ] }, @@ -71,8 +71,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" + "refsource": "MISC", + "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt", + "name": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" } ] }, @@ -85,4 +86,4 @@ "value": "As a workaround, the use of in-repository authz rules files with the AuthzSVNReposRelativeAccessFile can be avoided by switching to an alternative configuration which fetches an authz rules file from the server's filesystem, rather than from an SVN repository." } ] -} +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5398.json b/2020/5xxx/CVE-2020-5398.json index da6b7ad2624..2037fd75475 100644 --- a/2020/5xxx/CVE-2020-5398.json +++ b/2020/5xxx/CVE-2020-5398.json @@ -243,6 +243,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E" } ] }, diff --git a/2021/22xxx/CVE-2021-22859.json b/2021/22xxx/CVE-2021-22859.json index 58c451a84c3..1e9563eb5d1 100644 --- a/2021/22xxx/CVE-2021-22859.json +++ b/2021/22xxx/CVE-2021-22859.json @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "The users’ data querying function of EIC e-document system does not filter the special characters which resulted in remote attackers can inject SQL syntax and execute arbitrary commands without privilege." + "value": "The users\u2019 data querying function of EIC e-document system does not filter the special characters which resulted in remote attackers can inject SQL syntax and execute arbitrary commands without privilege." } ] }, @@ -77,16 +77,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4517-51e25-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4517-51e25-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4517-51e25-1.html" }, { - "refsource": "CONFIRM", - "url": "https://gist.github.com/tonykuo76/807c838b75879b0d327782dfcd2c3bea" + "refsource": "MISC", + "url": "https://gist.github.com/tonykuo76/807c838b75879b0d327782dfcd2c3bea", + "name": "https://gist.github.com/tonykuo76/807c838b75879b0d327782dfcd2c3bea" }, { - "refsource": "CONFIRM", - "url": "https://www.chtsecurity.com/news/c974fd28-c19b-4003-82f3-818904057496" + "refsource": "MISC", + "url": "https://www.chtsecurity.com/news/c974fd28-c19b-4003-82f3-818904057496", + "name": "https://www.chtsecurity.com/news/c974fd28-c19b-4003-82f3-818904057496" } ] }, diff --git a/2021/22xxx/CVE-2021-22860.json b/2021/22xxx/CVE-2021-22860.json index 64186cd60b8..87201376018 100644 --- a/2021/22xxx/CVE-2021-22860.json +++ b/2021/22xxx/CVE-2021-22860.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users’ credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends." + "value": "EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users\u2019 credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends." } ] }, @@ -82,16 +82,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html" }, { - "refsource": "CONFIRM", - "url": "https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3" + "refsource": "MISC", + "url": "https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3", + "name": "https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3" }, { - "refsource": "CONFIRM", - "url": "https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011" + "refsource": "MISC", + "url": "https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011", + "name": "https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011" } ] }, From 07a42baec10a7762b35e3dc734e7984ff1a5414e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 12:00:54 +0000 Subject: [PATCH 387/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 15 +++++++++++++++ 2020/26xxx/CVE-2020-26238.json | 5 +++++ 2021/21xxx/CVE-2021-21290.json | 5 +++++ 2021/21xxx/CVE-2021-21295.json | 5 +++++ 4 files changed, 30 insertions(+) diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index c7949a448eb..b43eb9ba746 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -228,6 +228,21 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210316 [GitHub] [hbase] pankaj72981 merged pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[thrift-notifications] 20210317 [GitHub] [thrift] cyril867 commented on pull request #2208: THRIFT-5237 Implement MAX_MESSAGE_SIZE and consolidate limits into a TConfiguration class (c_glib)", + "url": "https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[thrift-notifications] 20210317 [GitHub] [thrift] cyril867 edited a comment on pull request #2208: THRIFT-5237 Implement MAX_MESSAGE_SIZE and consolidate limits into a TConfiguration class (c_glib)", + "url": "https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210317 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/26xxx/CVE-2020-26238.json b/2020/26xxx/CVE-2020-26238.json index 11d03985796..ab36e7add13 100644 --- a/2020/26xxx/CVE-2020-26238.json +++ b/2020/26xxx/CVE-2020-26238.json @@ -113,6 +113,11 @@ "refsource": "MLIST", "name": "[hive-issues] 20210316 [jira] [Updated] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", "url": "https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210317 [jira] [Commented] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index cdceed0836c..8000fdaf91b 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -166,6 +166,11 @@ "refsource": "MLIST", "name": "[tinkerpop-dev] 20210316 [jira] [Created] (TINKERPOP-2535) Netty 4.1.52 flagged as medium security violation", "url": "https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[ranger-dev] 20210317 [jira] [Created] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", + "url": "https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index aa3ae257bf2..dfd6c28ee26 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -83,6 +83,11 @@ "name": "https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4", "refsource": "MISC", "url": "https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4" + }, + { + "refsource": "MLIST", + "name": "[ranger-dev] 20210317 [jira] [Created] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", + "url": "https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E" } ] }, From e218d105ec0860685f2fd793d226f5ebf2f4da55 Mon Sep 17 00:00:00 2001 From: Bogdan Botezatu Date: Wed, 17 Mar 2021 14:23:33 +0200 Subject: [PATCH 388/845] Submitting unused CVEs in 2020 --- 2020/15xxx/CVE-2020-15281.json | 6 +++--- 2020/15xxx/CVE-2020-15282.json | 6 +++--- 2020/15xxx/CVE-2020-15285.json | 6 +++--- 2020/15xxx/CVE-2020-15286.json | 6 +++--- 2020/15xxx/CVE-2020-15287.json | 6 +++--- 2020/15xxx/CVE-2020-15288.json | 6 +++--- 2020/15xxx/CVE-2020-15289.json | 6 +++--- 2020/15xxx/CVE-2020-15290.json | 6 +++--- 2020/15xxx/CVE-2020-15291.json | 6 +++--- 2020/15xxx/CVE-2020-15295.json | 6 +++--- 2020/15xxx/CVE-2020-15296.json | 6 +++--- 2020/15xxx/CVE-2020-15298.json | 6 +++--- 2020/15xxx/CVE-2020-15728.json | 6 +++--- 2020/15xxx/CVE-2020-15736.json | 6 +++--- 2020/15xxx/CVE-2020-15737.json | 6 +++--- 2020/15xxx/CVE-2020-15738.json | 6 +++--- 2020/15xxx/CVE-2020-15740.json | 6 +++--- 2020/15xxx/CVE-2020-15741.json | 6 +++--- 2020/15xxx/CVE-2020-15743.json | 6 +++--- 2020/15xxx/CVE-2020-15745.json | 6 +++--- 2020/15xxx/CVE-2020-15746.json | 6 +++--- 2020/15xxx/CVE-2020-15747.json | 6 +++--- 2020/15xxx/CVE-2020-15748.json | 6 +++--- 2020/15xxx/CVE-2020-15749.json | 6 +++--- 2020/15xxx/CVE-2020-15750.json | 6 +++--- 2020/15xxx/CVE-2020-15751.json | 6 +++--- 2020/15xxx/CVE-2020-15752.json | 6 +++--- 2020/15xxx/CVE-2020-15753.json | 6 +++--- 2020/15xxx/CVE-2020-15754.json | 6 +++--- 2020/15xxx/CVE-2020-15755.json | 6 +++--- 2020/15xxx/CVE-2020-15756.json | 6 +++--- 2020/15xxx/CVE-2020-15757.json | 6 +++--- 2020/15xxx/CVE-2020-15758.json | 6 +++--- 2020/15xxx/CVE-2020-15759.json | 6 +++--- 2020/15xxx/CVE-2020-15760.json | 6 +++--- 2020/15xxx/CVE-2020-15761.json | 6 +++--- 2020/15xxx/CVE-2020-15762.json | 6 +++--- 2020/15xxx/CVE-2020-15763.json | 6 +++--- 2020/15xxx/CVE-2020-15764.json | 6 +++--- 2020/15xxx/CVE-2020-15765.json | 6 +++--- 2020/15xxx/CVE-2020-15766.json | 6 +++--- 41 files changed, 123 insertions(+), 123 deletions(-) diff --git a/2020/15xxx/CVE-2020-15281.json b/2020/15xxx/CVE-2020-15281.json index 58e3f03a800..edfae37a8c7 100644 --- a/2020/15xxx/CVE-2020-15281.json +++ b/2020/15xxx/CVE-2020-15281.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15281", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15282.json b/2020/15xxx/CVE-2020-15282.json index 0f940c1a35b..89c70c1a2b0 100644 --- a/2020/15xxx/CVE-2020-15282.json +++ b/2020/15xxx/CVE-2020-15282.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15282", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15285.json b/2020/15xxx/CVE-2020-15285.json index 51942a87c9c..9dae13c20bc 100644 --- a/2020/15xxx/CVE-2020-15285.json +++ b/2020/15xxx/CVE-2020-15285.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15285", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15286.json b/2020/15xxx/CVE-2020-15286.json index 44b6c26fb68..c32f75196dc 100644 --- a/2020/15xxx/CVE-2020-15286.json +++ b/2020/15xxx/CVE-2020-15286.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15286", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15287.json b/2020/15xxx/CVE-2020-15287.json index 6a43e3a47bc..1f1df4e0d00 100644 --- a/2020/15xxx/CVE-2020-15287.json +++ b/2020/15xxx/CVE-2020-15287.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15287", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15288.json b/2020/15xxx/CVE-2020-15288.json index 3dc4237274e..22d43089af3 100644 --- a/2020/15xxx/CVE-2020-15288.json +++ b/2020/15xxx/CVE-2020-15288.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15288", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15289.json b/2020/15xxx/CVE-2020-15289.json index 32ffabd1bae..6e7d3b839cd 100644 --- a/2020/15xxx/CVE-2020-15289.json +++ b/2020/15xxx/CVE-2020-15289.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15289", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15290.json b/2020/15xxx/CVE-2020-15290.json index 39b4283bfc6..b0cd2f857db 100644 --- a/2020/15xxx/CVE-2020-15290.json +++ b/2020/15xxx/CVE-2020-15290.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15290", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15291.json b/2020/15xxx/CVE-2020-15291.json index fce38452e7c..68f53210b09 100644 --- a/2020/15xxx/CVE-2020-15291.json +++ b/2020/15xxx/CVE-2020-15291.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15291", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15295.json b/2020/15xxx/CVE-2020-15295.json index 547715f7810..81d5bd9c03c 100644 --- a/2020/15xxx/CVE-2020-15295.json +++ b/2020/15xxx/CVE-2020-15295.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15295", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15296.json b/2020/15xxx/CVE-2020-15296.json index 17a94075eb7..b06b60e0bed 100644 --- a/2020/15xxx/CVE-2020-15296.json +++ b/2020/15xxx/CVE-2020-15296.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15296", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15298.json b/2020/15xxx/CVE-2020-15298.json index 61482140566..44483a312bd 100644 --- a/2020/15xxx/CVE-2020-15298.json +++ b/2020/15xxx/CVE-2020-15298.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15298", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15728.json b/2020/15xxx/CVE-2020-15728.json index be19a5f3b75..1223280dd15 100644 --- a/2020/15xxx/CVE-2020-15728.json +++ b/2020/15xxx/CVE-2020-15728.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15728", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15736.json b/2020/15xxx/CVE-2020-15736.json index b85f84fa1ef..7bcc0c162e3 100644 --- a/2020/15xxx/CVE-2020-15736.json +++ b/2020/15xxx/CVE-2020-15736.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15736", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15737.json b/2020/15xxx/CVE-2020-15737.json index 6ff43af9299..9c2cf7a7025 100644 --- a/2020/15xxx/CVE-2020-15737.json +++ b/2020/15xxx/CVE-2020-15737.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15737", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15738.json b/2020/15xxx/CVE-2020-15738.json index 4e0186ad29c..e7630186e19 100644 --- a/2020/15xxx/CVE-2020-15738.json +++ b/2020/15xxx/CVE-2020-15738.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15738", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15740.json b/2020/15xxx/CVE-2020-15740.json index 2b76363c611..623a4d33303 100644 --- a/2020/15xxx/CVE-2020-15740.json +++ b/2020/15xxx/CVE-2020-15740.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15740", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15741.json b/2020/15xxx/CVE-2020-15741.json index 98f89d720d3..4dfe0e5d59d 100644 --- a/2020/15xxx/CVE-2020-15741.json +++ b/2020/15xxx/CVE-2020-15741.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15741", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15743.json b/2020/15xxx/CVE-2020-15743.json index 0fa51f36106..2c1714c9dcc 100644 --- a/2020/15xxx/CVE-2020-15743.json +++ b/2020/15xxx/CVE-2020-15743.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15743", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15745.json b/2020/15xxx/CVE-2020-15745.json index 23d69bd53df..d160de467ab 100644 --- a/2020/15xxx/CVE-2020-15745.json +++ b/2020/15xxx/CVE-2020-15745.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15745", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15746.json b/2020/15xxx/CVE-2020-15746.json index 3c311ca633f..793c9b9d734 100644 --- a/2020/15xxx/CVE-2020-15746.json +++ b/2020/15xxx/CVE-2020-15746.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15746", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15747.json b/2020/15xxx/CVE-2020-15747.json index 8575e9f02d3..d601113b06b 100644 --- a/2020/15xxx/CVE-2020-15747.json +++ b/2020/15xxx/CVE-2020-15747.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15747", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15748.json b/2020/15xxx/CVE-2020-15748.json index add67eb9927..e309efb199a 100644 --- a/2020/15xxx/CVE-2020-15748.json +++ b/2020/15xxx/CVE-2020-15748.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15748", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15749.json b/2020/15xxx/CVE-2020-15749.json index 7aabda25e82..50374e98cb7 100644 --- a/2020/15xxx/CVE-2020-15749.json +++ b/2020/15xxx/CVE-2020-15749.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15749", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15750.json b/2020/15xxx/CVE-2020-15750.json index 6ffe2178f04..05f4d520dc9 100644 --- a/2020/15xxx/CVE-2020-15750.json +++ b/2020/15xxx/CVE-2020-15750.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15750", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15751.json b/2020/15xxx/CVE-2020-15751.json index 834dc771fae..81d1151e150 100644 --- a/2020/15xxx/CVE-2020-15751.json +++ b/2020/15xxx/CVE-2020-15751.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15751", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15752.json b/2020/15xxx/CVE-2020-15752.json index 31fc7c56049..8104ed8e7e7 100644 --- a/2020/15xxx/CVE-2020-15752.json +++ b/2020/15xxx/CVE-2020-15752.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15752", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15753.json b/2020/15xxx/CVE-2020-15753.json index 4872c66df3d..83ed29577cc 100644 --- a/2020/15xxx/CVE-2020-15753.json +++ b/2020/15xxx/CVE-2020-15753.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15753", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15754.json b/2020/15xxx/CVE-2020-15754.json index e48761870a9..2ed3e1c2cc8 100644 --- a/2020/15xxx/CVE-2020-15754.json +++ b/2020/15xxx/CVE-2020-15754.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15754", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15755.json b/2020/15xxx/CVE-2020-15755.json index 0d9c4171feb..e4f968237a1 100644 --- a/2020/15xxx/CVE-2020-15755.json +++ b/2020/15xxx/CVE-2020-15755.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15755", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15756.json b/2020/15xxx/CVE-2020-15756.json index 4e320320cf3..6a905bdcf0f 100644 --- a/2020/15xxx/CVE-2020-15756.json +++ b/2020/15xxx/CVE-2020-15756.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15756", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15757.json b/2020/15xxx/CVE-2020-15757.json index a2d0070f7da..7ef9bac188a 100644 --- a/2020/15xxx/CVE-2020-15757.json +++ b/2020/15xxx/CVE-2020-15757.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15757", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15758.json b/2020/15xxx/CVE-2020-15758.json index 34292953292..f8ad1c5f533 100644 --- a/2020/15xxx/CVE-2020-15758.json +++ b/2020/15xxx/CVE-2020-15758.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15758", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15759.json b/2020/15xxx/CVE-2020-15759.json index ec0bedc73d1..4e25c5d9676 100644 --- a/2020/15xxx/CVE-2020-15759.json +++ b/2020/15xxx/CVE-2020-15759.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15759", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15760.json b/2020/15xxx/CVE-2020-15760.json index a33ac1984ec..8a969f003fb 100644 --- a/2020/15xxx/CVE-2020-15760.json +++ b/2020/15xxx/CVE-2020-15760.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15760", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15761.json b/2020/15xxx/CVE-2020-15761.json index 1f9c67a7951..fee7e5e45dc 100644 --- a/2020/15xxx/CVE-2020-15761.json +++ b/2020/15xxx/CVE-2020-15761.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15761", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15762.json b/2020/15xxx/CVE-2020-15762.json index 092870b81f2..cdced607097 100644 --- a/2020/15xxx/CVE-2020-15762.json +++ b/2020/15xxx/CVE-2020-15762.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15762", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15763.json b/2020/15xxx/CVE-2020-15763.json index ac8e82d5f0a..0177709ba5f 100644 --- a/2020/15xxx/CVE-2020-15763.json +++ b/2020/15xxx/CVE-2020-15763.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15763", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15764.json b/2020/15xxx/CVE-2020-15764.json index a6b518e0b93..0d476072817 100644 --- a/2020/15xxx/CVE-2020-15764.json +++ b/2020/15xxx/CVE-2020-15764.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15764", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15765.json b/2020/15xxx/CVE-2020-15765.json index 62a1728440f..88dfc798be8 100644 --- a/2020/15xxx/CVE-2020-15765.json +++ b/2020/15xxx/CVE-2020-15765.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15765", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/15xxx/CVE-2020-15766.json b/2020/15xxx/CVE-2020-15766.json index f28cc69f2a6..aebd8b9fe1d 100644 --- a/2020/15xxx/CVE-2020-15766.json +++ b/2020/15xxx/CVE-2020-15766.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15766", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } From 20ae89af6f2134a853f180936fb78374a263c51c Mon Sep 17 00:00:00 2001 From: Bogdan Botezatu Date: Wed, 17 Mar 2021 14:28:13 +0200 Subject: [PATCH 389/845] Rejecting unused CVEs in 2020 --- 2020/8xxx/CVE-2020-8106.json | 6 +++--- 2020/8xxx/CVE-2020-8111.json | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/2020/8xxx/CVE-2020-8106.json b/2020/8xxx/CVE-2020-8106.json index 9ebcc49c67a..cbf3448dc84 100644 --- a/2020/8xxx/CVE-2020-8106.json +++ b/2020/8xxx/CVE-2020-8106.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8106", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } diff --git a/2020/8xxx/CVE-2020-8111.json b/2020/8xxx/CVE-2020-8111.json index 2e18b4b1edf..f152e166292 100644 --- a/2020/8xxx/CVE-2020-8111.json +++ b/2020/8xxx/CVE-2020-8111.json @@ -4,14 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8111", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** Unused CVE for 2020." } ] } From eb090e54748e638ba4a97ff9c379ca357759d260 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 13:00:51 +0000 Subject: [PATCH 390/845] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15562.json | 4 +-- 2020/15xxx/CVE-2020-15281.json | 2 +- 2020/15xxx/CVE-2020-15282.json | 2 +- 2020/15xxx/CVE-2020-15285.json | 2 +- 2020/15xxx/CVE-2020-15286.json | 2 +- 2020/15xxx/CVE-2020-15287.json | 2 +- 2020/15xxx/CVE-2020-15288.json | 2 +- 2020/15xxx/CVE-2020-15289.json | 2 +- 2020/15xxx/CVE-2020-15290.json | 2 +- 2020/15xxx/CVE-2020-15291.json | 2 +- 2020/15xxx/CVE-2020-15295.json | 2 +- 2020/15xxx/CVE-2020-15296.json | 2 +- 2020/15xxx/CVE-2020-15298.json | 2 +- 2020/15xxx/CVE-2020-15728.json | 2 +- 2020/15xxx/CVE-2020-15736.json | 2 +- 2020/15xxx/CVE-2020-15737.json | 2 +- 2020/15xxx/CVE-2020-15738.json | 2 +- 2020/15xxx/CVE-2020-15740.json | 2 +- 2020/15xxx/CVE-2020-15741.json | 2 +- 2020/15xxx/CVE-2020-15743.json | 2 +- 2020/15xxx/CVE-2020-15745.json | 2 +- 2020/15xxx/CVE-2020-15746.json | 2 +- 2020/15xxx/CVE-2020-15747.json | 2 +- 2020/15xxx/CVE-2020-15748.json | 2 +- 2020/15xxx/CVE-2020-15749.json | 2 +- 2020/15xxx/CVE-2020-15750.json | 2 +- 2020/15xxx/CVE-2020-15751.json | 2 +- 2020/15xxx/CVE-2020-15752.json | 2 +- 2020/15xxx/CVE-2020-15753.json | 2 +- 2020/15xxx/CVE-2020-15754.json | 2 +- 2020/15xxx/CVE-2020-15755.json | 2 +- 2020/15xxx/CVE-2020-15756.json | 2 +- 2020/15xxx/CVE-2020-15757.json | 2 +- 2020/15xxx/CVE-2020-15758.json | 2 +- 2020/15xxx/CVE-2020-15759.json | 2 +- 2020/15xxx/CVE-2020-15760.json | 2 +- 2020/15xxx/CVE-2020-15761.json | 2 +- 2020/15xxx/CVE-2020-15762.json | 2 +- 2020/15xxx/CVE-2020-15763.json | 2 +- 2020/15xxx/CVE-2020-15764.json | 2 +- 2020/15xxx/CVE-2020-15765.json | 2 +- 2020/15xxx/CVE-2020-15766.json | 2 +- 2020/28xxx/CVE-2020-28873.json | 61 ++++++++++++++++++++++++++++++---- 2020/8xxx/CVE-2020-8106.json | 2 +- 2020/8xxx/CVE-2020-8111.json | 2 +- 2021/27xxx/CVE-2021-27291.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27292.json | 61 ++++++++++++++++++++++++++++++---- 47 files changed, 210 insertions(+), 63 deletions(-) diff --git a/2019/15xxx/CVE-2019-15562.json b/2019/15xxx/CVE-2019-15562.json index de10ff006c2..fe4249d2814 100644 --- a/2019/15xxx/CVE-2019-15562.json +++ b/2019/15xxx/CVE-2019-15562.json @@ -58,9 +58,9 @@ "name": "https://github.com/jinzhu/gorm/releases/tag/v1.9.10" }, { - "url": "https://github.com/jinzhu/gorm/pull/2519", "refsource": "MISC", - "name": "https://github.com/jinzhu/gorm/pull/2519" + "name": "https://github.com/go-gorm/gorm/pull/2519", + "url": "https://github.com/go-gorm/gorm/pull/2519" } ] } diff --git a/2020/15xxx/CVE-2020-15281.json b/2020/15xxx/CVE-2020-15281.json index edfae37a8c7..3e360a5408a 100644 --- a/2020/15xxx/CVE-2020-15281.json +++ b/2020/15xxx/CVE-2020-15281.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15281", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15282.json b/2020/15xxx/CVE-2020-15282.json index 89c70c1a2b0..bde6d8a593f 100644 --- a/2020/15xxx/CVE-2020-15282.json +++ b/2020/15xxx/CVE-2020-15282.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15282", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15285.json b/2020/15xxx/CVE-2020-15285.json index 9dae13c20bc..b3534ab9b5b 100644 --- a/2020/15xxx/CVE-2020-15285.json +++ b/2020/15xxx/CVE-2020-15285.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15285", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15286.json b/2020/15xxx/CVE-2020-15286.json index c32f75196dc..ab8e2e0a3cb 100644 --- a/2020/15xxx/CVE-2020-15286.json +++ b/2020/15xxx/CVE-2020-15286.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15286", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15287.json b/2020/15xxx/CVE-2020-15287.json index 1f1df4e0d00..63e7ff32108 100644 --- a/2020/15xxx/CVE-2020-15287.json +++ b/2020/15xxx/CVE-2020-15287.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15287", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15288.json b/2020/15xxx/CVE-2020-15288.json index 22d43089af3..bbcd630b490 100644 --- a/2020/15xxx/CVE-2020-15288.json +++ b/2020/15xxx/CVE-2020-15288.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15288", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15289.json b/2020/15xxx/CVE-2020-15289.json index 6e7d3b839cd..bb577ddba97 100644 --- a/2020/15xxx/CVE-2020-15289.json +++ b/2020/15xxx/CVE-2020-15289.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15289", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15290.json b/2020/15xxx/CVE-2020-15290.json index b0cd2f857db..9788d225fdd 100644 --- a/2020/15xxx/CVE-2020-15290.json +++ b/2020/15xxx/CVE-2020-15290.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15290", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15291.json b/2020/15xxx/CVE-2020-15291.json index 68f53210b09..808af8ad03a 100644 --- a/2020/15xxx/CVE-2020-15291.json +++ b/2020/15xxx/CVE-2020-15291.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15291", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15295.json b/2020/15xxx/CVE-2020-15295.json index 81d5bd9c03c..42adc2806b7 100644 --- a/2020/15xxx/CVE-2020-15295.json +++ b/2020/15xxx/CVE-2020-15295.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15295", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15296.json b/2020/15xxx/CVE-2020-15296.json index b06b60e0bed..b459a0f734e 100644 --- a/2020/15xxx/CVE-2020-15296.json +++ b/2020/15xxx/CVE-2020-15296.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15296", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15298.json b/2020/15xxx/CVE-2020-15298.json index 44483a312bd..c81f33df6b7 100644 --- a/2020/15xxx/CVE-2020-15298.json +++ b/2020/15xxx/CVE-2020-15298.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15298", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15728.json b/2020/15xxx/CVE-2020-15728.json index 1223280dd15..9113218e842 100644 --- a/2020/15xxx/CVE-2020-15728.json +++ b/2020/15xxx/CVE-2020-15728.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15728", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15736.json b/2020/15xxx/CVE-2020-15736.json index 7bcc0c162e3..e6d4d2eddc6 100644 --- a/2020/15xxx/CVE-2020-15736.json +++ b/2020/15xxx/CVE-2020-15736.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15736", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15737.json b/2020/15xxx/CVE-2020-15737.json index 9c2cf7a7025..b32e5ffdcf1 100644 --- a/2020/15xxx/CVE-2020-15737.json +++ b/2020/15xxx/CVE-2020-15737.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15737", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15738.json b/2020/15xxx/CVE-2020-15738.json index e7630186e19..c01fe11894b 100644 --- a/2020/15xxx/CVE-2020-15738.json +++ b/2020/15xxx/CVE-2020-15738.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15738", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15740.json b/2020/15xxx/CVE-2020-15740.json index 623a4d33303..8908455f015 100644 --- a/2020/15xxx/CVE-2020-15740.json +++ b/2020/15xxx/CVE-2020-15740.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15740", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15741.json b/2020/15xxx/CVE-2020-15741.json index 4dfe0e5d59d..72ca71af103 100644 --- a/2020/15xxx/CVE-2020-15741.json +++ b/2020/15xxx/CVE-2020-15741.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15741", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15743.json b/2020/15xxx/CVE-2020-15743.json index 2c1714c9dcc..ccf065094ac 100644 --- a/2020/15xxx/CVE-2020-15743.json +++ b/2020/15xxx/CVE-2020-15743.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15743", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15745.json b/2020/15xxx/CVE-2020-15745.json index d160de467ab..7b8d41256a4 100644 --- a/2020/15xxx/CVE-2020-15745.json +++ b/2020/15xxx/CVE-2020-15745.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15745", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15746.json b/2020/15xxx/CVE-2020-15746.json index 793c9b9d734..f972f8a3e65 100644 --- a/2020/15xxx/CVE-2020-15746.json +++ b/2020/15xxx/CVE-2020-15746.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15746", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15747.json b/2020/15xxx/CVE-2020-15747.json index d601113b06b..5753a28b9a1 100644 --- a/2020/15xxx/CVE-2020-15747.json +++ b/2020/15xxx/CVE-2020-15747.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15747", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15748.json b/2020/15xxx/CVE-2020-15748.json index e309efb199a..8412ec10687 100644 --- a/2020/15xxx/CVE-2020-15748.json +++ b/2020/15xxx/CVE-2020-15748.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15748", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15749.json b/2020/15xxx/CVE-2020-15749.json index 50374e98cb7..d3cbed01cb3 100644 --- a/2020/15xxx/CVE-2020-15749.json +++ b/2020/15xxx/CVE-2020-15749.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15749", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15750.json b/2020/15xxx/CVE-2020-15750.json index 05f4d520dc9..08e272309ff 100644 --- a/2020/15xxx/CVE-2020-15750.json +++ b/2020/15xxx/CVE-2020-15750.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15750", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15751.json b/2020/15xxx/CVE-2020-15751.json index 81d1151e150..8fb1f52187d 100644 --- a/2020/15xxx/CVE-2020-15751.json +++ b/2020/15xxx/CVE-2020-15751.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15751", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15752.json b/2020/15xxx/CVE-2020-15752.json index 8104ed8e7e7..22c04f0e2c8 100644 --- a/2020/15xxx/CVE-2020-15752.json +++ b/2020/15xxx/CVE-2020-15752.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15752", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15753.json b/2020/15xxx/CVE-2020-15753.json index 83ed29577cc..53b1a0b51bc 100644 --- a/2020/15xxx/CVE-2020-15753.json +++ b/2020/15xxx/CVE-2020-15753.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15753", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15754.json b/2020/15xxx/CVE-2020-15754.json index 2ed3e1c2cc8..f9f501a3283 100644 --- a/2020/15xxx/CVE-2020-15754.json +++ b/2020/15xxx/CVE-2020-15754.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15754", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15755.json b/2020/15xxx/CVE-2020-15755.json index e4f968237a1..c813b18cb51 100644 --- a/2020/15xxx/CVE-2020-15755.json +++ b/2020/15xxx/CVE-2020-15755.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15755", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15756.json b/2020/15xxx/CVE-2020-15756.json index 6a905bdcf0f..66e65a306bf 100644 --- a/2020/15xxx/CVE-2020-15756.json +++ b/2020/15xxx/CVE-2020-15756.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15756", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15757.json b/2020/15xxx/CVE-2020-15757.json index 7ef9bac188a..5d11f54becf 100644 --- a/2020/15xxx/CVE-2020-15757.json +++ b/2020/15xxx/CVE-2020-15757.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15757", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15758.json b/2020/15xxx/CVE-2020-15758.json index f8ad1c5f533..22aeb3ec01e 100644 --- a/2020/15xxx/CVE-2020-15758.json +++ b/2020/15xxx/CVE-2020-15758.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15758", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15759.json b/2020/15xxx/CVE-2020-15759.json index 4e25c5d9676..8646c5f29b3 100644 --- a/2020/15xxx/CVE-2020-15759.json +++ b/2020/15xxx/CVE-2020-15759.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15759", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15760.json b/2020/15xxx/CVE-2020-15760.json index 8a969f003fb..b9c7bd5b60b 100644 --- a/2020/15xxx/CVE-2020-15760.json +++ b/2020/15xxx/CVE-2020-15760.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15760", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15761.json b/2020/15xxx/CVE-2020-15761.json index fee7e5e45dc..e6980108a2a 100644 --- a/2020/15xxx/CVE-2020-15761.json +++ b/2020/15xxx/CVE-2020-15761.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15761", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15762.json b/2020/15xxx/CVE-2020-15762.json index cdced607097..c8a9126ea06 100644 --- a/2020/15xxx/CVE-2020-15762.json +++ b/2020/15xxx/CVE-2020-15762.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15762", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15763.json b/2020/15xxx/CVE-2020-15763.json index 0177709ba5f..bed9d77d38b 100644 --- a/2020/15xxx/CVE-2020-15763.json +++ b/2020/15xxx/CVE-2020-15763.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15763", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15764.json b/2020/15xxx/CVE-2020-15764.json index 0d476072817..16b19ac4762 100644 --- a/2020/15xxx/CVE-2020-15764.json +++ b/2020/15xxx/CVE-2020-15764.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15764", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15765.json b/2020/15xxx/CVE-2020-15765.json index 88dfc798be8..832b81ee99e 100644 --- a/2020/15xxx/CVE-2020-15765.json +++ b/2020/15xxx/CVE-2020-15765.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15765", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/15xxx/CVE-2020-15766.json b/2020/15xxx/CVE-2020-15766.json index aebd8b9fe1d..315c456b82d 100644 --- a/2020/15xxx/CVE-2020-15766.json +++ b/2020/15xxx/CVE-2020-15766.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-15766", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/28xxx/CVE-2020-28873.json b/2020/28xxx/CVE-2020-28873.json index 07a3135657e..646efb07f93 100644 --- a/2020/28xxx/CVE-2020-28873.json +++ b/2020/28xxx/CVE-2020-28873.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28873", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28873", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fluxbb 1.5.11 is affected by a denial of service (DoS) vulnerability by sending an extremely long password via the user login form. When a long password is sent, the password hashing process will result in CPU and memory exhaustion on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://fluxbb.com", + "refsource": "MISC", + "name": "http://fluxbb.com" + }, + { + "refsource": "MISC", + "name": "https://www.acunetix.com/vulnerabilities/web/long-password-denial-of-service/#:~:text=By%20sending%20a%20very%20long,a%20vulnerable%20password%20hashing%20implementation", + "url": "https://www.acunetix.com/vulnerabilities/web/long-password-denial-of-service/#:~:text=By%20sending%20a%20very%20long,a%20vulnerable%20password%20hashing%20implementation" } ] } diff --git a/2020/8xxx/CVE-2020-8106.json b/2020/8xxx/CVE-2020-8106.json index cbf3448dc84..393a139df28 100644 --- a/2020/8xxx/CVE-2020-8106.json +++ b/2020/8xxx/CVE-2020-8106.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8106", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2020/8xxx/CVE-2020-8111.json b/2020/8xxx/CVE-2020-8111.json index f152e166292..5c09539437c 100644 --- a/2020/8xxx/CVE-2020-8111.json +++ b/2020/8xxx/CVE-2020-8111.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8111", - "ASSIGNER": "cve-requests@bitdefender.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { diff --git a/2021/27xxx/CVE-2021-27291.json b/2021/27xxx/CVE-2021-27291.json index b4aa0e69c86..14d0d0e9ea5 100644 --- a/2021/27xxx/CVE-2021-27291.json +++ b/2021/27xxx/CVE-2021-27291.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27291", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27291", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce", + "url": "https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce" + }, + { + "refsource": "MISC", + "name": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14", + "url": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14" } ] } diff --git a/2021/27xxx/CVE-2021-27292.json b/2021/27xxx/CVE-2021-27292.json index dc2c840f829..c7d34245111 100644 --- a/2021/27xxx/CVE-2021-27292.json +++ b/2021/27xxx/CVE-2021-27292.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27292", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27292", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14", + "url": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76", + "url": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76" } ] } From efd52063a4280e5d3b1d9838f7b093252c410346 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 15:00:46 +0000 Subject: [PATCH 391/845] "-Synchronized-Data." --- 2017/12xxx/CVE-2017-12424.json | 5 +++ 2017/20xxx/CVE-2017-20002.json | 5 +++ 2020/13xxx/CVE-2020-13936.json | 5 +++ 2020/14xxx/CVE-2020-14358.json | 4 +-- 2020/35xxx/CVE-2020-35454.json | 61 +++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35455.json | 61 +++++++++++++++++++++++++++++---- 2020/35xxx/CVE-2020-35456.json | 61 +++++++++++++++++++++++++++++---- 2021/20xxx/CVE-2021-20200.json | 4 +-- 2021/28xxx/CVE-2021-28658.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28659.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28660.json | 62 ++++++++++++++++++++++++++++++++++ 11 files changed, 282 insertions(+), 22 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28658.json create mode 100644 2021/28xxx/CVE-2021-28659.json create mode 100644 2021/28xxx/CVE-2021-28660.json diff --git a/2017/12xxx/CVE-2017-12424.json b/2017/12xxx/CVE-2017-12424.json index a393e933027..c5dc7d2f193 100644 --- a/2017/12xxx/CVE-2017-12424.json +++ b/2017/12xxx/CVE-2017-12424.json @@ -71,6 +71,11 @@ "name": "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html" } ] } diff --git a/2017/20xxx/CVE-2017-20002.json b/2017/20xxx/CVE-2017-20002.json index 96b2d96b6d9..6f507e32fe2 100644 --- a/2017/20xxx/CVE-2017-20002.json +++ b/2017/20xxx/CVE-2017-20002.json @@ -61,6 +61,11 @@ "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957", "refsource": "MISC", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json index 6be2192d4f5..98f57a03733 100644 --- a/2020/13xxx/CVE-2020-13936.json +++ b/2020/13xxx/CVE-2020-13936.json @@ -94,6 +94,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20210316 [GitHub] [druid] clintropolis opened a new pull request #11002: suppress CVE check for security fix", "url": "https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd@%3Ccommits.druid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210317 [SECURITY] [DLA 2595-1] velocity security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14358.json b/2020/14xxx/CVE-2020-14358.json index 443868173ff..4bf3d849ac9 100644 --- a/2020/14xxx/CVE-2020-14358.json +++ b/2020/14xxx/CVE-2020-14358.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2020-14358", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2020/35xxx/CVE-2020-35454.json b/2020/35xxx/CVE-2020-35454.json index 985226fd5d9..c9385440535 100644 --- a/2020/35xxx/CVE-2020-35454.json +++ b/2020/35xxx/CVE-2020-35454.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35454", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35454", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from an Android backup because of insecure application configuration." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://play.google.com/store/apps/details?id=com.taidii.diibear&hl=en_US&gl=US", + "refsource": "MISC", + "name": "https://play.google.com/store/apps/details?id=com.taidii.diibear&hl=en_US&gl=US" + }, + { + "refsource": "MISC", + "name": "https://github.com/galapogos/Taidii-Diibear-Vulnerabilities/", + "url": "https://github.com/galapogos/Taidii-Diibear-Vulnerabilities/" } ] } diff --git a/2020/35xxx/CVE-2020-35455.json b/2020/35xxx/CVE-2020-35455.json index 8c74b246fb2..fbce8e9031a 100644 --- a/2020/35xxx/CVE-2020-35455.json +++ b/2020/35xxx/CVE-2020-35455.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35455", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35455", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from Shared Preferences and the SQLite database because of insecure data storage." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://play.google.com/store/apps/details?id=com.taidii.diibear&hl=en_US&gl=US", + "refsource": "MISC", + "name": "https://play.google.com/store/apps/details?id=com.taidii.diibear&hl=en_US&gl=US" + }, + { + "refsource": "MISC", + "name": "https://github.com/galapogos/Taidii-Diibear-Vulnerabilities/", + "url": "https://github.com/galapogos/Taidii-Diibear-Vulnerabilities/" } ] } diff --git a/2020/35xxx/CVE-2020-35456.json b/2020/35xxx/CVE-2020-35456.json index 58e24163904..7ba9c633f3b 100644 --- a/2020/35xxx/CVE-2020-35456.json +++ b/2020/35xxx/CVE-2020-35456.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35456", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35456", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to view private chat messages and media files via logcat because of excessive logging." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://play.google.com/store/apps/details?id=com.taidii.diibear&hl=en_US&gl=US", + "refsource": "MISC", + "name": "https://play.google.com/store/apps/details?id=com.taidii.diibear&hl=en_US&gl=US" + }, + { + "refsource": "MISC", + "name": "https://github.com/galapogos/Taidii-Diibear-Vulnerabilities/", + "url": "https://github.com/galapogos/Taidii-Diibear-Vulnerabilities/" } ] } diff --git a/2021/20xxx/CVE-2021-20200.json b/2021/20xxx/CVE-2021-20200.json index 7458d5e917c..71c54c24518 100644 --- a/2021/20xxx/CVE-2021-20200.json +++ b/2021/20xxx/CVE-2021-20200.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-20200", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2021/28xxx/CVE-2021-28658.json b/2021/28xxx/CVE-2021-28658.json new file mode 100644 index 00000000000..207216fd74d --- /dev/null +++ b/2021/28xxx/CVE-2021-28658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28659.json b/2021/28xxx/CVE-2021-28659.json new file mode 100644 index 00000000000..43f2bc6fa7b --- /dev/null +++ b/2021/28xxx/CVE-2021-28659.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28659", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28660.json b/2021/28xxx/CVE-2021-28660.json new file mode 100644 index 00000000000..7d980815cbe --- /dev/null +++ b/2021/28xxx/CVE-2021-28660.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28660", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7" + } + ] + } +} \ No newline at end of file From 83350631c62ac539f5b55f5c9a3c9eb3f3a5bd79 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 16:00:47 +0000 Subject: [PATCH 392/845] "-Synchronized-Data." --- 2020/17xxx/CVE-2020-17457.json | 56 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27290.json | 5 +++ 2021/28xxx/CVE-2021-28379.json | 5 +++ 2021/3xxx/CVE-2021-3449.json | 18 +++++++++++ 4 files changed, 78 insertions(+), 6 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3449.json diff --git a/2020/17xxx/CVE-2020-17457.json b/2020/17xxx/CVE-2020-17457.json index b44f02e4204..2103eedfcb7 100644 --- a/2020/17xxx/CVE-2020-17457.json +++ b/2020/17xxx/CVE-2020-17457.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-17457", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-17457", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fujitsu ServerView Suite iRMC before 9.62F allows XSS. An authenticated attacker can store an XSS payload in the PSCU_FILE_INIT field of a Save Configuration XML document. The payload is triggered in the HTTP error response pages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" } ] } diff --git a/2021/27xxx/CVE-2021-27290.json b/2021/27xxx/CVE-2021-27290.json index c33bb85c2b2..99b453bb71d 100644 --- a/2021/27xxx/CVE-2021-27290.json +++ b/2021/27xxx/CVE-2021-27290.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf", "url": "https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf" + }, + { + "refsource": "MISC", + "name": "https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf", + "url": "https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf" } ] } diff --git a/2021/28xxx/CVE-2021-28379.json b/2021/28xxx/CVE-2021-28379.json index 01d5757670a..b63d2668e15 100644 --- a/2021/28xxx/CVE-2021-28379.json +++ b/2021/28xxx/CVE-2021-28379.json @@ -56,6 +56,11 @@ "url": "https://github.com/myvesta/vesta/commit/3402071e950e76b79fa8672a1e09b70d3860f355", "refsource": "MISC", "name": "https://github.com/myvesta/vesta/commit/3402071e950e76b79fa8672a1e09b70d3860f355" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161836/VestaCP-0.9.8-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/161836/VestaCP-0.9.8-Cross-Site-Request-Forgery.html" } ] } diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json new file mode 100644 index 00000000000..2ee9c071437 --- /dev/null +++ b/2021/3xxx/CVE-2021-3449.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3449", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From b30dc21a98aa634e4e7f37f4222f2a505659ff50 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 19:00:45 +0000 Subject: [PATCH 393/845] "-Synchronized-Data." --- 2019/18xxx/CVE-2019-18231.json | 67 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18233.json | 67 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18235.json | 67 ++++++++++++++++++++++++++++++++++ 2020/13xxx/CVE-2020-13959.json | 5 +++ 2021/21xxx/CVE-2021-21290.json | 5 +++ 2021/21xxx/CVE-2021-21295.json | 5 +++ 6 files changed, 216 insertions(+) create mode 100644 2019/18xxx/CVE-2019-18231.json create mode 100644 2019/18xxx/CVE-2019-18233.json create mode 100644 2019/18xxx/CVE-2019-18235.json diff --git a/2019/18xxx/CVE-2019-18231.json b/2019/18xxx/CVE-2019-18231.json new file mode 100644 index 00000000000..3043dc5a528 --- /dev/null +++ b/2019/18xxx/CVE-2019-18231.json @@ -0,0 +1,67 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-18231", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Advantech Spectre RT ERT351", + "version": { + "version_data": [ + { + "version_value": "Versions 5.1.3 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03" + }, + { + "refsource": "MISC", + "name": "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", + "url": "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request." + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18233.json b/2019/18xxx/CVE-2019-18233.json new file mode 100644 index 00000000000..b0475dc5968 --- /dev/null +++ b/2019/18xxx/CVE-2019-18233.json @@ -0,0 +1,67 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-18233", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Advantech Spectre RT Industrial Routers ERT351", + "version": { + "version_data": [ + { + "version_value": "5.1.3 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03" + }, + { + "refsource": "MISC", + "name": "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", + "url": "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Advantech Spectre RT Industrial Routers ERT351 5.1.3 and prior, the affected product does not neutralize special characters in the error response, allowing attackers to use a reflected XSS attack." + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18235.json b/2019/18xxx/CVE-2019-18235.json new file mode 100644 index 00000000000..d39e3ef9571 --- /dev/null +++ b/2019/18xxx/CVE-2019-18235.json @@ -0,0 +1,67 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-18235", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Advantech Spectre RT ERT351 Versions 5.1.3 and prior", + "version": { + "version_data": [ + { + "version_value": "Versions 5.1.3 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "IMPROPER RESTRICTION OF EXCESSIVE AUTHENTICATION ATTEMPTS CWE-307" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03" + }, + { + "refsource": "MISC", + "name": "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", + "url": "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Advantech Spectre RT ERT351 Versions 5.1.3 and prior has insufficient login authentication parameters required for the web application may allow an attacker to gain full access using a brute-force password attack." + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13959.json b/2020/13xxx/CVE-2020-13959.json index f77cba28717..8e92427356a 100644 --- a/2020/13xxx/CVE-2020-13959.json +++ b/2020/13xxx/CVE-2020-13959.json @@ -89,6 +89,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210309 CVE-2020-13959: Velocity Tools XSS Vulnerability", "url": "http://www.openwall.com/lists/oss-security/2021/03/10/2" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20210317 [SECURITY] [DLA 2597-1] velocity-tools security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00021.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 8000fdaf91b..54f774e2500 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -171,6 +171,11 @@ "refsource": "MLIST", "name": "[ranger-dev] 20210317 [jira] [Created] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", "url": "https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[ranger-dev] 20210317 [jira] [Assigned] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", + "url": "https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index dfd6c28ee26..6388f9d358c 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[ranger-dev] 20210317 [jira] [Created] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", "url": "https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[ranger-dev] 20210317 [jira] [Assigned] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", + "url": "https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E" } ] }, From df25a2c15e2f8daab832649ebdff8abec792be8f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 20:00:47 +0000 Subject: [PATCH 394/845] "-Synchronized-Data." --- 2020/26xxx/CVE-2020-26238.json | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/2020/26xxx/CVE-2020-26238.json b/2020/26xxx/CVE-2020-26238.json index ab36e7add13..accfd251d95 100644 --- a/2020/26xxx/CVE-2020-26238.json +++ b/2020/26xxx/CVE-2020-26238.json @@ -118,6 +118,21 @@ "refsource": "MLIST", "name": "[hive-issues] 20210317 [jira] [Commented] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", "url": "https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210317 [jira] [Resolved] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210317 [jira] [Work logged] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-gitbox] 20210317 [GitHub] [hive] yongzhi merged pull request #2081: HIVE-24890: Upgrade the cron-utils library from 8.1.1 to 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E" } ] }, From 18815769f2a3d34af4001f17006b2924f25149e5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Mar 2021 21:00:48 +0000 Subject: [PATCH 395/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26886.json | 5 +++++ 2021/26xxx/CVE-2021-26889.json | 5 +++++ 2021/26xxx/CVE-2021-26892.json | 5 +++++ 2021/26xxx/CVE-2021-26900.json | 5 +++++ 2021/27xxx/CVE-2021-27053.json | 5 +++++ 2021/27xxx/CVE-2021-27056.json | 5 +++++ 2021/27xxx/CVE-2021-27057.json | 5 +++++ 2021/27xxx/CVE-2021-27070.json | 5 +++++ 8 files changed, 40 insertions(+) diff --git a/2021/26xxx/CVE-2021-26886.json b/2021/26xxx/CVE-2021-26886.json index 1badac3d695..cef977e99c5 100644 --- a/2021/26xxx/CVE-2021-26886.json +++ b/2021/26xxx/CVE-2021-26886.json @@ -243,6 +243,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-327/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-327/" } ] } diff --git a/2021/26xxx/CVE-2021-26889.json b/2021/26xxx/CVE-2021-26889.json index 68f87187f45..e6aac1a15a9 100644 --- a/2021/26xxx/CVE-2021-26889.json +++ b/2021/26xxx/CVE-2021-26889.json @@ -204,6 +204,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-328/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-328/" } ] } diff --git a/2021/26xxx/CVE-2021-26892.json b/2021/26xxx/CVE-2021-26892.json index 166328f1a0f..53d1a463bac 100644 --- a/2021/26xxx/CVE-2021-26892.json +++ b/2021/26xxx/CVE-2021-26892.json @@ -216,6 +216,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-330/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-330/" } ] } diff --git a/2021/26xxx/CVE-2021-26900.json b/2021/26xxx/CVE-2021-26900.json index 45752091b9d..7b9fb6fe3ff 100644 --- a/2021/26xxx/CVE-2021-26900.json +++ b/2021/26xxx/CVE-2021-26900.json @@ -166,6 +166,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-331/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-331/" } ] } diff --git a/2021/27xxx/CVE-2021-27053.json b/2021/27xxx/CVE-2021-27053.json index 42dd29055d7..3685b884076 100644 --- a/2021/27xxx/CVE-2021-27053.json +++ b/2021/27xxx/CVE-2021-27053.json @@ -127,6 +127,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-332/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-332/" } ] } diff --git a/2021/27xxx/CVE-2021-27056.json b/2021/27xxx/CVE-2021-27056.json index a3b1cda08ee..9baef270aff 100644 --- a/2021/27xxx/CVE-2021-27056.json +++ b/2021/27xxx/CVE-2021-27056.json @@ -107,6 +107,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27056", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27056" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-333/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-333/" } ] } diff --git a/2021/27xxx/CVE-2021-27057.json b/2021/27xxx/CVE-2021-27057.json index d018fd1f9df..0cd0f9a9fc5 100644 --- a/2021/27xxx/CVE-2021-27057.json +++ b/2021/27xxx/CVE-2021-27057.json @@ -151,6 +151,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27057", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27057" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-334/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-334/" } ] } diff --git a/2021/27xxx/CVE-2021-27070.json b/2021/27xxx/CVE-2021-27070.json index a45a8ae12c0..65d3ee5f3ca 100644 --- a/2021/27xxx/CVE-2021-27070.json +++ b/2021/27xxx/CVE-2021-27070.json @@ -126,6 +126,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-329/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-329/" } ] } From f83baa060778ce59913302aab8af18840d4ed0bb Mon Sep 17 00:00:00 2001 From: Ikuya Fukumoto Date: Thu, 18 Mar 2021 09:42:28 +0900 Subject: [PATCH 396/845] JPCERT/CC 2021-03-18-09-41 --- 2021/20xxx/CVE-2021-20624.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20625.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20626.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20627.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20628.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20629.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20630.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20631.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20632.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20633.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20634.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20675.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20676.json | 50 ++++++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20678.json | 53 ++++++++++++++++++++++++++++++++-- 14 files changed, 661 insertions(+), 42 deletions(-) diff --git a/2021/20xxx/CVE-2021-20624.json b/2021/20xxx/CVE-2021-20624.json index f2fac8de2e5..22a553f9033 100644 --- a/2021/20xxx/CVE-2021-20624.json +++ b/2021/20xxx/CVE-2021-20624.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20624", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36866/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.4 allows an authenticated attacker to bypass access restriction and alter the data of Scheduler via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20625.json b/2021/20xxx/CVE-2021-20625.json index f4b341b7552..cb10984ed13 100644 --- a/2021/20xxx/CVE-2021-20625.json +++ b/2021/20xxx/CVE-2021-20625.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20625", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36874/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Bulletin Board of Cybozu Office 10.0.0 to 10.8.4 allows an authenticated attacker to bypass access restriction and alter the data of Bulletin Board via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20626.json b/2021/20xxx/CVE-2021-20626.json index 70b2ae35c4f..44e99d123d8 100644 --- a/2021/20xxx/CVE-2021-20626.json +++ b/2021/20xxx/CVE-2021-20626.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36864/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Workflow of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and alter the data of Workflow via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20627.json b/2021/20xxx/CVE-2021-20627.json index ed862801cf4..f975ec9cc1a 100644 --- a/2021/20xxx/CVE-2021-20627.json +++ b/2021/20xxx/CVE-2021-20627.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20627", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36873/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in Address Book of Cybozu Office 10.0.0 to 10.8.4 allows remote attackers to inject an arbitrary script via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20628.json b/2021/20xxx/CVE-2021-20628.json index f5fbf339f72..88933f0d769 100644 --- a/2021/20xxx/CVE-2021-20628.json +++ b/2021/20xxx/CVE-2021-20628.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20628", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36868/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in Address Book of Cybozu Office 10.0.0 to 10.8.4 allows remote attackers to inject an arbitrary script via unspecified vectors. Note that this vulnerability occurs only when using Mozilla Firefox." } ] } diff --git a/2021/20xxx/CVE-2021-20629.json b/2021/20xxx/CVE-2021-20629.json index 7f47822000f..f9765cc0989 100644 --- a/2021/20xxx/CVE-2021-20629.json +++ b/2021/20xxx/CVE-2021-20629.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20629", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36867/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site scripting vulnerability in E-mail of Cybozu Office 10.0.0 to 10.8.4 allows remote attackers to inject an arbitrary script via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20630.json b/2021/20xxx/CVE-2021-20630.json index 091ad01faeb..840e6de4b84 100644 --- a/2021/20xxx/CVE-2021-20630.json +++ b/2021/20xxx/CVE-2021-20630.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20630", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36872/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Phone Messages of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and obtain the data of Phone Messages via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20631.json b/2021/20xxx/CVE-2021-20631.json index 8b162969e5b..0580b31af05 100644 --- a/2021/20xxx/CVE-2021-20631.json +++ b/2021/20xxx/CVE-2021-20631.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20631", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36871/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper input validation vulnerability in Custom App of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attacker to alter the data of Custom App via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20632.json b/2021/20xxx/CVE-2021-20632.json index d76cca893cc..5aa92e0e244 100644 --- a/2021/20xxx/CVE-2021-20632.json +++ b/2021/20xxx/CVE-2021-20632.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20632", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36870/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Bulletin Board of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and obtain the data of Bulletin Board via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20633.json b/2021/20xxx/CVE-2021-20633.json index 457f15d43e6..e5d5ad7fba1 100644 --- a/2021/20xxx/CVE-2021-20633.json +++ b/2021/20xxx/CVE-2021-20633.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20633", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36869/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Cabinet of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and obtain the date of Cabinet via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20634.json b/2021/20xxx/CVE-2021-20634.json index 11c96df3e54..3da853ee0be 100644 --- a/2021/20xxx/CVE-2021-20634.json +++ b/2021/20xxx/CVE-2021-20634.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20634", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cybozu, Inc.", + "product": { + "product_data": [ + { + "product_name": "Cybozu Office", + "version": { + "version_data": [ + { + "version_value": "10.0.0 to 10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.cybozu.support/article/36865/" + }, + { + "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control vulnerability in Custom App of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and obtain the date of Custom App via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20675.json b/2021/20xxx/CVE-2021-20675.json index 3f7dc9bd6ce..04ee60055d3 100644 --- a/2021/20xxx/CVE-2021-20675.json +++ b/2021/20xxx/CVE-2021-20675.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20675", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "M-System Co., Ltd.", + "product": { + "product_data": [ + { + "product_name": "M-System DL8 series", + "version": { + "version_data": [ + { + "version_value": "type A (DL8-A) versions prior to Ver3.0, type B (DL8-B) versions prior to Ver3.0, type C (DL8-C) versions prior to Ver3.0, type D (DL8-D) versions prior to Ver3.0, and type E (DL8-E) versions prior to Ver3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial-of-service (DoS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN47497535/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "M-System DL8 series (type A (DL8-A) versions prior to Ver3.0, type B (DL8-B) versions prior to Ver3.0, type C (DL8-C) versions prior to Ver3.0, type D (DL8-D) versions prior to Ver3.0, and type E (DL8-E) versions prior to Ver3.0) allows remote authenticated attackers to cause a denial of service (DoS) condition via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20676.json b/2021/20xxx/CVE-2021-20676.json index 5ef9d246cf3..556ed126b8b 100644 --- a/2021/20xxx/CVE-2021-20676.json +++ b/2021/20xxx/CVE-2021-20676.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20676", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "M-System Co., Ltd.", + "product": { + "product_data": [ + { + "product_name": "M-System DL8 series", + "version": { + "version_data": [ + { + "version_value": "type A (DL8-A) versions prior to Ver3.0, type B (DL8-B) versions prior to Ver3.0, type C (DL8-C) versions prior to Ver3.0, type D (DL8-D) versions prior to Ver3.0, and type E (DL8-E) versions prior to Ver3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN47497535/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "M-System DL8 series (type A (DL8-A) versions prior to Ver3.0, type B (DL8-B) versions prior to Ver3.0, type C (DL8-C) versions prior to Ver3.0, type D (DL8-D) versions prior to Ver3.0, and type E (DL8-E) versions prior to Ver3.0) allows remote authenticated attackers to bypass access restriction and conduct prohibited operations via unspecified vectors." } ] } diff --git a/2021/20xxx/CVE-2021-20678.json b/2021/20xxx/CVE-2021-20678.json index 0296763997d..652c81eac2c 100644 --- a/2021/20xxx/CVE-2021-20678.json +++ b/2021/20xxx/CVE-2021-20678.json @@ -4,14 +4,61 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20678", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Stranger Studios", + "product": { + "product_data": [ + { + "product_name": "Paid Memberships Pro", + "version": { + "version_data": [ + { + "version_value": "versions prior to 2.5.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/" + }, + { + "url": "https://wordpress.org/plugins/paid-memberships-pro/" + }, + { + "url": "https://jvn.jp/en/jp/JVN08191557/index.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL injection vulnerability in the Paid Memberships Pro versions prior to 2.5.6 allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors." } ] } From bd4e86e5da6bb5418f92b21c2631958c6b983a28 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 01:00:54 +0000 Subject: [PATCH 397/845] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20624.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20625.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20626.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20627.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20628.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20629.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20630.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20631.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20632.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20633.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20634.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20675.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20676.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20678.json | 15 +++++++++++---- 14 files changed, 115 insertions(+), 43 deletions(-) diff --git a/2021/20xxx/CVE-2021-20624.json b/2021/20xxx/CVE-2021-20624.json index 22a553f9033..4ac1f22fef3 100644 --- a/2021/20xxx/CVE-2021-20624.json +++ b/2021/20xxx/CVE-2021-20624.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20624", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36866/" + "url": "https://kb.cybozu.support/article/36866/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36866/" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20625.json b/2021/20xxx/CVE-2021-20625.json index cb10984ed13..ce4ab334c0e 100644 --- a/2021/20xxx/CVE-2021-20625.json +++ b/2021/20xxx/CVE-2021-20625.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20625", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36874/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36874/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36874/" } ] }, diff --git a/2021/20xxx/CVE-2021-20626.json b/2021/20xxx/CVE-2021-20626.json index 44e99d123d8..a6e83995248 100644 --- a/2021/20xxx/CVE-2021-20626.json +++ b/2021/20xxx/CVE-2021-20626.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20626", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36864/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36864/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36864/" } ] }, diff --git a/2021/20xxx/CVE-2021-20627.json b/2021/20xxx/CVE-2021-20627.json index f975ec9cc1a..af33a2fda04 100644 --- a/2021/20xxx/CVE-2021-20627.json +++ b/2021/20xxx/CVE-2021-20627.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20627", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36873/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36873/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36873/" } ] }, diff --git a/2021/20xxx/CVE-2021-20628.json b/2021/20xxx/CVE-2021-20628.json index 88933f0d769..8cca753c91c 100644 --- a/2021/20xxx/CVE-2021-20628.json +++ b/2021/20xxx/CVE-2021-20628.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20628", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36868/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36868/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36868/" } ] }, diff --git a/2021/20xxx/CVE-2021-20629.json b/2021/20xxx/CVE-2021-20629.json index f9765cc0989..d8c5ebf418e 100644 --- a/2021/20xxx/CVE-2021-20629.json +++ b/2021/20xxx/CVE-2021-20629.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20629", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36867/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36867/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36867/" } ] }, diff --git a/2021/20xxx/CVE-2021-20630.json b/2021/20xxx/CVE-2021-20630.json index 840e6de4b84..72bf0c3614c 100644 --- a/2021/20xxx/CVE-2021-20630.json +++ b/2021/20xxx/CVE-2021-20630.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20630", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36872/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36872/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36872/" } ] }, diff --git a/2021/20xxx/CVE-2021-20631.json b/2021/20xxx/CVE-2021-20631.json index 0580b31af05..1e13fe049fe 100644 --- a/2021/20xxx/CVE-2021-20631.json +++ b/2021/20xxx/CVE-2021-20631.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20631", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36871/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36871/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36871/" } ] }, diff --git a/2021/20xxx/CVE-2021-20632.json b/2021/20xxx/CVE-2021-20632.json index 5aa92e0e244..0c35b1d3d57 100644 --- a/2021/20xxx/CVE-2021-20632.json +++ b/2021/20xxx/CVE-2021-20632.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20632", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36870/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36870/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36870/" } ] }, diff --git a/2021/20xxx/CVE-2021-20633.json b/2021/20xxx/CVE-2021-20633.json index e5d5ad7fba1..129ab6c3b02 100644 --- a/2021/20xxx/CVE-2021-20633.json +++ b/2021/20xxx/CVE-2021-20633.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20633", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36869/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36869/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36869/" } ] }, diff --git a/2021/20xxx/CVE-2021-20634.json b/2021/20xxx/CVE-2021-20634.json index 3da853ee0be..f75708315dc 100644 --- a/2021/20xxx/CVE-2021-20634.json +++ b/2021/20xxx/CVE-2021-20634.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20634", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36865/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36865/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36865/" } ] }, diff --git a/2021/20xxx/CVE-2021-20675.json b/2021/20xxx/CVE-2021-20675.json index 04ee60055d3..61f95fbea48 100644 --- a/2021/20xxx/CVE-2021-20675.json +++ b/2021/20xxx/CVE-2021-20675.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20675", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" + "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html", + "refsource": "MISC", + "name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" }, { - "url": "https://jvn.jp/en/jp/JVN47497535/index.html" + "url": "https://jvn.jp/en/jp/JVN47497535/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN47497535/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20676.json b/2021/20xxx/CVE-2021-20676.json index 556ed126b8b..860de9ecd9e 100644 --- a/2021/20xxx/CVE-2021-20676.json +++ b/2021/20xxx/CVE-2021-20676.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20676", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" + "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html", + "refsource": "MISC", + "name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" }, { - "url": "https://jvn.jp/en/jp/JVN47497535/index.html" + "url": "https://jvn.jp/en/jp/JVN47497535/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN47497535/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20678.json b/2021/20xxx/CVE-2021-20678.json index 652c81eac2c..87009119482 100644 --- a/2021/20xxx/CVE-2021-20678.json +++ b/2021/20xxx/CVE-2021-20678.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20678", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/" + "url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/", + "refsource": "MISC", + "name": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/" }, { - "url": "https://wordpress.org/plugins/paid-memberships-pro/" + "url": "https://wordpress.org/plugins/paid-memberships-pro/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/paid-memberships-pro/" }, { - "url": "https://jvn.jp/en/jp/JVN08191557/index.html" + "url": "https://jvn.jp/en/jp/JVN08191557/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN08191557/index.html" } ] }, From 2f4b4c4c747d20802029b65108fad69f8381d93d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 02:00:48 +0000 Subject: [PATCH 398/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28661.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28662.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28663.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28664.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28665.json | 18 ++++++++++++++++++ 5 files changed, 90 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28661.json create mode 100644 2021/28xxx/CVE-2021-28662.json create mode 100644 2021/28xxx/CVE-2021-28663.json create mode 100644 2021/28xxx/CVE-2021-28664.json create mode 100644 2021/28xxx/CVE-2021-28665.json diff --git a/2021/28xxx/CVE-2021-28661.json b/2021/28xxx/CVE-2021-28661.json new file mode 100644 index 00000000000..e44f5426804 --- /dev/null +++ b/2021/28xxx/CVE-2021-28661.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28661", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28662.json b/2021/28xxx/CVE-2021-28662.json new file mode 100644 index 00000000000..dc172e2f1b0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28662.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28662", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28663.json b/2021/28xxx/CVE-2021-28663.json new file mode 100644 index 00000000000..80a4cf5222f --- /dev/null +++ b/2021/28xxx/CVE-2021-28663.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28663", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28664.json b/2021/28xxx/CVE-2021-28664.json new file mode 100644 index 00000000000..a4e22323332 --- /dev/null +++ b/2021/28xxx/CVE-2021-28664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28665.json b/2021/28xxx/CVE-2021-28665.json new file mode 100644 index 00000000000..94e30fd37ef --- /dev/null +++ b/2021/28xxx/CVE-2021-28665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 81fe641fac12e60ea29d7ffc15f2d0c98654f593 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 03:00:46 +0000 Subject: [PATCH 399/845] "-Synchronized-Data." --- 2020/5xxx/CVE-2020-5398.json | 15 ++++++++ 2021/28xxx/CVE-2021-28666.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28667.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28668.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28669.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28670.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28671.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28672.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28673.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28674.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28675.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28676.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28677.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28678.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28679.json | 18 ++++++++++ 15 files changed, 311 insertions(+) create mode 100644 2021/28xxx/CVE-2021-28666.json create mode 100644 2021/28xxx/CVE-2021-28667.json create mode 100644 2021/28xxx/CVE-2021-28668.json create mode 100644 2021/28xxx/CVE-2021-28669.json create mode 100644 2021/28xxx/CVE-2021-28670.json create mode 100644 2021/28xxx/CVE-2021-28671.json create mode 100644 2021/28xxx/CVE-2021-28672.json create mode 100644 2021/28xxx/CVE-2021-28673.json create mode 100644 2021/28xxx/CVE-2021-28674.json create mode 100644 2021/28xxx/CVE-2021-28675.json create mode 100644 2021/28xxx/CVE-2021-28676.json create mode 100644 2021/28xxx/CVE-2021-28677.json create mode 100644 2021/28xxx/CVE-2021-28678.json create mode 100644 2021/28xxx/CVE-2021-28679.json diff --git a/2020/5xxx/CVE-2020-5398.json b/2020/5xxx/CVE-2020-5398.json index 2037fd75475..49f7e5e8fe0 100644 --- a/2020/5xxx/CVE-2020-5398.json +++ b/2020/5xxx/CVE-2020-5398.json @@ -248,6 +248,21 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E", "url": "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398", + "url": "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E" } ] }, diff --git a/2021/28xxx/CVE-2021-28666.json b/2021/28xxx/CVE-2021-28666.json new file mode 100644 index 00000000000..3fa2e47f6db --- /dev/null +++ b/2021/28xxx/CVE-2021-28666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28667.json b/2021/28xxx/CVE-2021-28667.json new file mode 100644 index 00000000000..52cd34e0a7a --- /dev/null +++ b/2021/28xxx/CVE-2021-28667.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28667", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://stackstorm.com/2021/03/10/stackstorm-v3-4-1-security-fix/", + "refsource": "MISC", + "name": "https://stackstorm.com/2021/03/10/stackstorm-v3-4-1-security-fix/" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28668.json b/2021/28xxx/CVE-2021-28668.json new file mode 100644 index 00000000000..ae2c3411bf2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28669.json b/2021/28xxx/CVE-2021-28669.json new file mode 100644 index 00000000000..d947d41a654 --- /dev/null +++ b/2021/28xxx/CVE-2021-28669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28670.json b/2021/28xxx/CVE-2021-28670.json new file mode 100644 index 00000000000..df202de7d95 --- /dev/null +++ b/2021/28xxx/CVE-2021-28670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28671.json b/2021/28xxx/CVE-2021-28671.json new file mode 100644 index 00000000000..128f51a6f02 --- /dev/null +++ b/2021/28xxx/CVE-2021-28671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28672.json b/2021/28xxx/CVE-2021-28672.json new file mode 100644 index 00000000000..57176a3f9c5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28673.json b/2021/28xxx/CVE-2021-28673.json new file mode 100644 index 00000000000..07ca33b3e76 --- /dev/null +++ b/2021/28xxx/CVE-2021-28673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28674.json b/2021/28xxx/CVE-2021-28674.json new file mode 100644 index 00000000000..d26124215de --- /dev/null +++ b/2021/28xxx/CVE-2021-28674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28675.json b/2021/28xxx/CVE-2021-28675.json new file mode 100644 index 00000000000..8615c564400 --- /dev/null +++ b/2021/28xxx/CVE-2021-28675.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28675", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28676.json b/2021/28xxx/CVE-2021-28676.json new file mode 100644 index 00000000000..b33b7754f8b --- /dev/null +++ b/2021/28xxx/CVE-2021-28676.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28676", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28677.json b/2021/28xxx/CVE-2021-28677.json new file mode 100644 index 00000000000..fc1f7d3b6c1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28677.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28677", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28678.json b/2021/28xxx/CVE-2021-28678.json new file mode 100644 index 00000000000..f675cd5aa03 --- /dev/null +++ b/2021/28xxx/CVE-2021-28678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28679.json b/2021/28xxx/CVE-2021-28679.json new file mode 100644 index 00000000000..f4efe347c45 --- /dev/null +++ b/2021/28xxx/CVE-2021-28679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 84f814633fdcbb53e29709adb998d3161954eb88 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 04:00:47 +0000 Subject: [PATCH 400/845] "-Synchronized-Data." --- 2017/20xxx/CVE-2017-20002.json | 2 +- 2021/28xxx/CVE-2021-28680.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28681.json | 62 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28682.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28683.json | 18 ++++++++++ 2021/28xxx/CVE-2021-28684.json | 18 ++++++++++ 6 files changed, 135 insertions(+), 1 deletion(-) create mode 100644 2021/28xxx/CVE-2021-28680.json create mode 100644 2021/28xxx/CVE-2021-28681.json create mode 100644 2021/28xxx/CVE-2021-28682.json create mode 100644 2021/28xxx/CVE-2021-28683.json create mode 100644 2021/28xxx/CVE-2021-28684.json diff --git a/2017/20xxx/CVE-2017-20002.json b/2017/20xxx/CVE-2017-20002.json index 6f507e32fe2..9affac720de 100644 --- a/2017/20xxx/CVE-2017-20002.json +++ b/2017/20xxx/CVE-2017-20002.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The Debian shadow package before 4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges." + "value": "The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges." } ] }, diff --git a/2021/28xxx/CVE-2021-28680.json b/2021/28xxx/CVE-2021-28680.json new file mode 100644 index 00000000000..91db2c398b1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28680.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28680", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28681.json b/2021/28xxx/CVE-2021-28681.json new file mode 100644 index 00000000000..b558892c735 --- /dev/null +++ b/2021/28xxx/CVE-2021-28681.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28681", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pion/webrtc/issues/1708", + "refsource": "MISC", + "name": "https://github.com/pion/webrtc/issues/1708" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28682.json b/2021/28xxx/CVE-2021-28682.json new file mode 100644 index 00000000000..6aed2e24abc --- /dev/null +++ b/2021/28xxx/CVE-2021-28682.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28682", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28683.json b/2021/28xxx/CVE-2021-28683.json new file mode 100644 index 00000000000..7f6cf36227e --- /dev/null +++ b/2021/28xxx/CVE-2021-28683.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28683", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28684.json b/2021/28xxx/CVE-2021-28684.json new file mode 100644 index 00000000000..d9c1dd6fe30 --- /dev/null +++ b/2021/28xxx/CVE-2021-28684.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28684", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 619d5ffd2c4e300b9af95cbd80cc4677616bfbe3 Mon Sep 17 00:00:00 2001 From: unknown Date: Thu, 18 Mar 2021 12:28:49 +0800 Subject: [PATCH 401/845] Add TWCERT/CC CVE-2021-22848 --- 2021/22xxx/CVE-2021-22848.json | 94 +++++++++++++++++++++++++++++++--- 1 file changed, 88 insertions(+), 6 deletions(-) diff --git a/2021/22xxx/CVE-2021-22848.json b/2021/22xxx/CVE-2021-22848.json index fbe91b99a1c..da79c7d2b9b 100644 --- a/2021/22xxx/CVE-2021-22848.json +++ b/2021/22xxx/CVE-2021-22848.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2021-03-18T04:30:00.000Z", "ID": "CVE-2021-22848", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "HGiga MailSherlock - SQL Injection-2" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "MailSherlock MSR45/SSR45", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "iSherlock-user-4.5", + "version_value": "120" + }, + { + "version_affected": "<", + "version_name": "iSherlock-antispam-4.5", + "version_value": "133" + } + ] + } + } + ] + }, + "vendor_name": "HGiga" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HGiga MailSherlock contains a SQL Injection. Remote attackers can inject SQL syntax and execute SQL commands in a URL parameter of email pages without privilege." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-4521-a4fd8-1.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "MailSherlock MSR45/SSR45\nModule: iSherlock-user-4.5-120.i386.rpm and iSherlock-antispam-4.5-133.i386.rpm" + } + ], + "source": { + "advisory": "TVN-202101012", + "discovery": "EXTERNAL" } } \ No newline at end of file From 0293413144be99613840021756a86fd32fab85e4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 05:00:49 +0000 Subject: [PATCH 402/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21295.json | 10 ++++++ 2021/22xxx/CVE-2021-22848.json | 5 +-- 2021/28xxx/CVE-2021-28685.json | 18 +++++++++++ 2021/28xxx/CVE-2021-28686.json | 18 +++++++++++ 2021/3xxx/CVE-2021-3141.json | 56 ++++++++++++++++++++++++++++++---- 5 files changed, 99 insertions(+), 8 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28685.json create mode 100644 2021/28xxx/CVE-2021-28686.json diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index 6388f9d358c..754dc455741 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -93,6 +93,16 @@ "refsource": "MLIST", "name": "[ranger-dev] 20210317 [jira] [Assigned] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295", "url": "https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E" } ] }, diff --git a/2021/22xxx/CVE-2021-22848.json b/2021/22xxx/CVE-2021-22848.json index da79c7d2b9b..e4c8c325750 100644 --- a/2021/22xxx/CVE-2021-22848.json +++ b/2021/22xxx/CVE-2021-22848.json @@ -82,8 +82,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-4521-a4fd8-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-4521-a4fd8-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-4521-a4fd8-1.html" } ] }, diff --git a/2021/28xxx/CVE-2021-28685.json b/2021/28xxx/CVE-2021-28685.json new file mode 100644 index 00000000000..0d4452f8bb8 --- /dev/null +++ b/2021/28xxx/CVE-2021-28685.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28685", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28686.json b/2021/28xxx/CVE-2021-28686.json new file mode 100644 index 00000000000..32507a496ae --- /dev/null +++ b/2021/28xxx/CVE-2021-28686.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28686", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3141.json b/2021/3xxx/CVE-2021-3141.json index 1fe0dbe65b8..73119920c5e 100644 --- a/2021/3xxx/CVE-2021-3141.json +++ b/2021/3xxx/CVE-2021-3141.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-3141", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-3141", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=62", + "url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=62" } ] } From 42a91b983a796ba1a15e92b14f7b362ce02785a6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 06:00:46 +0000 Subject: [PATCH 403/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21367.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/21xxx/CVE-2021-21367.json b/2021/21xxx/CVE-2021-21367.json index b2314a1225d..bf89dec891c 100644 --- a/2021/21xxx/CVE-2021-21367.json +++ b/2021/21xxx/CVE-2021-21367.json @@ -88,6 +88,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-3dedd41a06", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7TCGM4B45VLUJDCE5PHFYA5KBNHD4RA/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-7d55c00267", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV7WKO5SZHTF3QEMX4WZ576HRECIG6VQ/" } ] }, From 196d592598ba6cf0310dea79b25bed754e645e59 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 07:00:47 +0000 Subject: [PATCH 404/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13959.json | 5 +++++ 2021/21xxx/CVE-2021-21295.json | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/2020/13xxx/CVE-2020-13959.json b/2020/13xxx/CVE-2020-13959.json index 8e92427356a..cffa3f3465d 100644 --- a/2020/13xxx/CVE-2020-13959.json +++ b/2020/13xxx/CVE-2020-13959.json @@ -94,6 +94,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210317 [SECURITY] [DLA 2597-1] velocity-tools security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00021.html" + }, + { + "refsource": "MLIST", + "name": "[velocity-user] 20210318 Re: CVE-2020-13959: Velocity Tools XSS Vulnerability", + "url": "https://lists.apache.org/thread.html/r97edad0655770342d2d36620fb1de50b142fcd6c4f5c53dd72ca41d7@%3Cuser.velocity.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index 754dc455741..b36c4394d5d 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -103,6 +103,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E", "url": "https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E" } ] }, From 5132362d5910d13edab500ba270a4fe5a17dd935 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 08:00:45 +0000 Subject: [PATCH 405/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21295.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index b36c4394d5d..e012501433f 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -108,6 +108,11 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E", "url": "https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E" } ] }, From 50a91d072fbebca6e74db65ba5d9c758d424f311 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 09:00:43 +0000 Subject: [PATCH 406/845] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10172.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/2019/10xxx/CVE-2019-10172.json b/2019/10xxx/CVE-2019-10172.json index 4d6adeb5441..c412de61c81 100644 --- a/2019/10xxx/CVE-2019-10172.json +++ b/2019/10xxx/CVE-2019-10172.json @@ -133,6 +133,11 @@ "refsource": "MLIST", "name": "[spark-issues] 20210223 [jira] [Created] (SPARK-34511) Current Security vulnerabilities in spark libraries", "url": "https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-user] 20210317 jackson-mapper-asl vulnerability at Hadoop", + "url": "https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E" } ] }, From c0d3da9fb2b4e5b71f6bb55e648ecf1e94d73c70 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 12:00:53 +0000 Subject: [PATCH 407/845] "-Synchronized-Data." --- 2021/28xxx/CVE-2021-28417.json | 56 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28418.json | 56 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28419.json | 56 ++++++++++++++++++++++++++++++---- 2021/28xxx/CVE-2021-28420.json | 56 ++++++++++++++++++++++++++++++---- 4 files changed, 200 insertions(+), 24 deletions(-) diff --git a/2021/28xxx/CVE-2021-28417.json b/2021/28xxx/CVE-2021-28417.json index 6da23e6a2e0..3c4c5af680a 100644 --- a/2021/28xxx/CVE-2021-28417.json +++ b/2021/28xxx/CVE-2021-28417.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28417", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28417", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php and the \"search_name\" parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/seopanel/Seo-Panel/issues/208", + "refsource": "MISC", + "name": "https://github.com/seopanel/Seo-Panel/issues/208" } ] } diff --git a/2021/28xxx/CVE-2021-28418.json b/2021/28xxx/CVE-2021-28418.json index ab4a6118b82..3038c272a8e 100644 --- a/2021/28xxx/CVE-2021-28418.json +++ b/2021/28xxx/CVE-2021-28418.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28418", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28418", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via settings.php and the \"category\" parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/seopanel/Seo-Panel/issues/207", + "refsource": "MISC", + "name": "https://github.com/seopanel/Seo-Panel/issues/207" } ] } diff --git a/2021/28xxx/CVE-2021-28419.json b/2021/28xxx/CVE-2021-28419.json index c7557b48a39..88a74123d2d 100644 --- a/2021/28xxx/CVE-2021-28419.json +++ b/2021/28xxx/CVE-2021-28419.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28419", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28419", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The \"order_col\" parameter in archive.php of SEO Panel 4.8.0 is vulnerable to time-based blind SQL injection, which leads to the ability to retrieve all databases." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/seopanel/Seo-Panel/issues/209", + "refsource": "MISC", + "name": "https://github.com/seopanel/Seo-Panel/issues/209" } ] } diff --git a/2021/28xxx/CVE-2021-28420.json b/2021/28xxx/CVE-2021-28420.json index 1611d97360b..b1b27c3d32f 100644 --- a/2021/28xxx/CVE-2021-28420.json +++ b/2021/28xxx/CVE-2021-28420.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28420", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28420", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via alerts.php and the \"from_time\" parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/seopanel/Seo-Panel/issues/206", + "refsource": "MISC", + "name": "https://github.com/seopanel/Seo-Panel/issues/206" } ] } From 54c5856cab5e50b71ec97ada2f2630898d4f6957 Mon Sep 17 00:00:00 2001 From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com> Date: Thu, 18 Mar 2021 14:36:47 +0200 Subject: [PATCH 408/845] Adds CVE-2021-23359 --- 2021/23xxx/CVE-2021-23359.json | 80 ++++++++++++++++++++++++++++++++-- 1 file changed, 76 insertions(+), 4 deletions(-) diff --git a/2021/23xxx/CVE-2021-23359.json b/2021/23xxx/CVE-2021-23359.json index 7d397c1ef6a..840c0ea7e2b 100644 --- a/2021/23xxx/CVE-2021-23359.json +++ b/2021/23xxx/CVE-2021-23359.json @@ -3,16 +3,88 @@ "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "report@snyk.io", + "DATE_PUBLIC": "2021-03-18T12:36:45.679492Z", "ID": "CVE-2021-23359", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Arbitrary Command Injection" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "port-killer", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Arbitrary Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533" + }, + { + "refsource": "CONFIRM", + "url": "https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This affects all versions of package port-killer.\n If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\nRunning this PoC will cause the command touch success to be executed, leading to the creation of a file called success.\r\n\r\n" } ] - } + }, + "impact": { + "cvss": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "OmniTaint" + } + ] } \ No newline at end of file From d85c94b72d352f706ba14c3216570fea54df890a Mon Sep 17 00:00:00 2001 From: Daniel Beck Date: Thu, 18 Mar 2021 12:29:07 +0100 Subject: [PATCH 409/845] Add 2021-03-18 Jenkins security advisory --- 2021/21xxx/CVE-2021-21623.json | 64 ++++++++++++++++++++++++++++++---- 2021/21xxx/CVE-2021-21624.json | 56 +++++++++++++++++++++++++---- 2021/21xxx/CVE-2021-21625.json | 56 +++++++++++++++++++++++++---- 2021/21xxx/CVE-2021-21626.json | 60 +++++++++++++++++++++++++++---- 2021/21xxx/CVE-2021-21627.json | 56 +++++++++++++++++++++++++---- 5 files changed, 262 insertions(+), 30 deletions(-) diff --git a/2021/21xxx/CVE-2021-21623.json b/2021/21xxx/CVE-2021-21623.json index 9eb154d44b5..b07e7fd0e29 100644 --- a/2021/21xxx/CVE-2021-21623.json +++ b/2021/21xxx/CVE-2021-21623.json @@ -1,17 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21623", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Matrix Authorization Strategy Plugin", + "version": { + "version_data": [ + { + "version_value": "2.6.5", + "version_affected": "<=" + }, + { + "version_value": "2.5.2", + "version_affected": "!" + }, + { + "version_value": "2.6.3.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863: Incorrect Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2180", + "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2180", + "refsource": "CONFIRM" } ] } diff --git a/2021/21xxx/CVE-2021-21624.json b/2021/21xxx/CVE-2021-21624.json index ebc983d55e6..13356767cb5 100644 --- a/2021/21xxx/CVE-2021-21624.json +++ b/2021/21xxx/CVE-2021-21624.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21624", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Role-based Authorization Strategy Plugin", + "version": { + "version_data": [ + { + "version_value": "3.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863: Incorrect Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2182", + "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2182", + "refsource": "CONFIRM" } ] } diff --git a/2021/21xxx/CVE-2021-21625.json b/2021/21xxx/CVE-2021-21625.json index fb8ac0f760a..239c2d8e6de 100644 --- a/2021/21xxx/CVE-2021-21625.json +++ b/2021/21xxx/CVE-2021-21625.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21625", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins CloudBees AWS Credentials Plugin", + "version": { + "version_data": [ + { + "version_value": "1.28", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some circumstances." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2032", + "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2032", + "refsource": "CONFIRM" } ] } diff --git a/2021/21xxx/CVE-2021-21626.json b/2021/21xxx/CVE-2021-21626.json index 4294d137af0..64766d1a17d 100644 --- a/2021/21xxx/CVE-2021-21626.json +++ b/2021/21xxx/CVE-2021-21626.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Warnings Next Generation Plugin", + "version": { + "version_data": [ + { + "version_value": "8.4.4", + "version_affected": "<=" + }, + { + "version_value": "8.4.3.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2041", + "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2041", + "refsource": "CONFIRM" } ] } diff --git a/2021/21xxx/CVE-2021-21627.json b/2021/21xxx/CVE-2021-21627.json index 484882403ce..45267f34829 100644 --- a/2021/21xxx/CVE-2021-21627.json +++ b/2021/21xxx/CVE-2021-21627.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-21627", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Libvirt Agents Plugin", + "version": { + "version_data": [ + { + "version_value": "1.9.0", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Libvirt Agents Plugin 1.9.0 and earlier allows attackers to stop hypervisor domains." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-1764", + "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-1764", + "refsource": "CONFIRM" } ] } From 82e97c8c7264a91e6db0a46e7fea6e601cda8139 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 13:00:48 +0000 Subject: [PATCH 410/845] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10172.json | 30 +++++++++++++++++ 2019/10xxx/CVE-2019-10202.json | 30 +++++++++++++++++ 2020/0xxx/CVE-2020-0594.json | 5 +++ 2020/0xxx/CVE-2020-0595.json | 5 +++ 2020/0xxx/CVE-2020-0597.json | 5 +++ 2020/8xxx/CVE-2020-8674.json | 5 +++ 2021/23xxx/CVE-2021-23359.json | 12 ++++--- 2021/26xxx/CVE-2021-26236.json | 61 ++++++++++++++++++++++++++++++---- 8 files changed, 142 insertions(+), 11 deletions(-) diff --git a/2019/10xxx/CVE-2019-10172.json b/2019/10xxx/CVE-2019-10172.json index c412de61c81..f08070d7f64 100644 --- a/2019/10xxx/CVE-2019-10172.json +++ b/2019/10xxx/CVE-2019-10172.json @@ -138,6 +138,36 @@ "refsource": "MLIST", "name": "[hadoop-user] 20210317 jackson-mapper-asl vulnerability at Hadoop", "url": "https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Updated] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Assigned] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20210318 [jira] [Created] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Commented] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20210318 CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Comment Edited] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2019/10xxx/CVE-2019-10202.json b/2019/10xxx/CVE-2019-10202.json index 3fd1b4e7004..ed77ca4ac33 100644 --- a/2019/10xxx/CVE-2019-10202.json +++ b/2019/10xxx/CVE-2019-10202.json @@ -53,6 +53,36 @@ "refsource": "MLIST", "name": "[flume-issues] 20200221 [jira] [Created] (FLUME-3356) Probable security issue in Flume", "url": "https://lists.apache.org/thread.html/refea6018a2c4e9eb7838cab567ed219c3f726dcd83a5472fbb80d8d9@%3Cissues.flume.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Updated] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Assigned] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20210318 [jira] [Created] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Commented] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-dev] 20210318 CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210318 [jira] [Comment Edited] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", + "url": "https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2020/0xxx/CVE-2020-0594.json b/2020/0xxx/CVE-2020-0594.json index 4f63a705073..6fdd32f0b7d 100644 --- a/2020/0xxx/CVE-2020-0594.json +++ b/2020/0xxx/CVE-2020-0594.json @@ -59,6 +59,11 @@ "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, + { + "refsource": "CERT-VN", + "name": "VU#257161", + "url": "https://www.kb.cert.org/vuls/id/257161" + }, { "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", diff --git a/2020/0xxx/CVE-2020-0595.json b/2020/0xxx/CVE-2020-0595.json index 462f8bf0326..226e910dfa9 100644 --- a/2020/0xxx/CVE-2020-0595.json +++ b/2020/0xxx/CVE-2020-0595.json @@ -59,6 +59,11 @@ "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, + { + "refsource": "CERT-VN", + "name": "VU#257161", + "url": "https://www.kb.cert.org/vuls/id/257161" + }, { "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", diff --git a/2020/0xxx/CVE-2020-0597.json b/2020/0xxx/CVE-2020-0597.json index 4e869c31dc9..92b733ed908 100644 --- a/2020/0xxx/CVE-2020-0597.json +++ b/2020/0xxx/CVE-2020-0597.json @@ -59,6 +59,11 @@ "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, + { + "refsource": "CERT-VN", + "name": "VU#257161", + "url": "https://www.kb.cert.org/vuls/id/257161" + }, { "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", diff --git a/2020/8xxx/CVE-2020-8674.json b/2020/8xxx/CVE-2020-8674.json index 20548865636..5704fc258ac 100644 --- a/2020/8xxx/CVE-2020-8674.json +++ b/2020/8xxx/CVE-2020-8674.json @@ -59,6 +59,11 @@ "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, + { + "refsource": "CERT-VN", + "name": "VU#257161", + "url": "https://www.kb.cert.org/vuls/id/257161" + }, { "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", diff --git a/2021/23xxx/CVE-2021-23359.json b/2021/23xxx/CVE-2021-23359.json index 840c0ea7e2b..42ed50541ec 100644 --- a/2021/23xxx/CVE-2021-23359.json +++ b/2021/23xxx/CVE-2021-23359.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533", + "name": "https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533" }, { - "refsource": "CONFIRM", - "url": "https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19" + "refsource": "MISC", + "url": "https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19", + "name": "https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package port-killer.\n If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\nRunning this PoC will cause the command touch success to be executed, leading to the creation of a file called success.\r\n\r\n" + "value": "This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success." } ] }, diff --git a/2021/26xxx/CVE-2021-26236.json b/2021/26xxx/CVE-2021-26236.json index c732f492f3f..fdf04610ab8 100644 --- a/2021/26xxx/CVE-2021-26236.json +++ b/2021/26xxx/CVE-2021-26236.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26236", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26236", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236", + "url": "https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49660", + "url": "https://www.exploit-db.com/exploits/49660" } ] } From 3ebecae1d29eba93ac22c565bc8a472711b16d33 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 14:00:48 +0000 Subject: [PATCH 411/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21623.json | 3 ++- 2021/21xxx/CVE-2021-21624.json | 3 ++- 2021/21xxx/CVE-2021-21625.json | 3 ++- 2021/21xxx/CVE-2021-21626.json | 3 ++- 2021/21xxx/CVE-2021-21627.json | 3 ++- 2021/28xxx/CVE-2021-28687.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28688.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28689.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28690.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28691.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28692.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28693.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28694.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28695.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28696.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28697.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28698.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28699.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28700.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28701.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28702.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28703.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28704.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28705.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28706.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28707.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28708.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28709.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28710.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28711.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28712.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28713.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28714.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28715.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28716.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28717.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28718.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28719.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28720.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28721.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28722.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28723.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28724.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28725.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28726.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28727.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28728.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28729.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28730.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28731.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28732.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28733.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28734.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28735.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28736.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28737.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28738.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28739.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28740.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28741.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28742.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28743.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28744.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28745.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28746.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28747.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28748.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28749.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28750.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28751.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28752.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28753.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28754.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28755.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28756.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28757.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28758.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28759.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28760.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28761.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28762.json | 18 ++++++++++++++++++ 2021/28xxx/CVE-2021-28763.json | 18 ++++++++++++++++++ 82 files changed, 1396 insertions(+), 5 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28687.json create mode 100644 2021/28xxx/CVE-2021-28688.json create mode 100644 2021/28xxx/CVE-2021-28689.json create mode 100644 2021/28xxx/CVE-2021-28690.json create mode 100644 2021/28xxx/CVE-2021-28691.json create mode 100644 2021/28xxx/CVE-2021-28692.json create mode 100644 2021/28xxx/CVE-2021-28693.json create mode 100644 2021/28xxx/CVE-2021-28694.json create mode 100644 2021/28xxx/CVE-2021-28695.json create mode 100644 2021/28xxx/CVE-2021-28696.json create mode 100644 2021/28xxx/CVE-2021-28697.json create mode 100644 2021/28xxx/CVE-2021-28698.json create mode 100644 2021/28xxx/CVE-2021-28699.json create mode 100644 2021/28xxx/CVE-2021-28700.json create mode 100644 2021/28xxx/CVE-2021-28701.json create mode 100644 2021/28xxx/CVE-2021-28702.json create mode 100644 2021/28xxx/CVE-2021-28703.json create mode 100644 2021/28xxx/CVE-2021-28704.json create mode 100644 2021/28xxx/CVE-2021-28705.json create mode 100644 2021/28xxx/CVE-2021-28706.json create mode 100644 2021/28xxx/CVE-2021-28707.json create mode 100644 2021/28xxx/CVE-2021-28708.json create mode 100644 2021/28xxx/CVE-2021-28709.json create mode 100644 2021/28xxx/CVE-2021-28710.json create mode 100644 2021/28xxx/CVE-2021-28711.json create mode 100644 2021/28xxx/CVE-2021-28712.json create mode 100644 2021/28xxx/CVE-2021-28713.json create mode 100644 2021/28xxx/CVE-2021-28714.json create mode 100644 2021/28xxx/CVE-2021-28715.json create mode 100644 2021/28xxx/CVE-2021-28716.json create mode 100644 2021/28xxx/CVE-2021-28717.json create mode 100644 2021/28xxx/CVE-2021-28718.json create mode 100644 2021/28xxx/CVE-2021-28719.json create mode 100644 2021/28xxx/CVE-2021-28720.json create mode 100644 2021/28xxx/CVE-2021-28721.json create mode 100644 2021/28xxx/CVE-2021-28722.json create mode 100644 2021/28xxx/CVE-2021-28723.json create mode 100644 2021/28xxx/CVE-2021-28724.json create mode 100644 2021/28xxx/CVE-2021-28725.json create mode 100644 2021/28xxx/CVE-2021-28726.json create mode 100644 2021/28xxx/CVE-2021-28727.json create mode 100644 2021/28xxx/CVE-2021-28728.json create mode 100644 2021/28xxx/CVE-2021-28729.json create mode 100644 2021/28xxx/CVE-2021-28730.json create mode 100644 2021/28xxx/CVE-2021-28731.json create mode 100644 2021/28xxx/CVE-2021-28732.json create mode 100644 2021/28xxx/CVE-2021-28733.json create mode 100644 2021/28xxx/CVE-2021-28734.json create mode 100644 2021/28xxx/CVE-2021-28735.json create mode 100644 2021/28xxx/CVE-2021-28736.json create mode 100644 2021/28xxx/CVE-2021-28737.json create mode 100644 2021/28xxx/CVE-2021-28738.json create mode 100644 2021/28xxx/CVE-2021-28739.json create mode 100644 2021/28xxx/CVE-2021-28740.json create mode 100644 2021/28xxx/CVE-2021-28741.json create mode 100644 2021/28xxx/CVE-2021-28742.json create mode 100644 2021/28xxx/CVE-2021-28743.json create mode 100644 2021/28xxx/CVE-2021-28744.json create mode 100644 2021/28xxx/CVE-2021-28745.json create mode 100644 2021/28xxx/CVE-2021-28746.json create mode 100644 2021/28xxx/CVE-2021-28747.json create mode 100644 2021/28xxx/CVE-2021-28748.json create mode 100644 2021/28xxx/CVE-2021-28749.json create mode 100644 2021/28xxx/CVE-2021-28750.json create mode 100644 2021/28xxx/CVE-2021-28751.json create mode 100644 2021/28xxx/CVE-2021-28752.json create mode 100644 2021/28xxx/CVE-2021-28753.json create mode 100644 2021/28xxx/CVE-2021-28754.json create mode 100644 2021/28xxx/CVE-2021-28755.json create mode 100644 2021/28xxx/CVE-2021-28756.json create mode 100644 2021/28xxx/CVE-2021-28757.json create mode 100644 2021/28xxx/CVE-2021-28758.json create mode 100644 2021/28xxx/CVE-2021-28759.json create mode 100644 2021/28xxx/CVE-2021-28760.json create mode 100644 2021/28xxx/CVE-2021-28761.json create mode 100644 2021/28xxx/CVE-2021-28762.json create mode 100644 2021/28xxx/CVE-2021-28763.json diff --git a/2021/21xxx/CVE-2021-21623.json b/2021/21xxx/CVE-2021-21623.json index b07e7fd0e29..f9c3105bc12 100644 --- a/2021/21xxx/CVE-2021-21623.json +++ b/2021/21xxx/CVE-2021-21623.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2021-21623", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2021/21xxx/CVE-2021-21624.json b/2021/21xxx/CVE-2021-21624.json index 13356767cb5..a19b4e494c8 100644 --- a/2021/21xxx/CVE-2021-21624.json +++ b/2021/21xxx/CVE-2021-21624.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2021-21624", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2021/21xxx/CVE-2021-21625.json b/2021/21xxx/CVE-2021-21625.json index 239c2d8e6de..de06580a7b9 100644 --- a/2021/21xxx/CVE-2021-21625.json +++ b/2021/21xxx/CVE-2021-21625.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2021-21625", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2021/21xxx/CVE-2021-21626.json b/2021/21xxx/CVE-2021-21626.json index 64766d1a17d..f64369eee27 100644 --- a/2021/21xxx/CVE-2021-21626.json +++ b/2021/21xxx/CVE-2021-21626.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2021-21626", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2021/21xxx/CVE-2021-21627.json b/2021/21xxx/CVE-2021-21627.json index 45267f34829..5e95b52416a 100644 --- a/2021/21xxx/CVE-2021-21627.json +++ b/2021/21xxx/CVE-2021-21627.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2021-21627", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2021/28xxx/CVE-2021-28687.json b/2021/28xxx/CVE-2021-28687.json new file mode 100644 index 00000000000..583634d4baa --- /dev/null +++ b/2021/28xxx/CVE-2021-28687.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28687", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28688.json b/2021/28xxx/CVE-2021-28688.json new file mode 100644 index 00000000000..a471f6c9ba3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28688.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28688", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28689.json b/2021/28xxx/CVE-2021-28689.json new file mode 100644 index 00000000000..4e6e24c07e3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28689.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28689", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28690.json b/2021/28xxx/CVE-2021-28690.json new file mode 100644 index 00000000000..0a3daefcf96 --- /dev/null +++ b/2021/28xxx/CVE-2021-28690.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28690", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28691.json b/2021/28xxx/CVE-2021-28691.json new file mode 100644 index 00000000000..21914de7cf5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28691.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28691", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28692.json b/2021/28xxx/CVE-2021-28692.json new file mode 100644 index 00000000000..3a654980d91 --- /dev/null +++ b/2021/28xxx/CVE-2021-28692.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28692", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28693.json b/2021/28xxx/CVE-2021-28693.json new file mode 100644 index 00000000000..de5854a7fb6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28693.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28693", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28694.json b/2021/28xxx/CVE-2021-28694.json new file mode 100644 index 00000000000..e017210ead1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28695.json b/2021/28xxx/CVE-2021-28695.json new file mode 100644 index 00000000000..76de097d6a2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28695.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28695", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28696.json b/2021/28xxx/CVE-2021-28696.json new file mode 100644 index 00000000000..7ff1f410ce3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28697.json b/2021/28xxx/CVE-2021-28697.json new file mode 100644 index 00000000000..31a78a996fb --- /dev/null +++ b/2021/28xxx/CVE-2021-28697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28698.json b/2021/28xxx/CVE-2021-28698.json new file mode 100644 index 00000000000..7f22029a418 --- /dev/null +++ b/2021/28xxx/CVE-2021-28698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28699.json b/2021/28xxx/CVE-2021-28699.json new file mode 100644 index 00000000000..91d77327a88 --- /dev/null +++ b/2021/28xxx/CVE-2021-28699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28700.json b/2021/28xxx/CVE-2021-28700.json new file mode 100644 index 00000000000..64b5a79acb1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28701.json b/2021/28xxx/CVE-2021-28701.json new file mode 100644 index 00000000000..ff8a93d5faf --- /dev/null +++ b/2021/28xxx/CVE-2021-28701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28702.json b/2021/28xxx/CVE-2021-28702.json new file mode 100644 index 00000000000..7f93925b706 --- /dev/null +++ b/2021/28xxx/CVE-2021-28702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28703.json b/2021/28xxx/CVE-2021-28703.json new file mode 100644 index 00000000000..0082bd86956 --- /dev/null +++ b/2021/28xxx/CVE-2021-28703.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28703", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28704.json b/2021/28xxx/CVE-2021-28704.json new file mode 100644 index 00000000000..70c4736e987 --- /dev/null +++ b/2021/28xxx/CVE-2021-28704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28705.json b/2021/28xxx/CVE-2021-28705.json new file mode 100644 index 00000000000..fb2ffaeb8f1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28706.json b/2021/28xxx/CVE-2021-28706.json new file mode 100644 index 00000000000..9090214318e --- /dev/null +++ b/2021/28xxx/CVE-2021-28706.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28706", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28707.json b/2021/28xxx/CVE-2021-28707.json new file mode 100644 index 00000000000..da72480ebac --- /dev/null +++ b/2021/28xxx/CVE-2021-28707.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28707", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28708.json b/2021/28xxx/CVE-2021-28708.json new file mode 100644 index 00000000000..eabf2b94e72 --- /dev/null +++ b/2021/28xxx/CVE-2021-28708.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28708", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28709.json b/2021/28xxx/CVE-2021-28709.json new file mode 100644 index 00000000000..e427613222d --- /dev/null +++ b/2021/28xxx/CVE-2021-28709.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28709", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28710.json b/2021/28xxx/CVE-2021-28710.json new file mode 100644 index 00000000000..bb09a4dc7de --- /dev/null +++ b/2021/28xxx/CVE-2021-28710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28711.json b/2021/28xxx/CVE-2021-28711.json new file mode 100644 index 00000000000..e04b2344a04 --- /dev/null +++ b/2021/28xxx/CVE-2021-28711.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28711", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28712.json b/2021/28xxx/CVE-2021-28712.json new file mode 100644 index 00000000000..3aed653a174 --- /dev/null +++ b/2021/28xxx/CVE-2021-28712.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28712", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28713.json b/2021/28xxx/CVE-2021-28713.json new file mode 100644 index 00000000000..2b5d27ddaec --- /dev/null +++ b/2021/28xxx/CVE-2021-28713.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28713", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28714.json b/2021/28xxx/CVE-2021-28714.json new file mode 100644 index 00000000000..d00d34abaa4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28714.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28714", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28715.json b/2021/28xxx/CVE-2021-28715.json new file mode 100644 index 00000000000..158dc0550f1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28715.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28715", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28716.json b/2021/28xxx/CVE-2021-28716.json new file mode 100644 index 00000000000..d12cdc5fe1c --- /dev/null +++ b/2021/28xxx/CVE-2021-28716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28717.json b/2021/28xxx/CVE-2021-28717.json new file mode 100644 index 00000000000..9ab0d889878 --- /dev/null +++ b/2021/28xxx/CVE-2021-28717.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28718.json b/2021/28xxx/CVE-2021-28718.json new file mode 100644 index 00000000000..ff0020a76b9 --- /dev/null +++ b/2021/28xxx/CVE-2021-28718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28719.json b/2021/28xxx/CVE-2021-28719.json new file mode 100644 index 00000000000..50c58ff4117 --- /dev/null +++ b/2021/28xxx/CVE-2021-28719.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28720.json b/2021/28xxx/CVE-2021-28720.json new file mode 100644 index 00000000000..70d84b512ca --- /dev/null +++ b/2021/28xxx/CVE-2021-28720.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28720", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28721.json b/2021/28xxx/CVE-2021-28721.json new file mode 100644 index 00000000000..562c283eb69 --- /dev/null +++ b/2021/28xxx/CVE-2021-28721.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28721", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28722.json b/2021/28xxx/CVE-2021-28722.json new file mode 100644 index 00000000000..4792569b367 --- /dev/null +++ b/2021/28xxx/CVE-2021-28722.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28722", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28723.json b/2021/28xxx/CVE-2021-28723.json new file mode 100644 index 00000000000..ed2d129e542 --- /dev/null +++ b/2021/28xxx/CVE-2021-28723.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28723", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28724.json b/2021/28xxx/CVE-2021-28724.json new file mode 100644 index 00000000000..e7ffde9e0a6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28724.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28724", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28725.json b/2021/28xxx/CVE-2021-28725.json new file mode 100644 index 00000000000..36eaaa5d37b --- /dev/null +++ b/2021/28xxx/CVE-2021-28725.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28725", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28726.json b/2021/28xxx/CVE-2021-28726.json new file mode 100644 index 00000000000..97caede5b83 --- /dev/null +++ b/2021/28xxx/CVE-2021-28726.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28726", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28727.json b/2021/28xxx/CVE-2021-28727.json new file mode 100644 index 00000000000..bc417d608ab --- /dev/null +++ b/2021/28xxx/CVE-2021-28727.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28727", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28728.json b/2021/28xxx/CVE-2021-28728.json new file mode 100644 index 00000000000..e07c771640f --- /dev/null +++ b/2021/28xxx/CVE-2021-28728.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28728", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28729.json b/2021/28xxx/CVE-2021-28729.json new file mode 100644 index 00000000000..60c0c472b29 --- /dev/null +++ b/2021/28xxx/CVE-2021-28729.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28729", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28730.json b/2021/28xxx/CVE-2021-28730.json new file mode 100644 index 00000000000..d65dc67dac3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28730.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28730", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28731.json b/2021/28xxx/CVE-2021-28731.json new file mode 100644 index 00000000000..765e20db870 --- /dev/null +++ b/2021/28xxx/CVE-2021-28731.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28731", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28732.json b/2021/28xxx/CVE-2021-28732.json new file mode 100644 index 00000000000..dd6340d936b --- /dev/null +++ b/2021/28xxx/CVE-2021-28732.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28732", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28733.json b/2021/28xxx/CVE-2021-28733.json new file mode 100644 index 00000000000..fbfbe4cc5ee --- /dev/null +++ b/2021/28xxx/CVE-2021-28733.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28733", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28734.json b/2021/28xxx/CVE-2021-28734.json new file mode 100644 index 00000000000..42ca42bb0e2 --- /dev/null +++ b/2021/28xxx/CVE-2021-28734.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28734", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28735.json b/2021/28xxx/CVE-2021-28735.json new file mode 100644 index 00000000000..32f25deb36d --- /dev/null +++ b/2021/28xxx/CVE-2021-28735.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28735", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28736.json b/2021/28xxx/CVE-2021-28736.json new file mode 100644 index 00000000000..2e9ecb46c3d --- /dev/null +++ b/2021/28xxx/CVE-2021-28736.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28736", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28737.json b/2021/28xxx/CVE-2021-28737.json new file mode 100644 index 00000000000..d815fcfb100 --- /dev/null +++ b/2021/28xxx/CVE-2021-28737.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28737", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28738.json b/2021/28xxx/CVE-2021-28738.json new file mode 100644 index 00000000000..3516859d298 --- /dev/null +++ b/2021/28xxx/CVE-2021-28738.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28738", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28739.json b/2021/28xxx/CVE-2021-28739.json new file mode 100644 index 00000000000..1b0c055e601 --- /dev/null +++ b/2021/28xxx/CVE-2021-28739.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28739", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28740.json b/2021/28xxx/CVE-2021-28740.json new file mode 100644 index 00000000000..588cc1a25ca --- /dev/null +++ b/2021/28xxx/CVE-2021-28740.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28740", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28741.json b/2021/28xxx/CVE-2021-28741.json new file mode 100644 index 00000000000..d530ae75671 --- /dev/null +++ b/2021/28xxx/CVE-2021-28741.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28741", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28742.json b/2021/28xxx/CVE-2021-28742.json new file mode 100644 index 00000000000..0704223200e --- /dev/null +++ b/2021/28xxx/CVE-2021-28742.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28742", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28743.json b/2021/28xxx/CVE-2021-28743.json new file mode 100644 index 00000000000..8e67f37d5a5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28743.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28743", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28744.json b/2021/28xxx/CVE-2021-28744.json new file mode 100644 index 00000000000..3ad135421b5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28744.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28744", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28745.json b/2021/28xxx/CVE-2021-28745.json new file mode 100644 index 00000000000..29928aa89df --- /dev/null +++ b/2021/28xxx/CVE-2021-28745.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28745", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28746.json b/2021/28xxx/CVE-2021-28746.json new file mode 100644 index 00000000000..dd2fe925763 --- /dev/null +++ b/2021/28xxx/CVE-2021-28746.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28746", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28747.json b/2021/28xxx/CVE-2021-28747.json new file mode 100644 index 00000000000..b59a59d5461 --- /dev/null +++ b/2021/28xxx/CVE-2021-28747.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28747", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28748.json b/2021/28xxx/CVE-2021-28748.json new file mode 100644 index 00000000000..37b4308d58e --- /dev/null +++ b/2021/28xxx/CVE-2021-28748.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28748", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28749.json b/2021/28xxx/CVE-2021-28749.json new file mode 100644 index 00000000000..63d49684346 --- /dev/null +++ b/2021/28xxx/CVE-2021-28749.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28749", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28750.json b/2021/28xxx/CVE-2021-28750.json new file mode 100644 index 00000000000..dfc847fcc98 --- /dev/null +++ b/2021/28xxx/CVE-2021-28750.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28750", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28751.json b/2021/28xxx/CVE-2021-28751.json new file mode 100644 index 00000000000..76a61cf00ea --- /dev/null +++ b/2021/28xxx/CVE-2021-28751.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28751", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28752.json b/2021/28xxx/CVE-2021-28752.json new file mode 100644 index 00000000000..667df38ea0a --- /dev/null +++ b/2021/28xxx/CVE-2021-28752.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28752", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28753.json b/2021/28xxx/CVE-2021-28753.json new file mode 100644 index 00000000000..7c80bee0b33 --- /dev/null +++ b/2021/28xxx/CVE-2021-28753.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28753", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28754.json b/2021/28xxx/CVE-2021-28754.json new file mode 100644 index 00000000000..9a4d00ce3fc --- /dev/null +++ b/2021/28xxx/CVE-2021-28754.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28754", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28755.json b/2021/28xxx/CVE-2021-28755.json new file mode 100644 index 00000000000..f74d4e82b10 --- /dev/null +++ b/2021/28xxx/CVE-2021-28755.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28755", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28756.json b/2021/28xxx/CVE-2021-28756.json new file mode 100644 index 00000000000..2e50b40a5c1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28756.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28756", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28757.json b/2021/28xxx/CVE-2021-28757.json new file mode 100644 index 00000000000..ba8aabff616 --- /dev/null +++ b/2021/28xxx/CVE-2021-28757.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28757", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28758.json b/2021/28xxx/CVE-2021-28758.json new file mode 100644 index 00000000000..f0ab3fa3005 --- /dev/null +++ b/2021/28xxx/CVE-2021-28758.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28758", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28759.json b/2021/28xxx/CVE-2021-28759.json new file mode 100644 index 00000000000..17f1d38a9ab --- /dev/null +++ b/2021/28xxx/CVE-2021-28759.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28759", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28760.json b/2021/28xxx/CVE-2021-28760.json new file mode 100644 index 00000000000..4aa140a3d00 --- /dev/null +++ b/2021/28xxx/CVE-2021-28760.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28760", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28761.json b/2021/28xxx/CVE-2021-28761.json new file mode 100644 index 00000000000..19d9a788325 --- /dev/null +++ b/2021/28xxx/CVE-2021-28761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28762.json b/2021/28xxx/CVE-2021-28762.json new file mode 100644 index 00000000000..de63a65d61f --- /dev/null +++ b/2021/28xxx/CVE-2021-28762.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28762", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28763.json b/2021/28xxx/CVE-2021-28763.json new file mode 100644 index 00000000000..f36c07a3d02 --- /dev/null +++ b/2021/28xxx/CVE-2021-28763.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28763", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 1903e2edf89b6e4c79d96b79cad5fb08c873b4b7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 14:01:04 +0000 Subject: [PATCH 412/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26233.json | 56 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26234.json | 56 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26235.json | 56 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26236.json | 5 +++ 2021/26xxx/CVE-2021-26237.json | 56 ++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28133.json | 71 +++++++++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28764.json | 18 +++++++++ 2021/28xxx/CVE-2021-28765.json | 18 +++++++++ 2021/28xxx/CVE-2021-28766.json | 18 +++++++++ 2021/28xxx/CVE-2021-28767.json | 18 +++++++++ 2021/28xxx/CVE-2021-28768.json | 18 +++++++++ 2021/28xxx/CVE-2021-28769.json | 18 +++++++++ 2021/28xxx/CVE-2021-28770.json | 18 +++++++++ 2021/28xxx/CVE-2021-28771.json | 18 +++++++++ 2021/28xxx/CVE-2021-28772.json | 18 +++++++++ 2021/28xxx/CVE-2021-28773.json | 18 +++++++++ 2021/28xxx/CVE-2021-28774.json | 18 +++++++++ 2021/28xxx/CVE-2021-28775.json | 18 +++++++++ 2021/28xxx/CVE-2021-28776.json | 18 +++++++++ 2021/28xxx/CVE-2021-28777.json | 18 +++++++++ 2021/28xxx/CVE-2021-28778.json | 18 +++++++++ 2021/28xxx/CVE-2021-28779.json | 18 +++++++++ 2021/28xxx/CVE-2021-28780.json | 18 +++++++++ 2021/28xxx/CVE-2021-28781.json | 18 +++++++++ 2021/28xxx/CVE-2021-28782.json | 18 +++++++++ 2021/28xxx/CVE-2021-28783.json | 18 +++++++++ 2021/28xxx/CVE-2021-28784.json | 18 +++++++++ 2021/28xxx/CVE-2021-28785.json | 18 +++++++++ 2021/28xxx/CVE-2021-28786.json | 18 +++++++++ 2021/28xxx/CVE-2021-28787.json | 18 +++++++++ 30 files changed, 702 insertions(+), 30 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28764.json create mode 100644 2021/28xxx/CVE-2021-28765.json create mode 100644 2021/28xxx/CVE-2021-28766.json create mode 100644 2021/28xxx/CVE-2021-28767.json create mode 100644 2021/28xxx/CVE-2021-28768.json create mode 100644 2021/28xxx/CVE-2021-28769.json create mode 100644 2021/28xxx/CVE-2021-28770.json create mode 100644 2021/28xxx/CVE-2021-28771.json create mode 100644 2021/28xxx/CVE-2021-28772.json create mode 100644 2021/28xxx/CVE-2021-28773.json create mode 100644 2021/28xxx/CVE-2021-28774.json create mode 100644 2021/28xxx/CVE-2021-28775.json create mode 100644 2021/28xxx/CVE-2021-28776.json create mode 100644 2021/28xxx/CVE-2021-28777.json create mode 100644 2021/28xxx/CVE-2021-28778.json create mode 100644 2021/28xxx/CVE-2021-28779.json create mode 100644 2021/28xxx/CVE-2021-28780.json create mode 100644 2021/28xxx/CVE-2021-28781.json create mode 100644 2021/28xxx/CVE-2021-28782.json create mode 100644 2021/28xxx/CVE-2021-28783.json create mode 100644 2021/28xxx/CVE-2021-28784.json create mode 100644 2021/28xxx/CVE-2021-28785.json create mode 100644 2021/28xxx/CVE-2021-28786.json create mode 100644 2021/28xxx/CVE-2021-28787.json diff --git a/2021/26xxx/CVE-2021-26233.json b/2021/26xxx/CVE-2021-26233.json index d6fe690acf1..67570e4c04e 100644 --- a/2021/26xxx/CVE-2021-26233.json +++ b/2021/26xxx/CVE-2021-26233.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26233", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26233", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfcb, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/26xxx/CVE-2021-26234.json b/2021/26xxx/CVE-2021-26234.json index 9df86a46368..fc6696fa469 100644 --- a/2021/26xxx/CVE-2021-26234.json +++ b/2021/26xxx/CVE-2021-26234.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26234", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26234", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d8a, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/26xxx/CVE-2021-26235.json b/2021/26xxx/CVE-2021-26235.json index 25da56f8699..94cddf881c4 100644 --- a/2021/26xxx/CVE-2021-26235.json +++ b/2021/26xxx/CVE-2021-26235.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26235", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26235", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfc9, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/26xxx/CVE-2021-26236.json b/2021/26xxx/CVE-2021-26236.json index fdf04610ab8..5174ee3c0f4 100644 --- a/2021/26xxx/CVE-2021-26236.json +++ b/2021/26xxx/CVE-2021-26236.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/49660", "url": "https://www.exploit-db.com/exploits/49660" + }, + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/", + "url": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/" } ] } diff --git a/2021/26xxx/CVE-2021-26237.json b/2021/26xxx/CVE-2021-26237.json index b535db0464c..30f976ef4b7 100644 --- a/2021/26xxx/CVE-2021-26237.json +++ b/2021/26xxx/CVE-2021-26237.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26237", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26237", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d7d, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/28xxx/CVE-2021-28133.json b/2021/28xxx/CVE-2021-28133.json index 26c7909d3f1..cf89df2a532 100644 --- a/2021/28xxx/CVE-2021-28133.json +++ b/2021/28xxx/CVE-2021-28133.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28133", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28133", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoom through 5.5.4 sometimes allows attackers to read private information on a participant's screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt", + "refsource": "MISC", + "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" + }, + { + "url": "https://zoom.us/trust/security/security-bulletin", + "refsource": "MISC", + "name": "https://zoom.us/trust/security/security-bulletin" + }, + { + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=SonmmgQlLzg", + "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" + }, + { + "refsource": "MISC", + "name": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133", + "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" } ] } diff --git a/2021/28xxx/CVE-2021-28764.json b/2021/28xxx/CVE-2021-28764.json new file mode 100644 index 00000000000..f34b0bb947c --- /dev/null +++ b/2021/28xxx/CVE-2021-28764.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28764", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28765.json b/2021/28xxx/CVE-2021-28765.json new file mode 100644 index 00000000000..2cbdc1253b5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28766.json b/2021/28xxx/CVE-2021-28766.json new file mode 100644 index 00000000000..beebed6aa72 --- /dev/null +++ b/2021/28xxx/CVE-2021-28766.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28766", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28767.json b/2021/28xxx/CVE-2021-28767.json new file mode 100644 index 00000000000..47a3142070b --- /dev/null +++ b/2021/28xxx/CVE-2021-28767.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28767", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28768.json b/2021/28xxx/CVE-2021-28768.json new file mode 100644 index 00000000000..bdd89d933a4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28768.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28768", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28769.json b/2021/28xxx/CVE-2021-28769.json new file mode 100644 index 00000000000..81a6053685c --- /dev/null +++ b/2021/28xxx/CVE-2021-28769.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28769", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28770.json b/2021/28xxx/CVE-2021-28770.json new file mode 100644 index 00000000000..a77c067c0ac --- /dev/null +++ b/2021/28xxx/CVE-2021-28770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28771.json b/2021/28xxx/CVE-2021-28771.json new file mode 100644 index 00000000000..f64d8c3e0a0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28772.json b/2021/28xxx/CVE-2021-28772.json new file mode 100644 index 00000000000..c5120423446 --- /dev/null +++ b/2021/28xxx/CVE-2021-28772.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28772", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28773.json b/2021/28xxx/CVE-2021-28773.json new file mode 100644 index 00000000000..e0cca9eea6d --- /dev/null +++ b/2021/28xxx/CVE-2021-28773.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28773", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28774.json b/2021/28xxx/CVE-2021-28774.json new file mode 100644 index 00000000000..c2d0e2ca92b --- /dev/null +++ b/2021/28xxx/CVE-2021-28774.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28774", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28775.json b/2021/28xxx/CVE-2021-28775.json new file mode 100644 index 00000000000..aedcba40783 --- /dev/null +++ b/2021/28xxx/CVE-2021-28775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28776.json b/2021/28xxx/CVE-2021-28776.json new file mode 100644 index 00000000000..f904c62fd56 --- /dev/null +++ b/2021/28xxx/CVE-2021-28776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28777.json b/2021/28xxx/CVE-2021-28777.json new file mode 100644 index 00000000000..d2f6b9883bf --- /dev/null +++ b/2021/28xxx/CVE-2021-28777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28778.json b/2021/28xxx/CVE-2021-28778.json new file mode 100644 index 00000000000..7c1aa26a93e --- /dev/null +++ b/2021/28xxx/CVE-2021-28778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28779.json b/2021/28xxx/CVE-2021-28779.json new file mode 100644 index 00000000000..5e0acfcc42a --- /dev/null +++ b/2021/28xxx/CVE-2021-28779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28780.json b/2021/28xxx/CVE-2021-28780.json new file mode 100644 index 00000000000..d72b20a9cb6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28781.json b/2021/28xxx/CVE-2021-28781.json new file mode 100644 index 00000000000..b1df5069e12 --- /dev/null +++ b/2021/28xxx/CVE-2021-28781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28782.json b/2021/28xxx/CVE-2021-28782.json new file mode 100644 index 00000000000..7211a7f7d8d --- /dev/null +++ b/2021/28xxx/CVE-2021-28782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28783.json b/2021/28xxx/CVE-2021-28783.json new file mode 100644 index 00000000000..8c980a15eb3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28784.json b/2021/28xxx/CVE-2021-28784.json new file mode 100644 index 00000000000..b2d73722b07 --- /dev/null +++ b/2021/28xxx/CVE-2021-28784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28785.json b/2021/28xxx/CVE-2021-28785.json new file mode 100644 index 00000000000..5fedea45d93 --- /dev/null +++ b/2021/28xxx/CVE-2021-28785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28786.json b/2021/28xxx/CVE-2021-28786.json new file mode 100644 index 00000000000..826fcc37a61 --- /dev/null +++ b/2021/28xxx/CVE-2021-28786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28787.json b/2021/28xxx/CVE-2021-28787.json new file mode 100644 index 00000000000..d5de34be416 --- /dev/null +++ b/2021/28xxx/CVE-2021-28787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file From 851a3a4ba882f1af1b722be080504b948724c972 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 15:00:48 +0000 Subject: [PATCH 413/845] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26236.json | 5 ----- 1 file changed, 5 deletions(-) diff --git a/2021/26xxx/CVE-2021-26236.json b/2021/26xxx/CVE-2021-26236.json index 5174ee3c0f4..fdf04610ab8 100644 --- a/2021/26xxx/CVE-2021-26236.json +++ b/2021/26xxx/CVE-2021-26236.json @@ -61,11 +61,6 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/49660", "url": "https://www.exploit-db.com/exploits/49660" - }, - { - "refsource": "MISC", - "name": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/", - "url": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/" } ] } From 61b64a533c72a672a6d1d066c698ab1ef5345054 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 15:01:06 +0000 Subject: [PATCH 414/845] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21623.json | 5 +++ 2021/21xxx/CVE-2021-21624.json | 5 +++ 2021/21xxx/CVE-2021-21625.json | 5 +++ 2021/21xxx/CVE-2021-21626.json | 5 +++ 2021/21xxx/CVE-2021-21627.json | 5 +++ 2021/26xxx/CVE-2021-26236.json | 5 +++ 2021/26xxx/CVE-2021-26569.json | 9 +++-- 2021/26xxx/CVE-2021-26570.json | 5 +++ 2021/26xxx/CVE-2021-26935.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27306.json | 61 ++++++++++++++++++++++++++++++---- 2021/27xxx/CVE-2021-27646.json | 7 +++- 2021/3xxx/CVE-2021-3418.json | 2 +- 12 files changed, 159 insertions(+), 16 deletions(-) diff --git a/2021/21xxx/CVE-2021-21623.json b/2021/21xxx/CVE-2021-21623.json index f9c3105bc12..b87b0881d14 100644 --- a/2021/21xxx/CVE-2021-21623.json +++ b/2021/21xxx/CVE-2021-21623.json @@ -65,6 +65,11 @@ "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2180", "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2180", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210318 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/03/18/5" } ] } diff --git a/2021/21xxx/CVE-2021-21624.json b/2021/21xxx/CVE-2021-21624.json index a19b4e494c8..49b1a9664dc 100644 --- a/2021/21xxx/CVE-2021-21624.json +++ b/2021/21xxx/CVE-2021-21624.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2182", "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2182", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210318 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/03/18/5" } ] } diff --git a/2021/21xxx/CVE-2021-21625.json b/2021/21xxx/CVE-2021-21625.json index de06580a7b9..bd8f9dee98a 100644 --- a/2021/21xxx/CVE-2021-21625.json +++ b/2021/21xxx/CVE-2021-21625.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2032", "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2032", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210318 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/03/18/5" } ] } diff --git a/2021/21xxx/CVE-2021-21626.json b/2021/21xxx/CVE-2021-21626.json index f64369eee27..86331c46ad6 100644 --- a/2021/21xxx/CVE-2021-21626.json +++ b/2021/21xxx/CVE-2021-21626.json @@ -61,6 +61,11 @@ "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2041", "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2041", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210318 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/03/18/5" } ] } diff --git a/2021/21xxx/CVE-2021-21627.json b/2021/21xxx/CVE-2021-21627.json index 5e95b52416a..0b436fd911a 100644 --- a/2021/21xxx/CVE-2021-21627.json +++ b/2021/21xxx/CVE-2021-21627.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-1764", "url": "https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-1764", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210318 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2021/03/18/5" } ] } diff --git a/2021/26xxx/CVE-2021-26236.json b/2021/26xxx/CVE-2021-26236.json index fdf04610ab8..5174ee3c0f4 100644 --- a/2021/26xxx/CVE-2021-26236.json +++ b/2021/26xxx/CVE-2021-26236.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/49660", "url": "https://www.exploit-db.com/exploits/49660" + }, + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/", + "url": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/" } ] } diff --git a/2021/26xxx/CVE-2021-26569.json b/2021/26xxx/CVE-2021-26569.json index 4618290bd47..b5b5498a015 100644 --- a/2021/26xxx/CVE-2021-26569.json +++ b/2021/26xxx/CVE-2021-26569.json @@ -28,7 +28,7 @@ ] }, "vendor_name": "Synology" - } + } ] } }, @@ -65,7 +65,12 @@ "url": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-338/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-338/" } ] } -} +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26570.json b/2021/26xxx/CVE-2021-26570.json index 8a8927ff1c3..53a3b13265a 100644 --- a/2021/26xxx/CVE-2021-26570.json +++ b/2021/26xxx/CVE-2021-26570.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/" } ] }, diff --git a/2021/26xxx/CVE-2021-26935.json b/2021/26xxx/CVE-2021-26935.json index 322b8cee05a..864774aa59b 100644 --- a/2021/26xxx/CVE-2021-26935.json +++ b/2021/26xxx/CVE-2021-26935.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26935", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26935", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In WoWonder < 3.1, remote attackers can gain access to the database by exploiting a requests.php?f=search-my-followers SQL Injection vulnerability via the event_id parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49657", + "url": "https://www.exploit-db.com/exploits/49657" + }, + { + "refsource": "MISC", + "name": "https://securityforeveryone.com/blog/wowonder-0-day-vulnerability-cve-2021-26935", + "url": "https://securityforeveryone.com/blog/wowonder-0-day-vulnerability-cve-2021-26935" } ] } diff --git a/2021/27xxx/CVE-2021-27306.json b/2021/27xxx/CVE-2021-27306.json index a24de2108d4..4f45d59ec27 100644 --- a/2021/27xxx/CVE-2021-27306.json +++ b/2021/27xxx/CVE-2021-27306.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-27306", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-27306", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.0.0 allows unauthenticated users access to authenticated routes without a valid token JWT." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.konghq.com/enterprise/changelog/#core-1", + "refsource": "MISC", + "name": "https://docs.konghq.com/enterprise/changelog/#core-1" + }, + { + "refsource": "MISC", + "name": "https://medium.com/@sew.campos/cve-2021-27306-access-an-authenticated-route-on-kong-api-gateway-6ae3d81968a3", + "url": "https://medium.com/@sew.campos/cve-2021-27306-access-an-authenticated-route-on-kong-api-gateway-6ae3d81968a3" } ] } diff --git a/2021/27xxx/CVE-2021-27646.json b/2021/27xxx/CVE-2021-27646.json index 6ba2a5dc184..11b24d9a4f1 100644 --- a/2021/27xxx/CVE-2021-27646.json +++ b/2021/27xxx/CVE-2021-27646.json @@ -65,7 +65,12 @@ "url": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_20_26" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ] } -} +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3418.json b/2021/3xxx/CVE-2021-3418.json index f922c50f4ce..9abef8fc100 100644 --- a/2021/3xxx/CVE-2021-3418.json +++ b/2021/3xxx/CVE-2021-3418.json @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grbu2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism." + "value": "If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism." } ] } From ebbeb9ffe94bcd23c45e2200a21219e74bbcaec0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 16:00:47 +0000 Subject: [PATCH 415/845] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13949.json | 5 +++ 2020/17xxx/CVE-2020-17457.json | 5 +++ 2021/23xxx/CVE-2021-23337.json | 29 +++------------ 2021/24xxx/CVE-2021-24123.json | 5 ++- 2021/24xxx/CVE-2021-24124.json | 5 ++- 2021/24xxx/CVE-2021-24125.json | 5 ++- 2021/24xxx/CVE-2021-24126.json | 5 ++- 2021/24xxx/CVE-2021-24127.json | 5 ++- 2021/24xxx/CVE-2021-24128.json | 5 ++- 2021/24xxx/CVE-2021-24129.json | 5 ++- 2021/24xxx/CVE-2021-24130.json | 5 ++- 2021/24xxx/CVE-2021-24131.json | 5 ++- 2021/24xxx/CVE-2021-24132.json | 5 ++- 2021/24xxx/CVE-2021-24133.json | 5 ++- 2021/24xxx/CVE-2021-24134.json | 5 ++- 2021/24xxx/CVE-2021-24135.json | 5 ++- 2021/24xxx/CVE-2021-24136.json | 7 ++-- 2021/24xxx/CVE-2021-24137.json | 5 ++- 2021/24xxx/CVE-2021-24138.json | 5 ++- 2021/24xxx/CVE-2021-24139.json | 5 ++- 2021/24xxx/CVE-2021-24140.json | 5 ++- 2021/24xxx/CVE-2021-24141.json | 5 ++- 2021/24xxx/CVE-2021-24142.json | 5 ++- 2021/24xxx/CVE-2021-24143.json | 5 ++- 2021/24xxx/CVE-2021-24144.json | 5 ++- 2021/24xxx/CVE-2021-24145.json | 5 ++- 2021/24xxx/CVE-2021-24146.json | 5 ++- 2021/24xxx/CVE-2021-24147.json | 5 ++- 2021/24xxx/CVE-2021-24148.json | 5 ++- 2021/24xxx/CVE-2021-24149.json | 5 ++- 2021/26xxx/CVE-2021-26215.json | 61 ++++++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26216.json | 61 ++++++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26855.json | 5 +++ 2021/27xxx/CVE-2021-27292.json | 5 +++ 2021/28xxx/CVE-2021-28145.json | 61 ++++++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28788.json | 18 +++++++++ 2021/28xxx/CVE-2021-28789.json | 62 +++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28790.json | 62 +++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28791.json | 62 +++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28792.json | 62 +++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28793.json | 18 +++++++++ 2021/28xxx/CVE-2021-28794.json | 67 ++++++++++++++++++++++++++++++++++ 2021/28xxx/CVE-2021-28795.json | 18 +++++++++ 2021/28xxx/CVE-2021-28796.json | 62 +++++++++++++++++++++++++++++++ 2021/3xxx/CVE-2021-3111.json | 5 +++ 45 files changed, 708 insertions(+), 97 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28788.json create mode 100644 2021/28xxx/CVE-2021-28789.json create mode 100644 2021/28xxx/CVE-2021-28790.json create mode 100644 2021/28xxx/CVE-2021-28791.json create mode 100644 2021/28xxx/CVE-2021-28792.json create mode 100644 2021/28xxx/CVE-2021-28793.json create mode 100644 2021/28xxx/CVE-2021-28794.json create mode 100644 2021/28xxx/CVE-2021-28795.json create mode 100644 2021/28xxx/CVE-2021-28796.json diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json index b43eb9ba746..7de6154d60d 100644 --- a/2020/13xxx/CVE-2020-13949.json +++ b/2020/13xxx/CVE-2020-13949.json @@ -243,6 +243,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20210317 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", "url": "https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hbase-issues] 20210318 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949", + "url": "https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E" } ] }, diff --git a/2020/17xxx/CVE-2020-17457.json b/2020/17xxx/CVE-2020-17457.json index 2103eedfcb7..c8eac6fd72f 100644 --- a/2020/17xxx/CVE-2020-17457.json +++ b/2020/17xxx/CVE-2020-17457.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.gruppotim.it/redteam", "url": "https://www.gruppotim.it/redteam" + }, + { + "refsource": "CONFIRM", + "name": "https://support.ts.fujitsu.com/IndexDownload.asp?Softwareguid=C67A44AE-B022-4150-8621-C4393C007ED9", + "url": "https://support.ts.fujitsu.com/IndexDownload.asp?Softwareguid=C67A44AE-B022-4150-8621-C4393C007ED9" } ] } diff --git a/2021/23xxx/CVE-2021-23337.json b/2021/23xxx/CVE-2021-23337.json index 0e314209086..4da1551888e 100644 --- a/2021/23xxx/CVE-2021-23337.json +++ b/2021/23xxx/CVE-2021-23337.json @@ -13,40 +13,21 @@ "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "lodash", + "product_name": "Lodash", "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "0" + "version_value": "prior to 4.17.21" } ] } } ] - }, - "vendor_name": "n/a" - }, - { - "product": { - "product_data": [ - { - "product_name": "org.fujion.webjars:lodash", - "version": { - "version_data": [ - { - "version_affected": ">=", - "version_value": "0" - } - ] - } - } - ] - }, - "vendor_name": "n/a" + } } ] } @@ -111,7 +92,7 @@ "description_data": [ { "lang": "eng", - "value": "All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Command Injection via template." + "value": "Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function." } ] }, diff --git a/2021/24xxx/CVE-2021-24123.json b/2021/24xxx/CVE-2021-24123.json index 47c6d238d92..d4b3b5e70e5 100644 --- a/2021/24xxx/CVE-2021-24123.json +++ b/2021/24xxx/CVE-2021-24123.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36", + "name": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36" } ] }, diff --git a/2021/24xxx/CVE-2021-24124.json b/2021/24xxx/CVE-2021-24124.json index 21887955551..58409143151 100644 --- a/2021/24xxx/CVE-2021-24124.json +++ b/2021/24xxx/CVE-2021-24124.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee", + "name": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee" } ] }, diff --git a/2021/24xxx/CVE-2021-24125.json b/2021/24xxx/CVE-2021-24125.json index e87dcb3c241..604d602cb38 100644 --- a/2021/24xxx/CVE-2021-24125.json +++ b/2021/24xxx/CVE-2021-24125.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178", + "name": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178" } ] }, diff --git a/2021/24xxx/CVE-2021-24126.json b/2021/24xxx/CVE-2021-24126.json index 60b214dc4ba..9535ce8a29a 100644 --- a/2021/24xxx/CVE-2021-24126.json +++ b/2021/24xxx/CVE-2021-24126.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3", + "name": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3" } ] }, diff --git a/2021/24xxx/CVE-2021-24127.json b/2021/24xxx/CVE-2021-24127.json index 2a734f032f7..a61148a7747 100644 --- a/2021/24xxx/CVE-2021-24127.json +++ b/2021/24xxx/CVE-2021-24127.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6", + "name": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6" } ] }, diff --git a/2021/24xxx/CVE-2021-24128.json b/2021/24xxx/CVE-2021-24128.json index d46ea729daa..24788320150 100644 --- a/2021/24xxx/CVE-2021-24128.json +++ b/2021/24xxx/CVE-2021-24128.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864", + "name": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864" } ] }, diff --git a/2021/24xxx/CVE-2021-24129.json b/2021/24xxx/CVE-2021-24129.json index dc9f684017d..2448e44b375 100644 --- a/2021/24xxx/CVE-2021-24129.json +++ b/2021/24xxx/CVE-2021-24129.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6", + "name": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6" } ] }, diff --git a/2021/24xxx/CVE-2021-24130.json b/2021/24xxx/CVE-2021-24130.json index 9ed8f2eae0b..9a68a25565c 100644 --- a/2021/24xxx/CVE-2021-24130.json +++ b/2021/24xxx/CVE-2021-24130.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8", + "name": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8" } ] }, diff --git a/2021/24xxx/CVE-2021-24131.json b/2021/24xxx/CVE-2021-24131.json index 5eec560532d..66c31ab3ee8 100644 --- a/2021/24xxx/CVE-2021-24131.json +++ b/2021/24xxx/CVE-2021-24131.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8", + "name": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8" } ] }, diff --git a/2021/24xxx/CVE-2021-24132.json b/2021/24xxx/CVE-2021-24132.json index e9ca6e63018..24e56d3b9d6 100644 --- a/2021/24xxx/CVE-2021-24132.json +++ b/2021/24xxx/CVE-2021-24132.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c", + "name": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c" } ] }, diff --git a/2021/24xxx/CVE-2021-24133.json b/2021/24xxx/CVE-2021-24133.json index 4f99f327102..cfc58283740 100644 --- a/2021/24xxx/CVE-2021-24133.json +++ b/2021/24xxx/CVE-2021-24133.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120", + "name": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120" } ] }, diff --git a/2021/24xxx/CVE-2021-24134.json b/2021/24xxx/CVE-2021-24134.json index 1f970674f94..94338aaeb88 100644 --- a/2021/24xxx/CVE-2021-24134.json +++ b/2021/24xxx/CVE-2021-24134.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b", + "name": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b" } ] }, diff --git a/2021/24xxx/CVE-2021-24135.json b/2021/24xxx/CVE-2021-24135.json index 9c8f5ff8b72..177e00f371d 100644 --- a/2021/24xxx/CVE-2021-24135.json +++ b/2021/24xxx/CVE-2021-24135.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3", + "name": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3" } ] }, diff --git a/2021/24xxx/CVE-2021-24136.json b/2021/24xxx/CVE-2021-24136.json index 8cabe1ed7be..fc70d0615e2 100644 --- a/2021/24xxx/CVE-2021-24136.json +++ b/2021/24xxx/CVE-2021-24136.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters:\n\n- Author\n- Job Title\n- Location\n- Company\n- Email\n- URL" + "value": "Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters: - Author - Job Title - Location - Company - Email - URL" } ] }, @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1", + "name": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1" } ] }, diff --git a/2021/24xxx/CVE-2021-24137.json b/2021/24xxx/CVE-2021-24137.json index ef3c7caf713..f4dbbff94f7 100644 --- a/2021/24xxx/CVE-2021-24137.json +++ b/2021/24xxx/CVE-2021-24137.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3", + "name": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3" } ] }, diff --git a/2021/24xxx/CVE-2021-24138.json b/2021/24xxx/CVE-2021-24138.json index e5d557298e9..1a28e3ce031 100644 --- a/2021/24xxx/CVE-2021-24138.json +++ b/2021/24xxx/CVE-2021-24138.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151", + "name": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151" } ] }, diff --git a/2021/24xxx/CVE-2021-24139.json b/2021/24xxx/CVE-2021-24139.json index 20872577ca3..66e8fb47417 100644 --- a/2021/24xxx/CVE-2021-24139.json +++ b/2021/24xxx/CVE-2021-24139.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28", + "name": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28" } ] }, diff --git a/2021/24xxx/CVE-2021-24140.json b/2021/24xxx/CVE-2021-24140.json index 9d713af1efc..60369f03f43 100644 --- a/2021/24xxx/CVE-2021-24140.json +++ b/2021/24xxx/CVE-2021-24140.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056", + "name": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056" } ] }, diff --git a/2021/24xxx/CVE-2021-24141.json b/2021/24xxx/CVE-2021-24141.json index df7296fa8fd..86e75d3337e 100644 --- a/2021/24xxx/CVE-2021-24141.json +++ b/2021/24xxx/CVE-2021-24141.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93", + "name": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93" } ] }, diff --git a/2021/24xxx/CVE-2021-24142.json b/2021/24xxx/CVE-2021-24142.json index 1a41b68ac2d..5f9b5f4c50c 100644 --- a/2021/24xxx/CVE-2021-24142.json +++ b/2021/24xxx/CVE-2021-24142.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14", + "name": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14" } ] }, diff --git a/2021/24xxx/CVE-2021-24143.json b/2021/24xxx/CVE-2021-24143.json index 0977b79052c..0931a597c8e 100644 --- a/2021/24xxx/CVE-2021-24143.json +++ b/2021/24xxx/CVE-2021-24143.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b", + "name": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b" } ] }, diff --git a/2021/24xxx/CVE-2021-24144.json b/2021/24xxx/CVE-2021-24144.json index 990e838d7e7..8bf0e1d91ad 100644 --- a/2021/24xxx/CVE-2021-24144.json +++ b/2021/24xxx/CVE-2021-24144.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48", + "name": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48" } ] }, diff --git a/2021/24xxx/CVE-2021-24145.json b/2021/24xxx/CVE-2021-24145.json index 50eb4713480..ba6d20622d1 100644 --- a/2021/24xxx/CVE-2021-24145.json +++ b/2021/24xxx/CVE-2021-24145.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610", + "name": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610" } ] }, diff --git a/2021/24xxx/CVE-2021-24146.json b/2021/24xxx/CVE-2021-24146.json index 8bd401e2525..9d27b4385d0 100644 --- a/2021/24xxx/CVE-2021-24146.json +++ b/2021/24xxx/CVE-2021-24146.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc", + "name": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc" } ] }, diff --git a/2021/24xxx/CVE-2021-24147.json b/2021/24xxx/CVE-2021-24147.json index 788010db723..0b0924be3f1 100644 --- a/2021/24xxx/CVE-2021-24147.json +++ b/2021/24xxx/CVE-2021-24147.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f", + "name": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f" } ] }, diff --git a/2021/24xxx/CVE-2021-24148.json b/2021/24xxx/CVE-2021-24148.json index 3454e89bf61..3ad6247992c 100644 --- a/2021/24xxx/CVE-2021-24148.json +++ b/2021/24xxx/CVE-2021-24148.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882", + "name": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882" } ] }, diff --git a/2021/24xxx/CVE-2021-24149.json b/2021/24xxx/CVE-2021-24149.json index ea0bc61299c..f1c170bc70c 100644 --- a/2021/24xxx/CVE-2021-24149.json +++ b/2021/24xxx/CVE-2021-24149.json @@ -65,8 +65,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0" + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0", + "name": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0" } ] }, diff --git a/2021/26xxx/CVE-2021-26215.json b/2021/26xxx/CVE-2021-26215.json index e5d662cccaf..54a6717bea5 100644 --- a/2021/26xxx/CVE-2021-26215.json +++ b/2021/26xxx/CVE-2021-26215.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26215", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26215", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seeddms.com", + "refsource": "MISC", + "name": "http://seeddms.com" + }, + { + "refsource": "MISC", + "name": "https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822", + "url": "https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822" } ] } diff --git a/2021/26xxx/CVE-2021-26216.json b/2021/26xxx/CVE-2021-26216.json index 7efe2a2eb6e..11791cf523f 100644 --- a/2021/26xxx/CVE-2021-26216.json +++ b/2021/26xxx/CVE-2021-26216.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26216", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26216", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seeddms.com", + "refsource": "MISC", + "name": "http://seeddms.com" + }, + { + "refsource": "MISC", + "name": "https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91", + "url": "https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91" } ] } diff --git a/2021/26xxx/CVE-2021-26855.json b/2021/26xxx/CVE-2021-26855.json index 24ceccc7fef..269e276a469 100644 --- a/2021/26xxx/CVE-2021-26855.json +++ b/2021/26xxx/CVE-2021-26855.json @@ -156,6 +156,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html", + "url": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html" } ] } diff --git a/2021/27xxx/CVE-2021-27292.json b/2021/27xxx/CVE-2021-27292.json index c7d34245111..6ec9e1e75ff 100644 --- a/2021/27xxx/CVE-2021-27292.json +++ b/2021/27xxx/CVE-2021-27292.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76", "url": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76" + }, + { + "refsource": "MISC", + "name": "https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566", + "url": "https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566" } ] } diff --git a/2021/28xxx/CVE-2021-28145.json b/2021/28xxx/CVE-2021-28145.json index 7c3b15e6664..9128b71d8ba 100644 --- a/2021/28xxx/CVE-2021-28145.json +++ b/2021/28xxx/CVE-2021-28145.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28145", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28145", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Concrete CMS (formerly concrete5) before 8.5.5 allows remote authenticated users to conduct XSS attacks via a crafted survey block. This requires at least Editor privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.concrete5.org/developers/security", + "refsource": "MISC", + "name": "https://www.concrete5.org/developers/security" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes", + "url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes" } ] } diff --git a/2021/28xxx/CVE-2021-28788.json b/2021/28xxx/CVE-2021-28788.json new file mode 100644 index 00000000000..b056be0940c --- /dev/null +++ b/2021/28xxx/CVE-2021-28788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28789.json b/2021/28xxx/CVE-2021-28789.json new file mode 100644 index 00000000000..6a4065e2eb1 --- /dev/null +++ b/2021/28xxx/CVE-2021-28789.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28789", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted apple-swift-format.path configuration value that triggers execution upon opening the workspace." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2", + "refsource": "MISC", + "name": "https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28790.json b/2021/28xxx/CVE-2021-28790.json new file mode 100644 index 00000000000..f764662f2b7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28790.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28790", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configuration value that triggers execution upon opening the workspace." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5", + "refsource": "MISC", + "name": "https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28791.json b/2021/28xxx/CVE-2021-28791.json new file mode 100644 index 00000000000..f60b46ccc41 --- /dev/null +++ b/2021/28xxx/CVE-2021-28791.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28791", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unofficial SwiftFormat extension before 1.3.7 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftformat.path configuration value that triggers execution upon opening the workspace." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vknabel/vscode-swiftformat/releases/tag/1.3.7", + "refsource": "MISC", + "name": "https://github.com/vknabel/vscode-swiftformat/releases/tag/1.3.7" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28792.json b/2021/28xxx/CVE-2021-28792.json new file mode 100644 index 00000000000..fefc2a128ce --- /dev/null +++ b/2021/28xxx/CVE-2021-28792.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28792", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unofficial Swift Development Environment extension before 2.12.1 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted sourcekit-lsp.serverPath, swift.languageServerPath, swift.path.sourcekite, swift.path.sourcekiteDockerMode, swift.path.swift_driver_bin, or swift.path.shell configuration value that triggers execution upon opening the workspace." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.12.1", + "refsource": "MISC", + "name": "https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.12.1" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28793.json b/2021/28xxx/CVE-2021-28793.json new file mode 100644 index 00000000000..c2a34a8ea62 --- /dev/null +++ b/2021/28xxx/CVE-2021-28793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28794.json b/2021/28xxx/CVE-2021-28794.json new file mode 100644 index 00000000000..6bf0d4207d4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28794.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28794", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unofficial ShellCheck extension before 0.13.4 for Visual Studio Code mishandles shellcheck.executablePath." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/timonwong/vscode-shellcheck/pull/181", + "refsource": "MISC", + "name": "https://github.com/timonwong/vscode-shellcheck/pull/181" + }, + { + "url": "https://github.com/timonwong/vscode-shellcheck/releases/tag/v0.13.4", + "refsource": "MISC", + "name": "https://github.com/timonwong/vscode-shellcheck/releases/tag/v0.13.4" + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28795.json b/2021/28xxx/CVE-2021-28795.json new file mode 100644 index 00000000000..0c408d5d1d7 --- /dev/null +++ b/2021/28xxx/CVE-2021-28795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28796.json b/2021/28xxx/CVE-2021-28796.json new file mode 100644 index 00000000000..e57461e5473 --- /dev/null +++ b/2021/28xxx/CVE-2021-28796.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-28796", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Increments Qiita::Markdown before 0.33.0 allows XSS in transformers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0", + "refsource": "MISC", + "name": "https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0" + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3111.json b/2021/3xxx/CVE-2021-3111.json index b201c3260c5..64e34254688 100644 --- a/2021/3xxx/CVE-2021-3111.json +++ b/2021/3xxx/CVE-2021-3111.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes", + "url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes" } ] } From e675c2ed1d1c579f0b539cc843dbf240aa566cf4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 17:00:48 +0000 Subject: [PATCH 416/845] "-Synchronized-Data." --- 2020/16xxx/CVE-2020-16230.json | 10 +++--- 2020/26xxx/CVE-2020-26155.json | 61 ++++++++++++++++++++++++++++++---- 2020/27xxx/CVE-2020-27827.json | 55 ++++++++++++++++++++++++++++-- 2020/28xxx/CVE-2020-28500.json | 29 +++------------- 2020/5xxx/CVE-2020-5258.json | 5 +++ 5 files changed, 122 insertions(+), 38 deletions(-) diff --git a/2020/16xxx/CVE-2020-16230.json b/2020/16xxx/CVE-2020-16230.json index 3e27da40320..a140550b3f2 100644 --- a/2020/16xxx/CVE-2020-16230.json +++ b/2020/16xxx/CVE-2020-16230.json @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "WebAccess/SCADA Versions 9.0 and prior" + "version_value": "versions 9.0 and prior" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "EXTERNAL CONTROL OF FILE NAME OR PATH CWE-73" + "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79" } ] } @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01", - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01" + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01" } ] }, @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "The WADashboard component of WebAccess/SCADA may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator." + "value": "WebAccess/SCADA Versions 9.0 and prior are vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user\u2019s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions." } ] } diff --git a/2020/26xxx/CVE-2020-26155.json b/2020/26xxx/CVE-2020-26155.json index c889aaf8a72..6b14700c01e 100644 --- a/2020/26xxx/CVE-2020-26155.json +++ b/2020/26xxx/CVE-2020-26155.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-26155", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-26155", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/", + "refsource": "MISC", + "name": "https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/" + }, + { + "refsource": "MISC", + "name": "https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/", + "url": "https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/" } ] } diff --git a/2020/27xxx/CVE-2020-27827.json b/2020/27xxx/CVE-2020-27827.json index a5b8017087a..7c631da96c1 100644 --- a/2020/27xxx/CVE-2020-27827.json +++ b/2020/27xxx/CVE-2020-27827.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27827", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "lldp/openvswitch", + "version": { + "version_data": [ + { + "version_value": "lldpd 1.0.8, openvswitch 2.14.1, openvswitch 2.13.2, openvswitch 2.12.2, openvswitch 2.11.5, openvswitch 2.10.6, openvswitch 2.9.8, openvswitch 2.8.10, openvswitch 2.7.12, openvswitch 2.6.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1921438", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921438" + }, + { + "refsource": "MISC", + "name": "https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html", + "url": "https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2020/28xxx/CVE-2020-28500.json b/2020/28xxx/CVE-2020-28500.json index 01a663347d7..761e11c91a5 100644 --- a/2020/28xxx/CVE-2020-28500.json +++ b/2020/28xxx/CVE-2020-28500.json @@ -13,40 +13,21 @@ "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "lodash", + "product_name": "Lodash", "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "0" + "version_value": "versions prior to 4.17.21" } ] } } ] - }, - "vendor_name": "n/a" - }, - { - "product": { - "product_data": [ - { - "product_name": "org.fujion.webjars:lodash", - "version": { - "version_data": [ - { - "version_affected": ">=", - "version_value": "0" - } - ] - } - } - ] - }, - "vendor_name": "n/a" + } } ] } @@ -116,7 +97,7 @@ "description_data": [ { "lang": "eng", - "value": "All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = \"1\" for (var i = 0; i < n; i++) { ret += \" \" } return ret + \"1\"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log(\"time_cost0: \" + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log(\"time_cost1: \" + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log(\"time_cost2: \" + time_cost2)" + "value": "Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions." } ] }, diff --git a/2020/5xxx/CVE-2020-5258.json b/2020/5xxx/CVE-2020-5258.json index 7e292b176e7..75f4f74a1fb 100644 --- a/2020/5xxx/CVE-2020-5258.json +++ b/2020/5xxx/CVE-2020-5258.json @@ -110,6 +110,11 @@ "refsource": "MLIST", "name": "[qpid-users] 20210314 Re: Addressing CVE-2020-5258 in Qpid Broker-J", "url": "https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[qpid-users] 20210318 Re: Addressing CVE-2020-5258 in Qpid Broker-J", + "url": "https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E" } ] }, From 9f2c2978ddf199ed537758c86b580e6d0bd3d5f6 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Thu, 18 Mar 2021 11:05:57 -0600 Subject: [PATCH 417/845] Add CVE-2021-21383 for GHSA-6xx4-m8gx-826r --- 2021/21xxx/CVE-2021-21383.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2021/21xxx/CVE-2021-21383.json b/2021/21xxx/CVE-2021-21383.json index ac984bfd374..f81f215145c 100644 --- a/2021/21xxx/CVE-2021-21383.json +++ b/2021/21xxx/CVE-2021-21383.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21383", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "XSS in Wiki.js" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "wiki", + "version": { + "version_data": [ + { + "version_value": "< 2.5.191" + } + ] + } + } + ] + }, + "vendor_name": "Requarks" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wiki.js an open-source wiki app built on Node.js. Wiki.js before version 2.5.191 is vulnerable to stored cross-site scripting through mustache expressions in code blocks. This vulnerability exists due to mustache expressions being parsed by Vue during content injection even though it is contained within a `
` element. By creating a crafted wiki page, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the page is viewed by other users. For an example see referenced GitHub Security Advisory. Commit 5ffa189383dd716f12b56b8cae2ba0d075996cf1 fixes this vulnerability by adding the v-pre directive to all `
` tags during the render."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 7.6,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/Requarks/wiki/security/advisories/GHSA-6xx4-m8gx-826r",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/Requarks/wiki/security/advisories/GHSA-6xx4-m8gx-826r"
+            },
+            {
+                "name": "https://github.com/Requarks/wiki/commit/5ffa189383dd716f12b56b8cae2ba0d075996cf1",
+                "refsource": "MISC",
+                "url": "https://github.com/Requarks/wiki/commit/5ffa189383dd716f12b56b8cae2ba0d075996cf1"
+            },
+            {
+                "name": "https://github.com/Requarks/wiki/releases/tag/2.5.191",
+                "refsource": "MISC",
+                "url": "https://github.com/Requarks/wiki/releases/tag/2.5.191"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-6xx4-m8gx-826r",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From d869406f1a450de05da055a40f1b3bb23afc8615 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 18 Mar 2021 18:00:50 +0000
Subject: [PATCH 418/845] "-Synchronized-Data."

---
 2020/14xxx/CVE-2020-14516.json | 50 +++++++++++++++--
 2021/22xxx/CVE-2021-22665.json | 55 +++++++++++++++++--
 2021/22xxx/CVE-2021-22697.json |  5 ++
 2021/22xxx/CVE-2021-22698.json |  5 ++
 2021/27xxx/CVE-2021-27656.json | 98 +++++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28797.json | 18 +++++++
 2021/28xxx/CVE-2021-28798.json | 18 +++++++
 2021/28xxx/CVE-2021-28799.json | 18 +++++++
 2021/28xxx/CVE-2021-28800.json | 18 +++++++
 2021/28xxx/CVE-2021-28801.json | 18 +++++++
 2021/28xxx/CVE-2021-28802.json | 18 +++++++
 2021/28xxx/CVE-2021-28803.json | 18 +++++++
 2021/28xxx/CVE-2021-28804.json | 18 +++++++
 2021/28xxx/CVE-2021-28805.json | 18 +++++++
 2021/28xxx/CVE-2021-28806.json | 18 +++++++
 2021/28xxx/CVE-2021-28807.json | 18 +++++++
 2021/28xxx/CVE-2021-28808.json | 18 +++++++
 2021/28xxx/CVE-2021-28809.json | 18 +++++++
 2021/28xxx/CVE-2021-28810.json | 18 +++++++
 2021/28xxx/CVE-2021-28811.json | 18 +++++++
 2021/28xxx/CVE-2021-28812.json | 18 +++++++
 2021/28xxx/CVE-2021-28813.json | 18 +++++++
 2021/28xxx/CVE-2021-28814.json | 18 +++++++
 2021/28xxx/CVE-2021-28815.json | 18 +++++++
 2021/28xxx/CVE-2021-28816.json | 18 +++++++
 2021/28xxx/CVE-2021-28817.json | 18 +++++++
 2021/28xxx/CVE-2021-28818.json | 18 +++++++
 2021/28xxx/CVE-2021-28819.json | 18 +++++++
 2021/28xxx/CVE-2021-28820.json | 18 +++++++
 2021/28xxx/CVE-2021-28821.json | 18 +++++++
 2021/28xxx/CVE-2021-28822.json | 18 +++++++
 2021/28xxx/CVE-2021-28823.json | 18 +++++++
 2021/28xxx/CVE-2021-28824.json | 18 +++++++
 2021/28xxx/CVE-2021-28825.json | 18 +++++++
 2021/28xxx/CVE-2021-28826.json | 18 +++++++
 2021/28xxx/CVE-2021-28827.json | 18 +++++++
 2021/28xxx/CVE-2021-28828.json | 18 +++++++
 2021/28xxx/CVE-2021-28829.json | 18 +++++++
 2021/28xxx/CVE-2021-28830.json | 18 +++++++
 39 files changed, 813 insertions(+), 12 deletions(-)
 create mode 100644 2021/28xxx/CVE-2021-28797.json
 create mode 100644 2021/28xxx/CVE-2021-28798.json
 create mode 100644 2021/28xxx/CVE-2021-28799.json
 create mode 100644 2021/28xxx/CVE-2021-28800.json
 create mode 100644 2021/28xxx/CVE-2021-28801.json
 create mode 100644 2021/28xxx/CVE-2021-28802.json
 create mode 100644 2021/28xxx/CVE-2021-28803.json
 create mode 100644 2021/28xxx/CVE-2021-28804.json
 create mode 100644 2021/28xxx/CVE-2021-28805.json
 create mode 100644 2021/28xxx/CVE-2021-28806.json
 create mode 100644 2021/28xxx/CVE-2021-28807.json
 create mode 100644 2021/28xxx/CVE-2021-28808.json
 create mode 100644 2021/28xxx/CVE-2021-28809.json
 create mode 100644 2021/28xxx/CVE-2021-28810.json
 create mode 100644 2021/28xxx/CVE-2021-28811.json
 create mode 100644 2021/28xxx/CVE-2021-28812.json
 create mode 100644 2021/28xxx/CVE-2021-28813.json
 create mode 100644 2021/28xxx/CVE-2021-28814.json
 create mode 100644 2021/28xxx/CVE-2021-28815.json
 create mode 100644 2021/28xxx/CVE-2021-28816.json
 create mode 100644 2021/28xxx/CVE-2021-28817.json
 create mode 100644 2021/28xxx/CVE-2021-28818.json
 create mode 100644 2021/28xxx/CVE-2021-28819.json
 create mode 100644 2021/28xxx/CVE-2021-28820.json
 create mode 100644 2021/28xxx/CVE-2021-28821.json
 create mode 100644 2021/28xxx/CVE-2021-28822.json
 create mode 100644 2021/28xxx/CVE-2021-28823.json
 create mode 100644 2021/28xxx/CVE-2021-28824.json
 create mode 100644 2021/28xxx/CVE-2021-28825.json
 create mode 100644 2021/28xxx/CVE-2021-28826.json
 create mode 100644 2021/28xxx/CVE-2021-28827.json
 create mode 100644 2021/28xxx/CVE-2021-28828.json
 create mode 100644 2021/28xxx/CVE-2021-28829.json
 create mode 100644 2021/28xxx/CVE-2021-28830.json

diff --git a/2020/14xxx/CVE-2020-14516.json b/2020/14xxx/CVE-2020-14516.json
index 4d1d0b25233..db13d3cd7aa 100644
--- a/2020/14xxx/CVE-2020-14516.json
+++ b/2020/14xxx/CVE-2020-14516.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-14516",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Rockwell Automation FactoryTalk Services Platform",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "v6.10.00, v6.11.00"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22665.json b/2021/22xxx/CVE-2021-22665.json
index 6733ec01c78..50ac0416a8a 100644
--- a/2021/22xxx/CVE-2021-22665.json
+++ b/2021/22xxx/CVE-2021-22665.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22665",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Rockwell Automation DriveTools SP and Drives AOP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "DriveTools SP v5.13 and below and Drives AOP v4.12 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "UNCONTROLLED SEARCH PATH ELEMENT CWE-427"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-042-02",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-042-02"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129798",
+                "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129798"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vulnerability that a local attacker with limited privileges may be able to exploit resulting in privilege escalation and complete control of the system."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22697.json b/2021/22xxx/CVE-2021-22697.json
index 2a9a092238a..a49f3382f4e 100644
--- a/2021/22xxx/CVE-2021-22697.json
+++ b/2021/22xxx/CVE-2021-22697.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-186/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-186/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-01",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-01"
             }
         ]
     },
diff --git a/2021/22xxx/CVE-2021-22698.json b/2021/22xxx/CVE-2021-22698.json
index 7c90dabd8c4..b8fa996010b 100644
--- a/2021/22xxx/CVE-2021-22698.json
+++ b/2021/22xxx/CVE-2021-22698.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-187/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-187/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-01",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-01"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27656.json b/2021/27xxx/CVE-2021-27656.json
index ea8595068e1..29aeda3d1b0 100644
--- a/2021/27xxx/CVE-2021-27656.json
+++ b/2021/27xxx/CVE-2021-27656.json
@@ -1,18 +1,104 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "productsecurity@jci.com",
+        "DATE_PUBLIC": "2021-03-18T12:37:00.000Z",
         "ID": "CVE-2021-27656",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "exacqVision Web Services - Information Exposure"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "exacqVision Web Service version 20.12.2.0 and prior",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "20.12.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Johnson Controls"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Milan Kyselica reported this vulnerability to Johnson Controls, Inc."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability in exacqVision Web Service 20.12.2.0 and prior could allow an unauthenticated attacker to view system-level information about the exacqVision Web Service and the operating system."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE 200 : Information Exposure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories",
+                "refsource": "CONFIRM",
+                "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
+            },
+            {
+                "name": "ICS-CERT Advisory",
+                "refsource": "CERT",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-077-01"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "Upgrade all versions of exacqVision Web Service to v21.03.3 or later.  Web Service 21.03.3 or later will only provide a full response to health.web info when authorized.\n\nUsers can obtain the software update by downloading the update found here: https://exacq.com/support/downloads.php."
+        }
+    ],
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28797.json b/2021/28xxx/CVE-2021-28797.json
new file mode 100644
index 00000000000..3b23d294295
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28797.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28797",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28798.json b/2021/28xxx/CVE-2021-28798.json
new file mode 100644
index 00000000000..5c47e4fb653
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28798.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28798",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28799.json b/2021/28xxx/CVE-2021-28799.json
new file mode 100644
index 00000000000..abc055dc0a5
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28799.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28799",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28800.json b/2021/28xxx/CVE-2021-28800.json
new file mode 100644
index 00000000000..0de43f777e2
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28800.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28800",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28801.json b/2021/28xxx/CVE-2021-28801.json
new file mode 100644
index 00000000000..f57803e7417
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28801.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28801",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28802.json b/2021/28xxx/CVE-2021-28802.json
new file mode 100644
index 00000000000..3f1e2461457
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28802.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28802",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28803.json b/2021/28xxx/CVE-2021-28803.json
new file mode 100644
index 00000000000..7a0e7f26990
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28803.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28803",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28804.json b/2021/28xxx/CVE-2021-28804.json
new file mode 100644
index 00000000000..d1d450cb704
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28804.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28804",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28805.json b/2021/28xxx/CVE-2021-28805.json
new file mode 100644
index 00000000000..55dfc07b167
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28805.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28805",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28806.json b/2021/28xxx/CVE-2021-28806.json
new file mode 100644
index 00000000000..f79384e63bd
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28806.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28806",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28807.json b/2021/28xxx/CVE-2021-28807.json
new file mode 100644
index 00000000000..385cf2d5998
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28807.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28807",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28808.json b/2021/28xxx/CVE-2021-28808.json
new file mode 100644
index 00000000000..9aff37a9044
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28808.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28808",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28809.json b/2021/28xxx/CVE-2021-28809.json
new file mode 100644
index 00000000000..3ef83540593
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28809.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28809",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28810.json b/2021/28xxx/CVE-2021-28810.json
new file mode 100644
index 00000000000..c1403306238
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28810.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28810",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28811.json b/2021/28xxx/CVE-2021-28811.json
new file mode 100644
index 00000000000..5149efd0ce8
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28811.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28811",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28812.json b/2021/28xxx/CVE-2021-28812.json
new file mode 100644
index 00000000000..7dcdfac441d
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28812.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28812",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28813.json b/2021/28xxx/CVE-2021-28813.json
new file mode 100644
index 00000000000..f66ae3d5b46
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28813.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28813",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28814.json b/2021/28xxx/CVE-2021-28814.json
new file mode 100644
index 00000000000..eb4d9456375
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28814.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28814",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28815.json b/2021/28xxx/CVE-2021-28815.json
new file mode 100644
index 00000000000..5921acda088
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28815.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28815",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28816.json b/2021/28xxx/CVE-2021-28816.json
new file mode 100644
index 00000000000..ae85ade0011
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28816.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28816",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28817.json b/2021/28xxx/CVE-2021-28817.json
new file mode 100644
index 00000000000..c5b4e56851c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28817.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28817",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28818.json b/2021/28xxx/CVE-2021-28818.json
new file mode 100644
index 00000000000..0e1271ce5c8
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28818.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28818",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28819.json b/2021/28xxx/CVE-2021-28819.json
new file mode 100644
index 00000000000..b167421340c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28819.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28819",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28820.json b/2021/28xxx/CVE-2021-28820.json
new file mode 100644
index 00000000000..6ba7a300710
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28820.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28820",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28821.json b/2021/28xxx/CVE-2021-28821.json
new file mode 100644
index 00000000000..21a47735ad9
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28821.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28821",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28822.json b/2021/28xxx/CVE-2021-28822.json
new file mode 100644
index 00000000000..85ccfee6cf5
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28822.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28822",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28823.json b/2021/28xxx/CVE-2021-28823.json
new file mode 100644
index 00000000000..6529b91d09e
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28823.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28823",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28824.json b/2021/28xxx/CVE-2021-28824.json
new file mode 100644
index 00000000000..b924b05ffe2
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28824.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28824",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28825.json b/2021/28xxx/CVE-2021-28825.json
new file mode 100644
index 00000000000..c00bb0e0762
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28825.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28825",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28826.json b/2021/28xxx/CVE-2021-28826.json
new file mode 100644
index 00000000000..f89286e80de
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28826.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28826",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28827.json b/2021/28xxx/CVE-2021-28827.json
new file mode 100644
index 00000000000..7c1019f3447
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28827.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28827",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28828.json b/2021/28xxx/CVE-2021-28828.json
new file mode 100644
index 00000000000..ef5e91e79b0
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28828.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28828",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28829.json b/2021/28xxx/CVE-2021-28829.json
new file mode 100644
index 00000000000..1203cc54763
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28829.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28829",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28830.json b/2021/28xxx/CVE-2021-28830.json
new file mode 100644
index 00000000000..c87f28bfda9
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28830.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28830",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 79250135043fefa9bff6874c1bbb96d1e8a29215 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Thu, 18 Mar 2021 18:33:33 +0000
Subject: [PATCH 419/845] Adding Cisco CVE-2021-1287

---
 2021/1xxx/CVE-2021-1287.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1287.json b/2021/1xxx/CVE-2021-1287.json
index 0aa846730ed..6776b63a45e 100644
--- a/2021/1xxx/CVE-2021-1287.json
+++ b/2021/1xxx/CVE-2021-1287.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-17T16:00:00",
         "ID": "CVE-2021-1287",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Small Business RV132W and RV134W Routers Management Interface Remote Command Execution and Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Small Business RV Series Router Firmware ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device. "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.2",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-121"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210317 Cisco Small Business RV132W and RV134W Routers Management Interface Remote Command Execution and Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-132w134w-overflow-Pptt4H2p"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-rv-132w134w-overflow-Pptt4H2p",
+        "defect": [
+            [
+                "CSCvw65031",
+                "CSCvw65032"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 0891c074986935ad7219ec4bf7b2421ee95493ef Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 18 Mar 2021 19:00:55 +0000
Subject: [PATCH 420/845] "-Synchronized-Data."

---
 2019/14xxx/CVE-2019-14848.json | 18 +++++++++
 2019/14xxx/CVE-2019-14850.json | 67 ++++++++++++++++++++++++++++++++++
 2019/14xxx/CVE-2019-14903.json | 18 +++++++++
 2019/14xxx/CVE-2019-14908.json | 18 +++++++++
 2019/3xxx/CVE-2019-3867.json   | 58 +++++++++++++++++++++++++----
 2020/35xxx/CVE-2020-35492.json | 50 +++++++++++++++++++++++--
 2021/1xxx/CVE-2021-1287.json   |  4 +-
 2021/28xxx/CVE-2021-28160.json | 61 ++++++++++++++++++++++++++++---
 8 files changed, 276 insertions(+), 18 deletions(-)
 create mode 100644 2019/14xxx/CVE-2019-14848.json
 create mode 100644 2019/14xxx/CVE-2019-14850.json
 create mode 100644 2019/14xxx/CVE-2019-14903.json
 create mode 100644 2019/14xxx/CVE-2019-14908.json

diff --git a/2019/14xxx/CVE-2019-14848.json b/2019/14xxx/CVE-2019-14848.json
new file mode 100644
index 00000000000..3d45ad2b7bb
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14848.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14848",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14850.json b/2019/14xxx/CVE-2019-14850.json
new file mode 100644
index 00000000000..c80c532e2c9
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14850.json
@@ -0,0 +1,67 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14850",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "nbdkit",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "nbdkit 1.12.7, nbdkit 1.14.1, nbdkit 1.15.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-406"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1757258",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757258"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.redhat.com/archives/libguestfs/2019-September/msg00084.html",
+                "url": "https://www.redhat.com/archives/libguestfs/2019-September/msg00084.html"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the service. This vulnerability could cause resource consumption and degradation of service in nbdkit, depending on the plugins configured on the server-side."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14903.json b/2019/14xxx/CVE-2019-14903.json
new file mode 100644
index 00000000000..82825ba3f94
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14903.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14903",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14908.json b/2019/14xxx/CVE-2019-14908.json
new file mode 100644
index 00000000000..ed9704135cc
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14908.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14908",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/3xxx/CVE-2019-3867.json b/2019/3xxx/CVE-2019-3867.json
index 44b5bef0fdf..ce50cfdaf73 100644
--- a/2019/3xxx/CVE-2019-3867.json
+++ b/2019/3xxx/CVE-2019-3867.json
@@ -1,17 +1,61 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2019-3867",
-        "STATE": "RESERVED"
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-3867",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "quay",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "As shipped in Red Hat Quay 2 and 3."
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-613"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1772704",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772704"
+            }
+        ]
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability was found in the Quay web application. Sessions in the Quay web application never expire. An attacker, able to gain access to a session, could use it to control or delete a user's container repository. Red Hat Quay 2 and 3 are vulnerable to this issue."
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35492.json b/2020/35xxx/CVE-2020-35492.json
index 8ceb89c2291..5df33b743f6 100644
--- a/2020/35xxx/CVE-2020-35492.json
+++ b/2020/35xxx/CVE-2020-35492.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-35492",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "cairo",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All cairo versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-121"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1898396",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898396"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability."
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1287.json b/2021/1xxx/CVE-2021-1287.json
index 6776b63a45e..9a6d09be4b7 100644
--- a/2021/1xxx/CVE-2021-1287.json
+++ b/2021/1xxx/CVE-2021-1287.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device. "
+                "value": "A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28160.json b/2021/28xxx/CVE-2021-28160.json
index 6ccd1e9f695..a88f85eb141 100644
--- a/2021/28xxx/CVE-2021-28160.json
+++ b/2021/28xxx/CVE-2021-28160.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28160",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28160",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Stored XSS on Acexy (BoyaMicro) Wireless-N WiFi Repeater 28.08.06.1 version 1.0 devices can occur via a malformed SSID field during scanning for nearby access points, which also occurs when a device's user visits the Repeater Wizard web management section. This enables an attacker to steal LAN credentials without being connected to the device."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.amazon.com/Extender-Wireless-Repeater-External-Antennas/dp/B08GMCC6X2/",
+                "refsource": "MISC",
+                "name": "https://www.amazon.com/Extender-Wireless-Repeater-External-Antennas/dp/B08GMCC6X2/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990",
+                "url": "https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990"
             }
         ]
     }

From 4b03def998baa7edd3aa5bca0e5bbf169ffdb01a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 18 Mar 2021 20:00:48 +0000
Subject: [PATCH 421/845] "-Synchronized-Data."

---
 2019/14xxx/CVE-2019-14851.json | 67 ++++++++++++++++++++++++++++++++++
 2019/14xxx/CVE-2019-14852.json | 62 +++++++++++++++++++++++++++++++
 2020/13xxx/CVE-2020-13936.json | 10 +++++
 2020/26xxx/CVE-2020-26797.json | 56 +++++++++++++++++++++++++---
 2020/26xxx/CVE-2020-26886.json | 66 ++++++++++++++++++++++++++++++---
 2020/36xxx/CVE-2020-36144.json | 61 ++++++++++++++++++++++++++++---
 2020/9xxx/CVE-2020-9367.json   | 56 +++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25764.json | 61 ++++++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27358.json | 61 ++++++++++++++++++++++++++++---
 2021/3xxx/CVE-2021-3416.json   | 55 ++++++++++++++++++++++++++--
 10 files changed, 516 insertions(+), 39 deletions(-)
 create mode 100644 2019/14xxx/CVE-2019-14851.json
 create mode 100644 2019/14xxx/CVE-2019-14852.json

diff --git a/2019/14xxx/CVE-2019-14851.json b/2019/14xxx/CVE-2019-14851.json
new file mode 100644
index 00000000000..06aead234d0
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14851.json
@@ -0,0 +1,67 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14851",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "nbdkit",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "nbdkit 1.12.8, nbdkit 1.14.2, nbdkit 1.15.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-617"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1757259",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757259"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html",
+                "url": "https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14852.json b/2019/14xxx/CVE-2019-14852.json
new file mode 100644
index 00000000000..d0db60f0daf
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14852.json
@@ -0,0 +1,62 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14852",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "apicast",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "As shipped with Red Hat 3scale API Management Platform"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-327"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1758208",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758208"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A flaw was found in 3scale\u2019s APIcast gateway that enabled the TLS 1.0 protocol. An attacker could target traffic using this weaker protocol and break its encryption, gaining access to unauthorized information. Version shipped in Red Hat 3scale API Management Platform is vulnerable to this issue."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 98f57a03733..6273b49f41d 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -99,6 +99,16 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210317 [SECURITY] [DLA 2595-1] velocity security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210318 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210318 [jira] [Created] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340@%3Cdev.ws.apache.org%3E"
             }
         ]
     },
diff --git a/2020/26xxx/CVE-2020-26797.json b/2020/26xxx/CVE-2020-26797.json
index 98cf862767c..fb532c5314a 100644
--- a/2020/26xxx/CVE-2020-26797.json
+++ b/2020/26xxx/CVE-2020-26797.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-26797",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-26797",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Mediainfo before version 20.08 has a heap buffer overflow vulnerability via MediaInfoLib::File_Gxf::ChooseParser_ChannelGrouping."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://sourceforge.net/p/mediainfo/bugs/1154/",
+                "refsource": "MISC",
+                "name": "https://sourceforge.net/p/mediainfo/bugs/1154/"
             }
         ]
     }
diff --git a/2020/26xxx/CVE-2020-26886.json b/2020/26xxx/CVE-2020-26886.json
index b9972ee7025..7a8f173de15 100644
--- a/2020/26xxx/CVE-2020-26886.json
+++ b/2020/26xxx/CVE-2020-26886.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-26886",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-26886",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Softaculous before 5.5.7 is affected by a code execution vulnerability because of External Initialization of Trusted Variables or Data Stores. This leads to privilege escalation on the local host."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.softaculous.com/board/index.php?tid=17086&title=Softaculous_5.5.7_Launched",
+                "refsource": "MISC",
+                "name": "https://www.softaculous.com/board/index.php?tid=17086&title=Softaculous_5.5.7_Launched"
+            },
+            {
+                "url": "https://vulnerable.af",
+                "refsource": "MISC",
+                "name": "https://vulnerable.af"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://vulnerable.af/posts/cve-2020-26886/",
+                "url": "https://vulnerable.af/posts/cve-2020-26886/"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36144.json b/2020/36xxx/CVE-2020-36144.json
index be64de42365..10d292a40b5 100644
--- a/2020/36xxx/CVE-2020-36144.json
+++ b/2020/36xxx/CVE-2020-36144.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-36144",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-36144",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Redash 8.0.0 is affected by LDAP Injection. There is an authentication bypass and information leak through the crafting of special queries, escaping the provided template because the ldap_user = auth_ldap_user(request.form[\"email\"], request.form[\"password\"]) auth_ldap_user(username, password) settings.LDAP_SEARCH_TEMPLATE % {\"username\": username} code lacks sanitization."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/getredash/redash/releases",
+                "url": "https://github.com/getredash/redash/releases"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/getredash/redash/issues/5426",
+                "url": "https://github.com/getredash/redash/issues/5426"
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9367.json b/2020/9xxx/CVE-2020-9367.json
index 265d8ce157d..99fdd3467c7 100644
--- a/2020/9xxx/CVE-2020-9367.json
+++ b/2020/9xxx/CVE-2020-9367.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-9367",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-9367",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The MPS Agent in Zoho ManageEngine Desktop Central MSP build MSP build 10.0.486 is vulnerable to DLL Hijacking: dcinventory.exe and dcconfig.exe try to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because this DLL is missing from the installation, thus making it possible to hijack the DLL and subsequently inject code, leading to an escalation of privilege to NT AUTHORITY\\SYSTEM."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.manageengine.com/desktop-management-msp/dll-hijacking-vulnerability.html",
+                "url": "https://www.manageengine.com/desktop-management-msp/dll-hijacking-vulnerability.html"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25764.json b/2021/25xxx/CVE-2021-25764.json
index 0b0d2e1ef62..6e1c3ac67d3 100644
--- a/2021/25xxx/CVE-2021-25764.json
+++ b/2021/25xxx/CVE-2021-25764.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25764",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25764",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In JetBrains PhpStorm before 2020.3, source code could be added to debug logs."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://blog.jetbrains.com",
+                "refsource": "MISC",
+                "name": "https://blog.jetbrains.com"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/",
+                "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27358.json b/2021/27xxx/CVE-2021-27358.json
index 934844c4186..7f4ea029781 100644
--- a/2021/27xxx/CVE-2021-27358.json
+++ b/2021/27xxx/CVE-2021-27358.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27358",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27358",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The snapshot feature in Grafana before 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md",
+                "url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3416.json b/2021/3xxx/CVE-2021-3416.json
index 4e2635beb0b..b0bff65bada 100644
--- a/2021/3xxx/CVE-2021-3416.json
+++ b/2021/3xxx/CVE-2021-3416.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3416",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "QEMU",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "versions up to and including 5.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-835"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1932827",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932827"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/02/26/1",
+                "url": "https://www.openwall.com/lists/oss-security/2021/02/26/1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario."
             }
         ]
     }

From f39f69e716e0d2a83f7ac2f3bfe750c0cd046155 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 18 Mar 2021 21:00:46 +0000
Subject: [PATCH 422/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28395.json | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28395.json b/2020/28xxx/CVE-2020-28395.json
index f54bdd210bf..3e8eefc4f21 100644
--- a/2020/28xxx/CVE-2020-28395.json
+++ b/2020/28xxx/CVE-2020-28395.json
@@ -53,14 +53,14 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "MISC",
-                "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf",
-                "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf"
+                "refsource": "CONFIRM",
+                "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf",
+                "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf"
             },
             {
                 "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-061/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-061/"
+                "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf",
+                "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf"
             },
             {
                 "refsource": "MISC",

From 94e75484df0b597a0b7e4477151e0915308f698a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 18 Mar 2021 22:00:41 +0000
Subject: [PATCH 423/845] "-Synchronized-Data."

---
 2020/16xxx/CVE-2020-16230.json | 12 ++++----
 2021/27xxx/CVE-2021-27436.json | 50 ++++++++++++++++++++++++++++++++--
 2021/28xxx/CVE-2021-28160.json |  2 +-
 3 files changed, 54 insertions(+), 10 deletions(-)

diff --git a/2020/16xxx/CVE-2020-16230.json b/2020/16xxx/CVE-2020-16230.json
index a140550b3f2..3fd8c59c333 100644
--- a/2020/16xxx/CVE-2020-16230.json
+++ b/2020/16xxx/CVE-2020-16230.json
@@ -15,11 +15,11 @@
                     "product": {
                         "product_data": [
                             {
-                                "product_name": "Advantech WebAccess/SCADA",
+                                "product_name": "HMS Networks Ewon Flexy and Cosy",
                                 "version": {
                                     "version_data": [
                                         {
-                                            "version_value": "versions 9.0 and prior"
+                                            "version_value": "All versions prior to 14.1"
                                         }
                                     ]
                                 }
@@ -36,7 +36,7 @@
                 "description": [
                     {
                         "lang": "eng",
-                        "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79"
+                        "value": "PERMISSIVE CROSS-DOMAIN POLICY WITH UNTRUSTED DOMAINS"
                     }
                 ]
             }
@@ -46,8 +46,8 @@
         "reference_data": [
             {
                 "refsource": "MISC",
-                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01",
-                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01"
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-254-03",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-254-03"
             }
         ]
     },
@@ -55,7 +55,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "WebAccess/SCADA Versions 9.0 and prior are vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user\u2019s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions."
+                "value": "All version of Ewon Flexy and Cosy prior to 14.1 use wildcards such as (*) under which domains can request resources. An attacker with local access and high privileges could inject scripts into the Cross-origin Resource Sharing (CORS) configuration that could abuse this vulnerability, allowing the attacker to retrieve limited confidential information through sniffing."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27436.json b/2021/27xxx/CVE-2021-27436.json
index 1c4a0747af3..246eeb719c2 100644
--- a/2021/27xxx/CVE-2021-27436.json
+++ b/2021/27xxx/CVE-2021-27436.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27436",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Advantech WebAccess/SCADA",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Versions 9.0 and prior"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user\u2019s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions."
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28160.json b/2021/28xxx/CVE-2021-28160.json
index a88f85eb141..6f7b487f4cd 100644
--- a/2021/28xxx/CVE-2021-28160.json
+++ b/2021/28xxx/CVE-2021-28160.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Stored XSS on Acexy (BoyaMicro) Wireless-N WiFi Repeater 28.08.06.1 version 1.0 devices can occur via a malformed SSID field during scanning for nearby access points, which also occurs when a device's user visits the Repeater Wizard web management section. This enables an attacker to steal LAN credentials without being connected to the device."
+                "value": "Reflected XSS on Acexy (BoyaMicro) Wireless-N WiFi Repeater 28.08.06.1 version 1.0 devices can occur via a malformed SSID field during scanning for nearby access points, which also occurs when a device's user visits the Repeater Wizard web management section. This enables an attacker to steal LAN credentials without being connected to the device."
             }
         ]
     },

From 012eab7c53b6809f0ca4714599ea259961f16d82 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Thu, 18 Mar 2021 17:45:36 -0600
Subject: [PATCH 424/845] Add CVE-2021-21384 for GHSA-f2rp-38vg-j3gh

---
 2021/21xxx/CVE-2021-21384.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21384.json b/2021/21xxx/CVE-2021-21384.json
index 66aaa337d35..4ae150f3102 100644
--- a/2021/21xxx/CVE-2021-21384.json
+++ b/2021/21xxx/CVE-2021-21384.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21384",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Null characters not escaped in shescape"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "shescape",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.1.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "ericcornelissen"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "shescape is a simple shell escape package for JavaScript. In shescape before version 1.1.3, anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a into the payload. For an example see the referenced GitHub Security Advisory. The problem has been patched in version 1.1.3. No further changes are required."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh"
+            },
+            {
+                "name": "https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b",
+                "refsource": "MISC",
+                "url": "https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b"
+            },
+            {
+                "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3",
+                "refsource": "MISC",
+                "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3"
+            },
+            {
+                "name": "https://www.npmjs.com/package/shescape",
+                "refsource": "MISC",
+                "url": "https://www.npmjs.com/package/shescape"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-f2rp-38vg-j3gh",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From c751e3d6f6b396a0cf133e3eb7092fe8c0980e6a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 00:00:44 +0000
Subject: [PATCH 425/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26275.json | 61 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28653.json | 56 +++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28681.json |  5 +++
 3 files changed, 110 insertions(+), 12 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26275.json b/2021/26xxx/CVE-2021-26275.json
index 453b2031d29..75bcec10772 100644
--- a/2021/26xxx/CVE-2021-26275.json
+++ b/2021/26xxx/CVE-2021-26275.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26275",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26275",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.npmjs.com/package/eslint-fixer",
+                "refsource": "MISC",
+                "name": "https://www.npmjs.com/package/eslint-fixer"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4774",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4774"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28653.json b/2021/28xxx/CVE-2021-28653.json
index 1a2967ceb82..b59f0ecbb30 100644
--- a/2021/28xxx/CVE-2021-28653.json
+++ b/2021/28xxx/CVE-2021-28653.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28653",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28653",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The iOS and macOS apps before 1.4.1 for the Western Digital G-Technology ArmorLock NVMe SSD store keys insecurely. They choose a non-preferred storage mechanism if the device has Secure Enclave support but lacks biometric authentication hardware."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability",
+                "url": "https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28681.json b/2021/28xxx/CVE-2021-28681.json
index b558892c735..ffd61ae772a 100644
--- a/2021/28xxx/CVE-2021-28681.json
+++ b/2021/28xxx/CVE-2021-28681.json
@@ -56,6 +56,11 @@
                 "url": "https://github.com/pion/webrtc/issues/1708",
                 "refsource": "MISC",
                 "name": "https://github.com/pion/webrtc/issues/1708"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p",
+                "url": "https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p"
             }
         ]
     }

From 3ba5707da29b66e78ae6fed432ca9b3e4fe5d2a1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 03:00:39 +0000
Subject: [PATCH 426/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27221.json | 56 ++++++++++++++++++++---
 2021/27xxx/CVE-2021-27928.json | 81 +++++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28109.json | 61 ++++++++++++++++++++++---
 2021/3xxx/CVE-2021-3327.json   | 61 ++++++++++++++++++++++---
 4 files changed, 235 insertions(+), 24 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27221.json b/2021/27xxx/CVE-2021-27221.json
index f1776e2643a..2d4f489987d 100644
--- a/2021/27xxx/CVE-2021-27221.json
+++ b/2021/27xxx/CVE-2021-27221.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27221",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27221",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** DISPUTED ** MikroTik RouterOS 6.47.9 allows remote authenticated ftp users to create or overwrite arbitrary .rsc files via the /export command. NOTE: the vendor's position is that this is intended behavior because of how user policies work."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://onovy.medium.com/routeros-user-with-just-ftp-policy-can-write-to-filesystem-cve-2021-27221-e3e45d780dfe",
+                "url": "https://onovy.medium.com/routeros-user-with-just-ftp-policy-can-write-to-filesystem-cve-2021-27221-e3e45d780dfe"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27928.json b/2021/27xxx/CVE-2021-27928.json
index d44bedd7d63..967403ee47b 100644
--- a/2021/27xxx/CVE-2021-27928.json
+++ b/2021/27xxx/CVE-2021-27928.json
@@ -1,17 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27928",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27928",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://mariadb.com/kb/en/security/",
+                "refsource": "MISC",
+                "name": "https://mariadb.com/kb/en/security/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://jira.mariadb.org/browse/MDEV-25179",
+                "url": "https://jira.mariadb.org/browse/MDEV-25179"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://mariadb.com/kb/en/mariadb-10237-release-notes/",
+                "url": "https://mariadb.com/kb/en/mariadb-10237-release-notes/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://mariadb.com/kb/en/mariadb-10328-release-notes/",
+                "url": "https://mariadb.com/kb/en/mariadb-10328-release-notes/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://mariadb.com/kb/en/mariadb-10418-release-notes/",
+                "url": "https://mariadb.com/kb/en/mariadb-10418-release-notes/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://mariadb.com/kb/en/mariadb-1059-release-notes/",
+                "url": "https://mariadb.com/kb/en/mariadb-1059-release-notes/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28109.json b/2021/28xxx/CVE-2021-28109.json
index b4a562adca6..ab5323fd7dc 100644
--- a/2021/28xxx/CVE-2021-28109.json
+++ b/2021/28xxx/CVE-2021-28109.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28109",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28109",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TranzWare (POI) FIMI before 4.2.20.4.2 allows login_tw.php reflected Cross-Site Scripting (XSS)."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.tadviser.ru/index.php/%D0%9F%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82:TranzWare_Online",
+                "refsource": "MISC",
+                "name": "https://www.tadviser.ru/index.php/%D0%9F%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82:TranzWare_Online"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://gist.github.com/ArtemBrylev/51106b7cf8929b3ecfb9dd7c9e7b0fcf",
+                "url": "https://gist.github.com/ArtemBrylev/51106b7cf8929b3ecfb9dd7c9e7b0fcf"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3327.json b/2021/3xxx/CVE-2021-3327.json
index 2990d69c4da..21f27d3aac7 100644
--- a/2021/3xxx/CVE-2021-3327.json
+++ b/2021/3xxx/CVE-2021-3327.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3327",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3327",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Ovation Dynamic Content 1.10.1 for Elementor allows XSS via the post_title parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.dynamic.ooo/changelog/",
+                "url": "https://www.dynamic.ooo/changelog/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://gist.github.com/IthacaLabs/e69e90e1d0d9cb37bb3746b6a4274d29",
+                "url": "https://gist.github.com/IthacaLabs/e69e90e1d0d9cb37bb3746b6a4274d29"
             }
         ]
     }

From 91aa7547cc29d5bc2d78b05acd8902ea089c5fb6 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 04:00:41 +0000
Subject: [PATCH 427/845] "-Synchronized-Data."

---
 2020/6xxx/CVE-2020-6577.json   | 61 ++++++++++++++++++++++++++++++----
 2020/6xxx/CVE-2020-6578.json   | 61 ++++++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25289.json | 56 +++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25290.json | 56 +++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25291.json | 56 +++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25292.json | 56 +++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25293.json | 56 +++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28110.json | 61 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28126.json | 61 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28831.json | 18 ++++++++++
 10 files changed, 488 insertions(+), 54 deletions(-)
 create mode 100644 2021/28xxx/CVE-2021-28831.json

diff --git a/2020/6xxx/CVE-2020-6577.json b/2020/6xxx/CVE-2020-6577.json
index 5d4aa5fe6e2..bcd27f02b65 100644
--- a/2020/6xxx/CVE-2020-6577.json
+++ b/2020/6xxx/CVE-2020-6577.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-6577",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-6577",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The IT-Recht Kanzlei plugin in Zen Cart 1.5.6c (German edition) allows itrk-api.php rechtstext_language SQL Injection."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://herolab.usd.de/security-advisories/",
+                "refsource": "MISC",
+                "name": "https://herolab.usd.de/security-advisories/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://herolab.usd.de/security-advisories/usd-2019-0072/",
+                "url": "https://herolab.usd.de/security-advisories/usd-2019-0072/"
             }
         ]
     }
diff --git a/2020/6xxx/CVE-2020-6578.json b/2020/6xxx/CVE-2020-6578.json
index 5549a4faaf6..cbbc1e9230a 100644
--- a/2020/6xxx/CVE-2020-6578.json
+++ b/2020/6xxx/CVE-2020-6578.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-6578",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-6578",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Zen Cart 1.5.6d allows reflected XSS via the main_page parameter to includes/templates/template_default/common/tpl_main_page.php or includes/templates/responsive_classic/common/tpl_main_page.php."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://herolab.usd.de/security-advisories/",
+                "refsource": "MISC",
+                "name": "https://herolab.usd.de/security-advisories/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://herolab.usd.de/security-advisories/usd-2019-0069/",
+                "url": "https://herolab.usd.de/security-advisories/usd-2019-0069/"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25289.json b/2021/25xxx/CVE-2021-25289.json
index fa1732b90d2..ffb458baf6c 100644
--- a/2021/25xxx/CVE-2021-25289.json
+++ b/2021/25xxx/CVE-2021-25289.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25289",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25289",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
+                "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25290.json b/2021/25xxx/CVE-2021-25290.json
index c0b0edaacd0..da7c561b5ab 100644
--- a/2021/25xxx/CVE-2021-25290.json
+++ b/2021/25xxx/CVE-2021-25290.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25290",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25290",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
+                "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25291.json b/2021/25xxx/CVE-2021-25291.json
index 19730b6bf06..1856f148c80 100644
--- a/2021/25xxx/CVE-2021-25291.json
+++ b/2021/25xxx/CVE-2021-25291.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25291",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25291",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
+                "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25292.json b/2021/25xxx/CVE-2021-25292.json
index b6c10a5d3b3..3f5d3e6e8a8 100644
--- a/2021/25xxx/CVE-2021-25292.json
+++ b/2021/25xxx/CVE-2021-25292.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25292",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25292",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
+                "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25293.json b/2021/25xxx/CVE-2021-25293.json
index dc25104e025..212a5ed9199 100644
--- a/2021/25xxx/CVE-2021-25293.json
+++ b/2021/25xxx/CVE-2021-25293.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25293",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25293",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
+                "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28110.json b/2021/28xxx/CVE-2021-28110.json
index 185353238c6..a5eeb7a6115 100644
--- a/2021/28xxx/CVE-2021-28110.json
+++ b/2021/28xxx/CVE-2021-28110.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28110",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28110",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "/exec in TranzWare e-Commerce Payment Gateway (TWEC PG) before 3.1.27.5 had a vulnerability in its XML parser."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/num8er/TranzWarePaymentGatewayApi",
+                "refsource": "MISC",
+                "name": "https://github.com/num8er/TranzWarePaymentGatewayApi"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://gist.github.com/kukuxumushi/0b7d90a917ac3480066c4cbf7519b40a",
+                "url": "https://gist.github.com/kukuxumushi/0b7d90a917ac3480066c4cbf7519b40a"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28126.json b/2021/28xxx/CVE-2021-28126.json
index b2715422709..c33b49cdffd 100644
--- a/2021/28xxx/CVE-2021-28126.json
+++ b/2021/28xxx/CVE-2021-28126.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28126",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28126",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "index.jsp in TranzWare e-Commerce Payment Gateway (TWEC PG) before 3.1.27.5 had a Stored cross-site scripting (XSS) vulnerability"
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/num8er/TranzWarePaymentGatewayApi",
+                "refsource": "MISC",
+                "name": "https://github.com/num8er/TranzWarePaymentGatewayApi"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://gist.github.com/kukuxumushi/7436994ef395573023b79652e104a2a0",
+                "url": "https://gist.github.com/kukuxumushi/7436994ef395573023b79652e104a2a0"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28831.json b/2021/28xxx/CVE-2021-28831.json
new file mode 100644
index 00000000000..7a33df58474
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28831.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28831",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From bf80944216b7742e40e35b5f60361981b261741b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 05:00:40 +0000
Subject: [PATCH 428/845] "-Synchronized-Data."

---
 2020/25xxx/CVE-2020-25097.json | 66 +++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28089.json | 61 ++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28090.json | 66 +++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28122.json |  7 +++-
 2021/28xxx/CVE-2021-28831.json | 70 +++++++++++++++++++++++++++++++---
 5 files changed, 245 insertions(+), 25 deletions(-)

diff --git a/2020/25xxx/CVE-2020-25097.json b/2020/25xxx/CVE-2020-25097.json
index 6c9c7ac6a4d..a485c48ef8c 100644
--- a/2020/25xxx/CVE-2020-25097.json
+++ b/2020/25xxx/CVE-2020-25097.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-25097",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-25097",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6",
+                "refsource": "MISC",
+                "name": "https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6"
+            },
+            {
+                "url": "http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch",
+                "refsource": "MISC",
+                "name": "http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch"
+            },
+            {
+                "url": "http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch",
+                "refsource": "MISC",
+                "name": "http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28089.json b/2021/28xxx/CVE-2021-28089.json
index a1a1f52c57f..a94b94cfcbc 100644
--- a/2021/28xxx/CVE-2021-28089.json
+++ b/2021/28xxx/CVE-2021-28089.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28089",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28089",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40304",
+                "refsource": "MISC",
+                "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40304"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://blog.torproject.org/node/2009",
+                "url": "https://blog.torproject.org/node/2009"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28090.json b/2021/28xxx/CVE-2021-28090.json
index 148e817c3ee..2377848cb23 100644
--- a/2021/28xxx/CVE-2021-28090.json
+++ b/2021/28xxx/CVE-2021-28090.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28090",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28090",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316",
+                "refsource": "MISC",
+                "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://blog.torproject.org/node/2009",
+                "url": "https://blog.torproject.org/node/2009"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://bugs.torproject.org/tpo/core/tor/40316",
+                "url": "https://bugs.torproject.org/tpo/core/tor/40316"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28122.json b/2021/28xxx/CVE-2021-28122.json
index 35d9357d293..52489f66936 100644
--- a/2021/28xxx/CVE-2021-28122.json
+++ b/2021/28xxx/CVE-2021-28122.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.0. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication."
+                "value": "A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication."
             }
         ]
     },
@@ -66,6 +66,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/open5gs/open5gs/pull/838",
                 "url": "https://github.com/open5gs/open5gs/pull/838"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1",
+                "url": "https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28831.json b/2021/28xxx/CVE-2021-28831.json
index 7a33df58474..14c7ce023e2 100644
--- a/2021/28xxx/CVE-2021-28831.json
+++ b/2021/28xxx/CVE-2021-28831.json
@@ -1,18 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28831",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28831",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data."
             }
         ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd",
+                "refsource": "MISC",
+                "name": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N",
+            "version": "3.1"
+        }
     }
 }
\ No newline at end of file

From 114785aa4816ddb1dd5458e695fde3031b73e80b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 07:00:41 +0000
Subject: [PATCH 429/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28832.json | 18 +++++++++
 2021/28xxx/CVE-2021-28833.json | 18 +++++++++
 2021/28xxx/CVE-2021-28834.json | 72 ++++++++++++++++++++++++++++++++++
 3 files changed, 108 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28832.json
 create mode 100644 2021/28xxx/CVE-2021-28833.json
 create mode 100644 2021/28xxx/CVE-2021-28834.json

diff --git a/2021/28xxx/CVE-2021-28832.json b/2021/28xxx/CVE-2021-28832.json
new file mode 100644
index 00000000000..04f4a896722
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28832.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28832",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28833.json b/2021/28xxx/CVE-2021-28833.json
new file mode 100644
index 00000000000..6235f1c0fdf
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28833.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28833",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28834.json b/2021/28xxx/CVE-2021-28834.json
new file mode 100644
index 00000000000..4bdb4b36267
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28834.json
@@ -0,0 +1,72 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28834",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/gettalong/kramdown/pull/708",
+                "refsource": "MISC",
+                "name": "https://github.com/gettalong/kramdown/pull/708"
+            },
+            {
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66",
+                "refsource": "MISC",
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66"
+            },
+            {
+                "url": "https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1",
+                "refsource": "MISC",
+                "name": "https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 7176ce448e70a5be5ba4ecc26bcdcebe61544249 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 08:00:40 +0000
Subject: [PATCH 430/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28835.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28836.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28837.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28838.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28839.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28840.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28841.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28842.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28843.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28844.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28845.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28846.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28847.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28848.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28849.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28850.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28851.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28852.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28853.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28854.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28855.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28856.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28857.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28858.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28859.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28860.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28861.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28862.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28863.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28864.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28865.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28866.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28867.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28868.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28869.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28870.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28871.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28872.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28873.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28874.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28875.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28876.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28877.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28878.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28879.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28880.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28881.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28882.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28883.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28884.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28885.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28886.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28887.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28888.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28889.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28890.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28891.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28892.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28893.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28894.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28895.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28896.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28897.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28898.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28899.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28900.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28901.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28902.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28903.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28904.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28905.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28906.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28907.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28908.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28909.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28910.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28911.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28912.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28913.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28914.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28915.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28916.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28917.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28918.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28919.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28920.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28921.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28922.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28923.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28924.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28925.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28926.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28927.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28928.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28929.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28930.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28931.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28932.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28933.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28934.json | 18 ++++++++++++++++++
 100 files changed, 1800 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28835.json
 create mode 100644 2021/28xxx/CVE-2021-28836.json
 create mode 100644 2021/28xxx/CVE-2021-28837.json
 create mode 100644 2021/28xxx/CVE-2021-28838.json
 create mode 100644 2021/28xxx/CVE-2021-28839.json
 create mode 100644 2021/28xxx/CVE-2021-28840.json
 create mode 100644 2021/28xxx/CVE-2021-28841.json
 create mode 100644 2021/28xxx/CVE-2021-28842.json
 create mode 100644 2021/28xxx/CVE-2021-28843.json
 create mode 100644 2021/28xxx/CVE-2021-28844.json
 create mode 100644 2021/28xxx/CVE-2021-28845.json
 create mode 100644 2021/28xxx/CVE-2021-28846.json
 create mode 100644 2021/28xxx/CVE-2021-28847.json
 create mode 100644 2021/28xxx/CVE-2021-28848.json
 create mode 100644 2021/28xxx/CVE-2021-28849.json
 create mode 100644 2021/28xxx/CVE-2021-28850.json
 create mode 100644 2021/28xxx/CVE-2021-28851.json
 create mode 100644 2021/28xxx/CVE-2021-28852.json
 create mode 100644 2021/28xxx/CVE-2021-28853.json
 create mode 100644 2021/28xxx/CVE-2021-28854.json
 create mode 100644 2021/28xxx/CVE-2021-28855.json
 create mode 100644 2021/28xxx/CVE-2021-28856.json
 create mode 100644 2021/28xxx/CVE-2021-28857.json
 create mode 100644 2021/28xxx/CVE-2021-28858.json
 create mode 100644 2021/28xxx/CVE-2021-28859.json
 create mode 100644 2021/28xxx/CVE-2021-28860.json
 create mode 100644 2021/28xxx/CVE-2021-28861.json
 create mode 100644 2021/28xxx/CVE-2021-28862.json
 create mode 100644 2021/28xxx/CVE-2021-28863.json
 create mode 100644 2021/28xxx/CVE-2021-28864.json
 create mode 100644 2021/28xxx/CVE-2021-28865.json
 create mode 100644 2021/28xxx/CVE-2021-28866.json
 create mode 100644 2021/28xxx/CVE-2021-28867.json
 create mode 100644 2021/28xxx/CVE-2021-28868.json
 create mode 100644 2021/28xxx/CVE-2021-28869.json
 create mode 100644 2021/28xxx/CVE-2021-28870.json
 create mode 100644 2021/28xxx/CVE-2021-28871.json
 create mode 100644 2021/28xxx/CVE-2021-28872.json
 create mode 100644 2021/28xxx/CVE-2021-28873.json
 create mode 100644 2021/28xxx/CVE-2021-28874.json
 create mode 100644 2021/28xxx/CVE-2021-28875.json
 create mode 100644 2021/28xxx/CVE-2021-28876.json
 create mode 100644 2021/28xxx/CVE-2021-28877.json
 create mode 100644 2021/28xxx/CVE-2021-28878.json
 create mode 100644 2021/28xxx/CVE-2021-28879.json
 create mode 100644 2021/28xxx/CVE-2021-28880.json
 create mode 100644 2021/28xxx/CVE-2021-28881.json
 create mode 100644 2021/28xxx/CVE-2021-28882.json
 create mode 100644 2021/28xxx/CVE-2021-28883.json
 create mode 100644 2021/28xxx/CVE-2021-28884.json
 create mode 100644 2021/28xxx/CVE-2021-28885.json
 create mode 100644 2021/28xxx/CVE-2021-28886.json
 create mode 100644 2021/28xxx/CVE-2021-28887.json
 create mode 100644 2021/28xxx/CVE-2021-28888.json
 create mode 100644 2021/28xxx/CVE-2021-28889.json
 create mode 100644 2021/28xxx/CVE-2021-28890.json
 create mode 100644 2021/28xxx/CVE-2021-28891.json
 create mode 100644 2021/28xxx/CVE-2021-28892.json
 create mode 100644 2021/28xxx/CVE-2021-28893.json
 create mode 100644 2021/28xxx/CVE-2021-28894.json
 create mode 100644 2021/28xxx/CVE-2021-28895.json
 create mode 100644 2021/28xxx/CVE-2021-28896.json
 create mode 100644 2021/28xxx/CVE-2021-28897.json
 create mode 100644 2021/28xxx/CVE-2021-28898.json
 create mode 100644 2021/28xxx/CVE-2021-28899.json
 create mode 100644 2021/28xxx/CVE-2021-28900.json
 create mode 100644 2021/28xxx/CVE-2021-28901.json
 create mode 100644 2021/28xxx/CVE-2021-28902.json
 create mode 100644 2021/28xxx/CVE-2021-28903.json
 create mode 100644 2021/28xxx/CVE-2021-28904.json
 create mode 100644 2021/28xxx/CVE-2021-28905.json
 create mode 100644 2021/28xxx/CVE-2021-28906.json
 create mode 100644 2021/28xxx/CVE-2021-28907.json
 create mode 100644 2021/28xxx/CVE-2021-28908.json
 create mode 100644 2021/28xxx/CVE-2021-28909.json
 create mode 100644 2021/28xxx/CVE-2021-28910.json
 create mode 100644 2021/28xxx/CVE-2021-28911.json
 create mode 100644 2021/28xxx/CVE-2021-28912.json
 create mode 100644 2021/28xxx/CVE-2021-28913.json
 create mode 100644 2021/28xxx/CVE-2021-28914.json
 create mode 100644 2021/28xxx/CVE-2021-28915.json
 create mode 100644 2021/28xxx/CVE-2021-28916.json
 create mode 100644 2021/28xxx/CVE-2021-28917.json
 create mode 100644 2021/28xxx/CVE-2021-28918.json
 create mode 100644 2021/28xxx/CVE-2021-28919.json
 create mode 100644 2021/28xxx/CVE-2021-28920.json
 create mode 100644 2021/28xxx/CVE-2021-28921.json
 create mode 100644 2021/28xxx/CVE-2021-28922.json
 create mode 100644 2021/28xxx/CVE-2021-28923.json
 create mode 100644 2021/28xxx/CVE-2021-28924.json
 create mode 100644 2021/28xxx/CVE-2021-28925.json
 create mode 100644 2021/28xxx/CVE-2021-28926.json
 create mode 100644 2021/28xxx/CVE-2021-28927.json
 create mode 100644 2021/28xxx/CVE-2021-28928.json
 create mode 100644 2021/28xxx/CVE-2021-28929.json
 create mode 100644 2021/28xxx/CVE-2021-28930.json
 create mode 100644 2021/28xxx/CVE-2021-28931.json
 create mode 100644 2021/28xxx/CVE-2021-28932.json
 create mode 100644 2021/28xxx/CVE-2021-28933.json
 create mode 100644 2021/28xxx/CVE-2021-28934.json

diff --git a/2021/28xxx/CVE-2021-28835.json b/2021/28xxx/CVE-2021-28835.json
new file mode 100644
index 00000000000..f7df9786946
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28835.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28835",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28836.json b/2021/28xxx/CVE-2021-28836.json
new file mode 100644
index 00000000000..1794c410ef3
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28836.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28836",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28837.json b/2021/28xxx/CVE-2021-28837.json
new file mode 100644
index 00000000000..acf98938809
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28837.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28837",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28838.json b/2021/28xxx/CVE-2021-28838.json
new file mode 100644
index 00000000000..22fe14bcf8f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28838.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28838",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28839.json b/2021/28xxx/CVE-2021-28839.json
new file mode 100644
index 00000000000..a3b4b21fb95
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28839.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28839",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28840.json b/2021/28xxx/CVE-2021-28840.json
new file mode 100644
index 00000000000..b1a3bfafc4a
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28840.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28840",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28841.json b/2021/28xxx/CVE-2021-28841.json
new file mode 100644
index 00000000000..4593d2a8c5b
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28841.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28841",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28842.json b/2021/28xxx/CVE-2021-28842.json
new file mode 100644
index 00000000000..026225441b4
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28842.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28842",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28843.json b/2021/28xxx/CVE-2021-28843.json
new file mode 100644
index 00000000000..1887efea78c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28843.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28843",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28844.json b/2021/28xxx/CVE-2021-28844.json
new file mode 100644
index 00000000000..f9067f8bced
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28844.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28844",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28845.json b/2021/28xxx/CVE-2021-28845.json
new file mode 100644
index 00000000000..e31d61b173e
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28845.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28845",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28846.json b/2021/28xxx/CVE-2021-28846.json
new file mode 100644
index 00000000000..6c06f05fed9
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28846.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28846",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28847.json b/2021/28xxx/CVE-2021-28847.json
new file mode 100644
index 00000000000..fd8ae37a519
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28847.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28847",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28848.json b/2021/28xxx/CVE-2021-28848.json
new file mode 100644
index 00000000000..1de49fe005c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28848.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28848",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28849.json b/2021/28xxx/CVE-2021-28849.json
new file mode 100644
index 00000000000..b65f0afe033
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28849.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28849",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28850.json b/2021/28xxx/CVE-2021-28850.json
new file mode 100644
index 00000000000..f237b5d1bbc
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28850.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28850",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28851.json b/2021/28xxx/CVE-2021-28851.json
new file mode 100644
index 00000000000..696156b85e4
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28851.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28851",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28852.json b/2021/28xxx/CVE-2021-28852.json
new file mode 100644
index 00000000000..c78f6db1cf6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28852.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28852",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28853.json b/2021/28xxx/CVE-2021-28853.json
new file mode 100644
index 00000000000..7769a8a6c01
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28853.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28853",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28854.json b/2021/28xxx/CVE-2021-28854.json
new file mode 100644
index 00000000000..7992a2a3e3f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28854.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28854",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28855.json b/2021/28xxx/CVE-2021-28855.json
new file mode 100644
index 00000000000..e739a43dcc0
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28855.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28855",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28856.json b/2021/28xxx/CVE-2021-28856.json
new file mode 100644
index 00000000000..87311d91684
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28856.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28856",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28857.json b/2021/28xxx/CVE-2021-28857.json
new file mode 100644
index 00000000000..077a48b9042
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28857.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28857",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28858.json b/2021/28xxx/CVE-2021-28858.json
new file mode 100644
index 00000000000..1417a8e68ce
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28858.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28858",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28859.json b/2021/28xxx/CVE-2021-28859.json
new file mode 100644
index 00000000000..4ca1df9a2ef
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28859.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28859",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28860.json b/2021/28xxx/CVE-2021-28860.json
new file mode 100644
index 00000000000..9623e7e495c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28860.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28860",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28861.json b/2021/28xxx/CVE-2021-28861.json
new file mode 100644
index 00000000000..9d8e00676a1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28861.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28861",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28862.json b/2021/28xxx/CVE-2021-28862.json
new file mode 100644
index 00000000000..3e23718ad42
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28862.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28862",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28863.json b/2021/28xxx/CVE-2021-28863.json
new file mode 100644
index 00000000000..8d7b38c6aed
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28863.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28863",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28864.json b/2021/28xxx/CVE-2021-28864.json
new file mode 100644
index 00000000000..6a047030587
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28864.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28864",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28865.json b/2021/28xxx/CVE-2021-28865.json
new file mode 100644
index 00000000000..d3707d7b30e
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28865.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28865",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28866.json b/2021/28xxx/CVE-2021-28866.json
new file mode 100644
index 00000000000..037d4605a2f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28866.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28866",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28867.json b/2021/28xxx/CVE-2021-28867.json
new file mode 100644
index 00000000000..9e84cd6e261
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28867.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28867",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28868.json b/2021/28xxx/CVE-2021-28868.json
new file mode 100644
index 00000000000..9150031f6d1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28868.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28868",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28869.json b/2021/28xxx/CVE-2021-28869.json
new file mode 100644
index 00000000000..0f5c5ceaf37
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28869.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28869",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28870.json b/2021/28xxx/CVE-2021-28870.json
new file mode 100644
index 00000000000..922d54262ae
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28870.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28870",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28871.json b/2021/28xxx/CVE-2021-28871.json
new file mode 100644
index 00000000000..231c13fbd08
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28871.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28871",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28872.json b/2021/28xxx/CVE-2021-28872.json
new file mode 100644
index 00000000000..41c3e87f685
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28872.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28872",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28873.json b/2021/28xxx/CVE-2021-28873.json
new file mode 100644
index 00000000000..49f8c51a6a6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28873.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28873",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28874.json b/2021/28xxx/CVE-2021-28874.json
new file mode 100644
index 00000000000..67f01cb6a51
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28874.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28874",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28875.json b/2021/28xxx/CVE-2021-28875.json
new file mode 100644
index 00000000000..a67fb4fee12
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28875.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28875",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28876.json b/2021/28xxx/CVE-2021-28876.json
new file mode 100644
index 00000000000..c07fdb9500f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28876.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28876",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28877.json b/2021/28xxx/CVE-2021-28877.json
new file mode 100644
index 00000000000..a809ea521e1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28877.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28877",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28878.json b/2021/28xxx/CVE-2021-28878.json
new file mode 100644
index 00000000000..b6458538bde
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28878.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28878",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28879.json b/2021/28xxx/CVE-2021-28879.json
new file mode 100644
index 00000000000..12b88565383
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28879.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28879",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28880.json b/2021/28xxx/CVE-2021-28880.json
new file mode 100644
index 00000000000..b56507741ca
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28880.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28880",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28881.json b/2021/28xxx/CVE-2021-28881.json
new file mode 100644
index 00000000000..550714cebbf
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28881.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28881",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28882.json b/2021/28xxx/CVE-2021-28882.json
new file mode 100644
index 00000000000..9168484b9d6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28882.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28882",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28883.json b/2021/28xxx/CVE-2021-28883.json
new file mode 100644
index 00000000000..a05771c94db
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28883.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28883",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28884.json b/2021/28xxx/CVE-2021-28884.json
new file mode 100644
index 00000000000..afe3956520c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28884.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28884",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28885.json b/2021/28xxx/CVE-2021-28885.json
new file mode 100644
index 00000000000..da16ae9b80d
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28885.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28885",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28886.json b/2021/28xxx/CVE-2021-28886.json
new file mode 100644
index 00000000000..c9e2137cf32
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28886.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28886",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28887.json b/2021/28xxx/CVE-2021-28887.json
new file mode 100644
index 00000000000..5264e351276
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28887.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28887",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28888.json b/2021/28xxx/CVE-2021-28888.json
new file mode 100644
index 00000000000..0b4dcdc3025
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28888.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28888",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28889.json b/2021/28xxx/CVE-2021-28889.json
new file mode 100644
index 00000000000..f6d2d0b6b42
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28889.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28889",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28890.json b/2021/28xxx/CVE-2021-28890.json
new file mode 100644
index 00000000000..8ccf78d1948
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28890.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28890",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28891.json b/2021/28xxx/CVE-2021-28891.json
new file mode 100644
index 00000000000..62fb7d0a640
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28891.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28891",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28892.json b/2021/28xxx/CVE-2021-28892.json
new file mode 100644
index 00000000000..dc8ac5c7bef
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28892.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28892",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28893.json b/2021/28xxx/CVE-2021-28893.json
new file mode 100644
index 00000000000..ef6a8514d5f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28893.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28893",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28894.json b/2021/28xxx/CVE-2021-28894.json
new file mode 100644
index 00000000000..1c4ee2d6741
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28894.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28894",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28895.json b/2021/28xxx/CVE-2021-28895.json
new file mode 100644
index 00000000000..5059aa60b6a
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28895.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28895",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28896.json b/2021/28xxx/CVE-2021-28896.json
new file mode 100644
index 00000000000..f91dbb200ef
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28896.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28896",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28897.json b/2021/28xxx/CVE-2021-28897.json
new file mode 100644
index 00000000000..408045f80f6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28897.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28897",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28898.json b/2021/28xxx/CVE-2021-28898.json
new file mode 100644
index 00000000000..6b4b8c42e41
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28898.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28898",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28899.json b/2021/28xxx/CVE-2021-28899.json
new file mode 100644
index 00000000000..ec74244f4a7
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28899.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28899",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28900.json b/2021/28xxx/CVE-2021-28900.json
new file mode 100644
index 00000000000..07e13d6fe28
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28900.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28900",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28901.json b/2021/28xxx/CVE-2021-28901.json
new file mode 100644
index 00000000000..eedea11b58d
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28901.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28901",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28902.json b/2021/28xxx/CVE-2021-28902.json
new file mode 100644
index 00000000000..c7d7baf4e68
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28902.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28902",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28903.json b/2021/28xxx/CVE-2021-28903.json
new file mode 100644
index 00000000000..b1d1e8c689a
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28903.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28903",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28904.json b/2021/28xxx/CVE-2021-28904.json
new file mode 100644
index 00000000000..dd5d0fd5870
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28904.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28904",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28905.json b/2021/28xxx/CVE-2021-28905.json
new file mode 100644
index 00000000000..1658e3de038
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28905.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28905",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28906.json b/2021/28xxx/CVE-2021-28906.json
new file mode 100644
index 00000000000..575401dd2e9
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28906.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28906",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28907.json b/2021/28xxx/CVE-2021-28907.json
new file mode 100644
index 00000000000..b233ec39c40
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28907.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28907",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28908.json b/2021/28xxx/CVE-2021-28908.json
new file mode 100644
index 00000000000..a7026cfcc0f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28908.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28908",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28909.json b/2021/28xxx/CVE-2021-28909.json
new file mode 100644
index 00000000000..edfeabf4230
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28909.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28909",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28910.json b/2021/28xxx/CVE-2021-28910.json
new file mode 100644
index 00000000000..8ab0ab86bd6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28910.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28910",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28911.json b/2021/28xxx/CVE-2021-28911.json
new file mode 100644
index 00000000000..6348327a768
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28911.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28911",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28912.json b/2021/28xxx/CVE-2021-28912.json
new file mode 100644
index 00000000000..5e7ecc9586f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28912.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28912",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28913.json b/2021/28xxx/CVE-2021-28913.json
new file mode 100644
index 00000000000..53ac67a37a5
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28913.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28913",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28914.json b/2021/28xxx/CVE-2021-28914.json
new file mode 100644
index 00000000000..73695a38c7c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28914.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28914",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28915.json b/2021/28xxx/CVE-2021-28915.json
new file mode 100644
index 00000000000..36f5807ec2b
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28915.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28915",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28916.json b/2021/28xxx/CVE-2021-28916.json
new file mode 100644
index 00000000000..70403876128
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28916.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28916",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28917.json b/2021/28xxx/CVE-2021-28917.json
new file mode 100644
index 00000000000..c405518c61c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28917.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28917",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28918.json b/2021/28xxx/CVE-2021-28918.json
new file mode 100644
index 00000000000..3f5efeaa5f0
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28918.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28918",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28919.json b/2021/28xxx/CVE-2021-28919.json
new file mode 100644
index 00000000000..2dc86019ce0
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28919.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28919",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28920.json b/2021/28xxx/CVE-2021-28920.json
new file mode 100644
index 00000000000..f841a6b737c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28920.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28920",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28921.json b/2021/28xxx/CVE-2021-28921.json
new file mode 100644
index 00000000000..265561e99ce
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28921.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28921",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28922.json b/2021/28xxx/CVE-2021-28922.json
new file mode 100644
index 00000000000..d7662894dce
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28922.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28922",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28923.json b/2021/28xxx/CVE-2021-28923.json
new file mode 100644
index 00000000000..d13753b62e5
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28923.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28923",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28924.json b/2021/28xxx/CVE-2021-28924.json
new file mode 100644
index 00000000000..a288366f885
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28924.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28924",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28925.json b/2021/28xxx/CVE-2021-28925.json
new file mode 100644
index 00000000000..b5a9b72ce02
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28925.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28925",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28926.json b/2021/28xxx/CVE-2021-28926.json
new file mode 100644
index 00000000000..0956b05ecf6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28926.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28926",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28927.json b/2021/28xxx/CVE-2021-28927.json
new file mode 100644
index 00000000000..d659a046bf6
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28927.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28927",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28928.json b/2021/28xxx/CVE-2021-28928.json
new file mode 100644
index 00000000000..38883045e51
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28928.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28928",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28929.json b/2021/28xxx/CVE-2021-28929.json
new file mode 100644
index 00000000000..7693cbc175a
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28929.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28929",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28930.json b/2021/28xxx/CVE-2021-28930.json
new file mode 100644
index 00000000000..63b3e8a11cd
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28930.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28930",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28931.json b/2021/28xxx/CVE-2021-28931.json
new file mode 100644
index 00000000000..43c74e78d7a
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28931.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28931",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28932.json b/2021/28xxx/CVE-2021-28932.json
new file mode 100644
index 00000000000..124c9d3ef80
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28932.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28932",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28933.json b/2021/28xxx/CVE-2021-28933.json
new file mode 100644
index 00000000000..afe8cffb34e
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28933.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28933",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28934.json b/2021/28xxx/CVE-2021-28934.json
new file mode 100644
index 00000000000..d5a7a464a67
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28934.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28934",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 4d09cdbbc26f79ee35f536f8be5cf7d127fd97ee Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 08:00:54 +0000
Subject: [PATCH 431/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28935.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28936.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28937.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28938.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28939.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28940.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28941.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28942.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28943.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28944.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28945.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28946.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28947.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28948.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28949.json | 18 ++++++++++++++++++
 15 files changed, 270 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28935.json
 create mode 100644 2021/28xxx/CVE-2021-28936.json
 create mode 100644 2021/28xxx/CVE-2021-28937.json
 create mode 100644 2021/28xxx/CVE-2021-28938.json
 create mode 100644 2021/28xxx/CVE-2021-28939.json
 create mode 100644 2021/28xxx/CVE-2021-28940.json
 create mode 100644 2021/28xxx/CVE-2021-28941.json
 create mode 100644 2021/28xxx/CVE-2021-28942.json
 create mode 100644 2021/28xxx/CVE-2021-28943.json
 create mode 100644 2021/28xxx/CVE-2021-28944.json
 create mode 100644 2021/28xxx/CVE-2021-28945.json
 create mode 100644 2021/28xxx/CVE-2021-28946.json
 create mode 100644 2021/28xxx/CVE-2021-28947.json
 create mode 100644 2021/28xxx/CVE-2021-28948.json
 create mode 100644 2021/28xxx/CVE-2021-28949.json

diff --git a/2021/28xxx/CVE-2021-28935.json b/2021/28xxx/CVE-2021-28935.json
new file mode 100644
index 00000000000..f3151d78267
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28935.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28935",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28936.json b/2021/28xxx/CVE-2021-28936.json
new file mode 100644
index 00000000000..3907393d7d0
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28936.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28936",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28937.json b/2021/28xxx/CVE-2021-28937.json
new file mode 100644
index 00000000000..e796ada7f72
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28937.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28937",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28938.json b/2021/28xxx/CVE-2021-28938.json
new file mode 100644
index 00000000000..77317edadf8
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28938.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28938",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28939.json b/2021/28xxx/CVE-2021-28939.json
new file mode 100644
index 00000000000..8696c0e6f99
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28939.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28939",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28940.json b/2021/28xxx/CVE-2021-28940.json
new file mode 100644
index 00000000000..46e806537f5
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28940.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28940",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28941.json b/2021/28xxx/CVE-2021-28941.json
new file mode 100644
index 00000000000..266e3fa97e0
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28941.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28941",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28942.json b/2021/28xxx/CVE-2021-28942.json
new file mode 100644
index 00000000000..338f8201b0a
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28942.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28942",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28943.json b/2021/28xxx/CVE-2021-28943.json
new file mode 100644
index 00000000000..c3ee4d4ce49
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28943.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28943",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28944.json b/2021/28xxx/CVE-2021-28944.json
new file mode 100644
index 00000000000..d43bc967481
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28944.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28944",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28945.json b/2021/28xxx/CVE-2021-28945.json
new file mode 100644
index 00000000000..64fc9a81f8b
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28945.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28945",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28946.json b/2021/28xxx/CVE-2021-28946.json
new file mode 100644
index 00000000000..695b3b4aaf8
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28946.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28946",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28947.json b/2021/28xxx/CVE-2021-28947.json
new file mode 100644
index 00000000000..93c660d413c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28947.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28947",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28948.json b/2021/28xxx/CVE-2021-28948.json
new file mode 100644
index 00000000000..40b479ac7d1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28948.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28948",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28949.json b/2021/28xxx/CVE-2021-28949.json
new file mode 100644
index 00000000000..75cf1d64369
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28949.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28949",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 0c6fdce131522b1b03e063197649955cf6750ba7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 09:00:41 +0000
Subject: [PATCH 432/845] "-Synchronized-Data."

---
 2020/7xxx/CVE-2020-7021.json   | 5 +++++
 2020/8xxx/CVE-2020-8625.json   | 5 +++++
 2021/27xxx/CVE-2021-27185.json | 5 +++++
 2021/27xxx/CVE-2021-27191.json | 5 +++++
 2021/27xxx/CVE-2021-27212.json | 5 +++++
 2021/27xxx/CVE-2021-27218.json | 5 +++++
 2021/27xxx/CVE-2021-27219.json | 5 +++++
 7 files changed, 35 insertions(+)

diff --git a/2020/7xxx/CVE-2020-7021.json b/2020/7xxx/CVE-2020-7021.json
index a2986d7ced5..6b98db001c7 100644
--- a/2020/7xxx/CVE-2020-7021.json
+++ b/2020/7xxx/CVE-2020-7021.json
@@ -48,6 +48,11 @@
                 "url": "https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915",
                 "refsource": "MISC",
                 "name": "https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0003/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0003/"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8625.json b/2020/8xxx/CVE-2020-8625.json
index 610462a7fd3..04f9ba21d84 100644
--- a/2020/8xxx/CVE-2020-8625.json
+++ b/2020/8xxx/CVE-2020-8625.json
@@ -116,6 +116,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-28f97e232d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0001/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0001/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27185.json b/2021/27xxx/CVE-2021-27185.json
index 985b5149d41..c098478915e 100644
--- a/2021/27xxx/CVE-2021-27185.json
+++ b/2021/27xxx/CVE-2021-27185.json
@@ -66,6 +66,11 @@
                 "url": "https://www.npmjs.com/package/samba-client",
                 "refsource": "MISC",
                 "name": "https://www.npmjs.com/package/samba-client"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0002/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0002/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27191.json b/2021/27xxx/CVE-2021-27191.json
index 93ce3abb68e..3625806211a 100644
--- a/2021/27xxx/CVE-2021-27191.json
+++ b/2021/27xxx/CVE-2021-27191.json
@@ -61,6 +61,11 @@
                 "url": "https://www.npmjs.com/package/get-ip-range",
                 "refsource": "MISC",
                 "name": "https://www.npmjs.com/package/get-ip-range"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0002/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0002/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27212.json b/2021/27xxx/CVE-2021-27212.json
index d07804a6196..f8c3033a8b3 100644
--- a/2021/27xxx/CVE-2021-27212.json
+++ b/2021/27xxx/CVE-2021-27212.json
@@ -76,6 +76,11 @@
                 "refsource": "DEBIAN",
                 "name": "DSA-4860",
                 "url": "https://www.debian.org/security/2021/dsa-4860"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0005/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0005/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27218.json b/2021/27xxx/CVE-2021-27218.json
index ccc51abfbcf..b291227a330 100644
--- a/2021/27xxx/CVE-2021-27218.json
+++ b/2021/27xxx/CVE-2021-27218.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-7c71cda8da",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0004/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0004/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27219.json b/2021/27xxx/CVE-2021-27219.json
index 6712597b69a..c3a334e5fa2 100644
--- a/2021/27xxx/CVE-2021-27219.json
+++ b/2021/27xxx/CVE-2021-27219.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-7c71cda8da",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210319-0004/",
+                "url": "https://security.netapp.com/advisory/ntap-20210319-0004/"
             }
         ]
     }

From 59460264ebe1c4821d929157003ed22e63c51e70 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 11:00:40 +0000
Subject: [PATCH 433/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28160.json |  2 +-
 2021/3xxx/CVE-2021-3450.json   | 18 ++++++++++++++++++
 2 files changed, 19 insertions(+), 1 deletion(-)
 create mode 100644 2021/3xxx/CVE-2021-3450.json

diff --git a/2021/28xxx/CVE-2021-28160.json b/2021/28xxx/CVE-2021-28160.json
index 6f7b487f4cd..2cbc0855214 100644
--- a/2021/28xxx/CVE-2021-28160.json
+++ b/2021/28xxx/CVE-2021-28160.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Reflected XSS on Acexy (BoyaMicro) Wireless-N WiFi Repeater 28.08.06.1 version 1.0 devices can occur via a malformed SSID field during scanning for nearby access points, which also occurs when a device's user visits the Repeater Wizard web management section. This enables an attacker to steal LAN credentials without being connected to the device."
+                "value": "Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) suffers from a reflected XSS vulnerability due to unsanitized SSID value when the latter is displayed in the /repeater.html page (\"Repeater Wizard\" homepage section)."
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
new file mode 100644
index 00000000000..404605b1cbc
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3450",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From b486624d0806962f747e0a995f45867cd7870c8f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 12:00:52 +0000
Subject: [PATCH 434/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 6273b49f41d..df03628eaa3 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -109,6 +109,11 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210318 [jira] [Created] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210319 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7@%3Cdev.ws.apache.org%3E"
             }
         ]
     },

From 4a8b638cfb36ed841726b162f665451a5f48eef9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 14:00:40 +0000
Subject: [PATCH 435/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27306.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/27xxx/CVE-2021-27306.json b/2021/27xxx/CVE-2021-27306.json
index 4f45d59ec27..7ae2241d3c8 100644
--- a/2021/27xxx/CVE-2021-27306.json
+++ b/2021/27xxx/CVE-2021-27306.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.0.0 allows unauthenticated users access to authenticated routes without a valid token JWT."
+                "value": "An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT."
             }
         ]
     },

From 7d68f247a9cd1f41d30c2e23fa5837836acba352 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 15:00:39 +0000
Subject: [PATCH 436/845] "-Synchronized-Data."

---
 2019/15xxx/CVE-2019-15562.json | 12 +++++++-
 2021/27xxx/CVE-2021-27506.json | 56 ++++++++++++++++++++++++++++++----
 2021/3xxx/CVE-2021-3451.json   | 18 +++++++++++
 2021/3xxx/CVE-2021-3452.json   | 18 +++++++++++
 2021/3xxx/CVE-2021-3453.json   | 18 +++++++++++
 5 files changed, 115 insertions(+), 7 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3451.json
 create mode 100644 2021/3xxx/CVE-2021-3452.json
 create mode 100644 2021/3xxx/CVE-2021-3453.json

diff --git a/2019/15xxx/CVE-2019-15562.json b/2019/15xxx/CVE-2019-15562.json
index fe4249d2814..163789d5a1f 100644
--- a/2019/15xxx/CVE-2019-15562.json
+++ b/2019/15xxx/CVE-2019-15562.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "GORM before 1.9.10 allows SQL injection via incomplete parentheses."
+                "value": "** DISPUTED ** GORM before 1.9.10 allows SQL injection via incomplete parentheses. NOTE: Misusing Gorm by passing untrusted user input where Gorm expects trusted SQL fragments is a vulnerability in the application, not in Gorm."
             }
         ]
     },
@@ -61,6 +61,16 @@
                 "refsource": "MISC",
                 "name": "https://github.com/go-gorm/gorm/pull/2519",
                 "url": "https://github.com/go-gorm/gorm/pull/2519"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/go-gorm/gorm/pull/2674",
+                "url": "https://github.com/go-gorm/gorm/pull/2674"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427",
+                "url": "https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27506.json b/2021/27xxx/CVE-2021-27506.json
index cde9c64acb1..898329c15c3 100644
--- a/2021/27xxx/CVE-2021-27506.json
+++ b/2021/27xxx/CVE-2021-27506.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27506",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27506",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Stormshield Network Security (SNS) 1.0 through 4.2.0, the parsing of some malformed files can lead to the crash of ClamAV service causing a Denial of Service."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://advisories.stormshield.eu/2021-003/",
+                "url": "https://advisories.stormshield.eu/2021-003/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3451.json b/2021/3xxx/CVE-2021-3451.json
new file mode 100644
index 00000000000..d87e932107d
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3451.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3451",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3452.json b/2021/3xxx/CVE-2021-3452.json
new file mode 100644
index 00000000000..a7655ecd279
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3452.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3452",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3453.json b/2021/3xxx/CVE-2021-3453.json
new file mode 100644
index 00000000000..a44ae6c1336
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3453.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3453",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From bcfdf6e4b9bcb21b65e7c1c05d9ab13ba21c35f4 Mon Sep 17 00:00:00 2001
From: Scott Moore - IBM 
Date: Fri, 19 Mar 2021 11:15:56 -0400
Subject: [PATCH 437/845] IBM20210319-111556

Added CVE-2020-4635
---
 2020/4xxx/CVE-2020-4635.json | 102 +++++++++++++++++++++++++++++------
 1 file changed, 87 insertions(+), 15 deletions(-)

diff --git a/2020/4xxx/CVE-2020-4635.json b/2020/4xxx/CVE-2020-4635.json
index e5d3a689c2c..5b96d59155a 100644
--- a/2020/4xxx/CVE-2020-4635.json
+++ b/2020/4xxx/CVE-2020-4635.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-4635",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "AV" : "N",
+            "S" : "U",
+            "PR" : "N",
+            "SCORE" : "3.700",
+            "I" : "N",
+            "UI" : "N",
+            "A" : "N",
+            "C" : "L",
+            "AC" : "H"
+         },
+         "TM" : {
+            "RL" : "O",
+            "E" : "U",
+            "RC" : "C"
+         }
+      }
+   },
+   "data_type" : "CVE",
+   "references" : {
+      "reference_data" : [
+         {
+            "url" : "https://www.ibm.com/support/pages/node/6431265",
+            "title" : "IBM Security Bulletin 6431265 (Resilient OnPrem)",
+            "name" : "https://www.ibm.com/support/pages/node/6431265",
+            "refsource" : "CONFIRM"
+         },
+         {
+            "title" : "X-Force Vulnerability Report",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/185502",
+            "refsource" : "XF",
+            "name" : "ibm-resilient-cve20204635-info-disc (185502)"
+         }
+      ]
+   },
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Obtain Information",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Resilient SOAR 40 and earlier could disclose sensitive information by allowing a user to enumerate usernames.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "SOAR 40"
+                              }
+                           ]
+                        },
+                        "product_name" : "Resilient"
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2020-4635",
+      "DATE_PUBLIC" : "2021-03-17T00:00:00",
+      "STATE" : "PUBLIC"
+   }
+}

From 06f49f42cf5450daef7117a0a1966ea56255a3d4 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 19 Mar 2021 09:19:56 -0600
Subject: [PATCH 438/845] Add CVE-2021-21387 for GHSA-5jxh-6378-rg7v

---
 2021/21xxx/CVE-2021-21387.json | 93 +++++++++++++++++++++++++++++++---
 1 file changed, 87 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21387.json b/2021/21xxx/CVE-2021-21387.json
index b022ab795bd..7c8a752c60d 100644
--- a/2021/21xxx/CVE-2021-21387.json
+++ b/2021/21xxx/CVE-2021-21387.json
@@ -1,18 +1,99 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21387",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Partial secret key disclosure, improper safety number calculation, & inadequate encryption strength"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "wrongthink",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 2.0.0, < 2.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "parabirb"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Wrongthink peer-to-peer, end-to-end encrypted messenger with PeerJS and Axolotl ratchet. In wrongthink from version 2.0.0 and before 2.3.0 there was a set of vulnerabilities causing inadequate encryption strength.  Part of the secret identity key was disclosed by the fingerprint used for connection. Additionally, the safety number was improperly calculated. It was computed using part of one of the public identity keys instead of being derived from both public identity keys. This caused issues in computing safety numbers which would potentially be exploitable in the real world. Additionally there was inadequate encryption strength due to use of 1024-bit DSA keys. These issues are all fixed in version 2.3.0."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 8.1,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-319: Cleartext Transmission of Sensitive Information"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-326: Inadequate Encryption Strength"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-358: Improperly Implemented Security Check for Standard"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/parabirb/wrongthink/security/advisories/GHSA-5jxh-6378-rg7v",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/parabirb/wrongthink/security/advisories/GHSA-5jxh-6378-rg7v"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-5jxh-6378-rg7v",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 9de61cbee89fa84fd8f4f1db2f5ce2e9b75ad701 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 19 Mar 2021 09:57:37 -0600
Subject: [PATCH 439/845] Add CVE-2021-21390 for GHSA-xr7r-7gpj-5pgp

---
 2021/21xxx/CVE-2021-21390.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21390.json b/2021/21xxx/CVE-2021-21390.json
index 95905faae4f..1639e493169 100644
--- a/2021/21xxx/CVE-2021-21390.json
+++ b/2021/21xxx/CVE-2021-21390.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21390",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "MITM modification of request bodies in MinIO"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "minio",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< RELEASE.2021-03-17T02-33-02Z"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "minio"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater than the actual data sent: the server accepts and completes the request without ever reaching the end of the chunk + thereby without ever checking the chunk signature. This is fixed in version RELEASE.2021-03-17T02-33-02Z. As a workaround one can avoid using \"aws-chunked\" encoding-based chunk signature upload requests instead use TLS. MinIO SDKs automatically disable chunked encoding signature when the server endpoint is configured with TLS.  "
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/minio/minio/security/advisories/GHSA-xr7r-7gpj-5pgp",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/minio/minio/security/advisories/GHSA-xr7r-7gpj-5pgp"
+            },
+            {
+                "name": "https://github.com/minio/minio/pull/11801",
+                "refsource": "MISC",
+                "url": "https://github.com/minio/minio/pull/11801"
+            },
+            {
+                "name": "https://github.com/minio/minio/commit/e197800f9055489415b53cf137e31e194aaf7ba0",
+                "refsource": "MISC",
+                "url": "https://github.com/minio/minio/commit/e197800f9055489415b53cf137e31e194aaf7ba0"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-xr7r-7gpj-5pgp",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 85c60b49e7aab830a1a8bb061fe4ae2b5cdd25cf Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 16:00:48 +0000
Subject: [PATCH 440/845] "-Synchronized-Data."

---
 2020/17xxx/CVE-2020-17527.json | 5 +++++
 2021/21xxx/CVE-2021-21387.json | 2 +-
 2 files changed, 6 insertions(+), 1 deletion(-)

diff --git a/2020/17xxx/CVE-2020-17527.json b/2020/17xxx/CVE-2020-17527.json
index c88cebfc672..84c7429cbb4 100644
--- a/2020/17xxx/CVE-2020-17527.json
+++ b/2020/17xxx/CVE-2020-17527.json
@@ -168,6 +168,11 @@
                 "refsource": "DEBIAN",
                 "name": "DSA-4835",
                 "url": "https://www.debian.org/security/2021/dsa-4835"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[tomee-commits] 20210319 [jira] [Updated] (TOMEE-2936) TomEE plus(7.0.9) is affected by CVE-2020-17527(BDSA-2020-3628) vulnerability.",
+                "url": "https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21387.json b/2021/21xxx/CVE-2021-21387.json
index 7c8a752c60d..0f3fceec7db 100644
--- a/2021/21xxx/CVE-2021-21387.json
+++ b/2021/21xxx/CVE-2021-21387.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Wrongthink peer-to-peer, end-to-end encrypted messenger with PeerJS and Axolotl ratchet. In wrongthink from version 2.0.0 and before 2.3.0 there was a set of vulnerabilities causing inadequate encryption strength.  Part of the secret identity key was disclosed by the fingerprint used for connection. Additionally, the safety number was improperly calculated. It was computed using part of one of the public identity keys instead of being derived from both public identity keys. This caused issues in computing safety numbers which would potentially be exploitable in the real world. Additionally there was inadequate encryption strength due to use of 1024-bit DSA keys. These issues are all fixed in version 2.3.0."
+                "value": "Wrongthink peer-to-peer, end-to-end encrypted messenger with PeerJS and Axolotl ratchet. In wrongthink from version 2.0.0 and before 2.3.0 there was a set of vulnerabilities causing inadequate encryption strength. Part of the secret identity key was disclosed by the fingerprint used for connection. Additionally, the safety number was improperly calculated. It was computed using part of one of the public identity keys instead of being derived from both public identity keys. This caused issues in computing safety numbers which would potentially be exploitable in the real world. Additionally there was inadequate encryption strength due to use of 1024-bit DSA keys. These issues are all fixed in version 2.3.0."
             }
         ]
     },

From c50b92bbe98a522d27bf5592a3d79615b33c8a88 Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Fri, 19 Mar 2021 16:03:33 +0000
Subject: [PATCH 441/845] pdfbox issues

---
 2021/27xxx/CVE-2021-27807.json | 73 ++++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27906.json | 76 ++++++++++++++++++++++++++++++----
 2 files changed, 135 insertions(+), 14 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 9f9f6760427..1134b029cc6 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -1,18 +1,77 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-27807",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "A carefully crafted PDF file can trigger an infinite loop while loading the file"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache PDFBox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "Apache PDFBox",
+                                            "version_value": "2.0.22"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Apache PDFBox would like to thank Fabian Meumertzheim for reporting this issue"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-834 Excessive Iteration"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index c1a652bbeb2..cb53571e0d6 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -1,18 +1,80 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-27906",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache PDFBox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "Apache PDFBox",
+                                            "version_value": "2.0.22"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Apache PDFBox would like to thank Fabian Meumertzheim for reporting this issue"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-789: Memory Allocation with Excessive Size Value"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E"
+            }
+        ]
+    },
+    "source": {
+        "defect": [
+            "PDFBOX-5112"
+        ],
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}

From 13d9d56ebccbc104ea108bdac200366cdd0468c1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 17:00:41 +0000
Subject: [PATCH 442/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json | 10 ++++++
 2021/21xxx/CVE-2021-21390.json |  2 +-
 2021/25xxx/CVE-2021-25277.json | 61 ++++++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25278.json | 61 ++++++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27807.json | 12 +++++--
 2021/27xxx/CVE-2021-27906.json | 12 +++++--
 2021/28xxx/CVE-2021-28110.json |  5 ---
 2021/28xxx/CVE-2021-28126.json |  5 ---
 8 files changed, 139 insertions(+), 29 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 7de6154d60d..2259067fd88 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -248,6 +248,16 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210318 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210319 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210319 [jira] [Comment Edited] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21390.json b/2021/21xxx/CVE-2021-21390.json
index 1639e493169..1f0ffef9cc9 100644
--- a/2021/21xxx/CVE-2021-21390.json
+++ b/2021/21xxx/CVE-2021-21390.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater than the actual data sent: the server accepts and completes the request without ever reaching the end of the chunk + thereby without ever checking the chunk signature. This is fixed in version RELEASE.2021-03-17T02-33-02Z. As a workaround one can avoid using \"aws-chunked\" encoding-based chunk signature upload requests instead use TLS. MinIO SDKs automatically disable chunked encoding signature when the server endpoint is configured with TLS.  "
+                "value": "MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater than the actual data sent: the server accepts and completes the request without ever reaching the end of the chunk + thereby without ever checking the chunk signature. This is fixed in version RELEASE.2021-03-17T02-33-02Z. As a workaround one can avoid using \"aws-chunked\" encoding-based chunk signature upload requests instead use TLS. MinIO SDKs automatically disable chunked encoding signature when the server endpoint is configured with TLS."
             }
         ]
     },
diff --git a/2021/25xxx/CVE-2021-25277.json b/2021/25xxx/CVE-2021-25277.json
index 437a5e95bd4..262c1ada4bf 100644
--- a/2021/25xxx/CVE-2021-25277.json
+++ b/2021/25xxx/CVE-2021-25277.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25277",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25277",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "FTAPI 4.0 - 4.10 allows XSS via a crafted filename to the alternative text hover box in the file submission component."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.ftapi.com/release-notes/",
+                "refsource": "MISC",
+                "name": "https://www.ftapi.com/release-notes/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25277",
+                "url": "https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25277"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25278.json b/2021/25xxx/CVE-2021-25278.json
index 9845e7af055..3435f86b96b 100644
--- a/2021/25xxx/CVE-2021-25278.json
+++ b/2021/25xxx/CVE-2021-25278.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-25278",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-25278",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "FTAPI 4.0 through 4.10 allows XSS via an SVG document to the Background Image upload feature in the Submit Box Template Editor."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.ftapi.com/release-notes/",
+                "refsource": "MISC",
+                "name": "https://www.ftapi.com/release-notes/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25278",
+                "url": "https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25278"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 1134b029cc6..d1416047a73 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -66,12 +66,18 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E"
+                "refsource": "MISC",
+                "url": "https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E",
+                "name": "https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pdfbox-users] 20210319 CVE-2021-27807: A carefully crafted PDF file can trigger an infinite loop while loading the file",
+                "url": "https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E"
             }
         ]
     },
     "source": {
         "discovery": "UNKNOWN"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index cb53571e0d6..26eb9d44fa3 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -66,8 +66,14 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E"
+                "refsource": "MISC",
+                "url": "https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E",
+                "name": "https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pdfbox-users] 20210319 CVE-2021-27906: A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
+                "url": "https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E"
             }
         ]
     },
@@ -77,4 +83,4 @@
         ],
         "discovery": "UNKNOWN"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28110.json b/2021/28xxx/CVE-2021-28110.json
index a5eeb7a6115..0efcf680bc4 100644
--- a/2021/28xxx/CVE-2021-28110.json
+++ b/2021/28xxx/CVE-2021-28110.json
@@ -52,11 +52,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "url": "https://github.com/num8er/TranzWarePaymentGatewayApi",
-                "refsource": "MISC",
-                "name": "https://github.com/num8er/TranzWarePaymentGatewayApi"
-            },
             {
                 "refsource": "MISC",
                 "name": "https://gist.github.com/kukuxumushi/0b7d90a917ac3480066c4cbf7519b40a",
diff --git a/2021/28xxx/CVE-2021-28126.json b/2021/28xxx/CVE-2021-28126.json
index c33b49cdffd..e3be0e7b360 100644
--- a/2021/28xxx/CVE-2021-28126.json
+++ b/2021/28xxx/CVE-2021-28126.json
@@ -52,11 +52,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "url": "https://github.com/num8er/TranzWarePaymentGatewayApi",
-                "refsource": "MISC",
-                "name": "https://github.com/num8er/TranzWarePaymentGatewayApi"
-            },
             {
                 "refsource": "MISC",
                 "name": "https://gist.github.com/kukuxumushi/7436994ef395573023b79652e104a2a0",

From 0bc06c2b2f7048185cf03171c5d698650c63ee7c Mon Sep 17 00:00:00 2001
From: Moritz Grimm 
Date: Fri, 19 Mar 2021 18:41:01 +0100
Subject: [PATCH 443/845] Sophos CVE-2021-25265

---
 2021/25xxx/CVE-2021-25265.json | 62 ++++++++++++++++++++++++++++++++--
 1 file changed, 59 insertions(+), 3 deletions(-)

diff --git a/2021/25xxx/CVE-2021-25265.json b/2021/25xxx/CVE-2021-25265.json
index f0d6cc2e6e4..f5d19416b71 100644
--- a/2021/25xxx/CVE-2021-25265.json
+++ b/2021/25xxx/CVE-2021-25265.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25265",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@sophos.com",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Sophos Connect Client",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Sophos"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Kim Karlsson"
+        }
+    ],
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A malicious website could execute code remotely in Sophos Connect Client before version 2.1."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://community.sophos.com/b/security-blog",
+                "refsource": "MISC",
+                "url": "https://community.sophos.com/b/security-blog"
+            },
+            {
+                "name": "https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265",
+                "refsource": "CONFIRM",
+                "url": "https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265"
             }
         ]
     }

From b34b9fa271b593d592b05ef2fc40356005e0b32c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 18:00:39 +0000
Subject: [PATCH 444/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index df03628eaa3..e2fa34047d1 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -114,6 +114,11 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210319 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210319 [jira] [Comment Edited] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058@%3Cdev.ws.apache.org%3E"
             }
         ]
     },

From b9d8c4a736cad02ef2dde2ad75bcd4f4c161108b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 19:00:40 +0000
Subject: [PATCH 445/845] "-Synchronized-Data."

---
 2019/10xxx/CVE-2019-10127.json | 55 +++++++++++++++++++++++++++++++--
 2019/12xxx/CVE-2019-12962.json |  5 +++
 2021/1xxx/CVE-2021-1732.json   |  5 +++
 2021/20xxx/CVE-2021-20077.json | 50 ++++++++++++++++++++++++++++--
 2021/21xxx/CVE-2021-21978.json |  5 +++
 2021/26xxx/CVE-2021-26990.json | 50 ++++++++++++++++++++++++++++--
 2021/26xxx/CVE-2021-26991.json | 50 ++++++++++++++++++++++++++++--
 2021/26xxx/CVE-2021-26992.json | 50 ++++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27519.json | 56 ++++++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27520.json | 56 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28133.json | 10 ++++++
 2021/3xxx/CVE-2021-3454.json   | 18 +++++++++++
 2021/3xxx/CVE-2021-3455.json   | 18 +++++++++++
 13 files changed, 401 insertions(+), 27 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3454.json
 create mode 100644 2021/3xxx/CVE-2021-3455.json

diff --git a/2019/10xxx/CVE-2019-10127.json b/2019/10xxx/CVE-2019-10127.json
index 7ac76b7a7dc..abf6f414932 100644
--- a/2019/10xxx/CVE-2019-10127.json
+++ b/2019/10xxx/CVE-2019-10127.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-10127",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "postgresql",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "11.x prior to 11.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-284"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.postgresql.org/about/news/1939/",
+                "url": "https://www.postgresql.org/about/news/1939/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1707098",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707098"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files."
             }
         ]
     }
diff --git a/2019/12xxx/CVE-2019-12962.json b/2019/12xxx/CVE-2019-12962.json
index 2386d652dd3..feae22dbea4 100644
--- a/2019/12xxx/CVE-2019-12962.json
+++ b/2019/12xxx/CVE-2019-12962.json
@@ -56,6 +56,11 @@
                 "url": "https://forums.livezilla.net/index.php?/topic/10984-fg-vd-19-083085087-livezilla-server-are-vulnerable-to-cross-site-scripting-in-admin-panel/",
                 "refsource": "MISC",
                 "name": "https://forums.livezilla.net/index.php?/topic/10984-fg-vd-19-083085087-livezilla-server-are-vulnerable-to-cross-site-scripting-in-admin-panel/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html",
+                "url": "http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html"
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1732.json b/2021/1xxx/CVE-2021-1732.json
index 0b4ad2c1a29..05a1dadc80a 100644
--- a/2021/1xxx/CVE-2021-1732.json
+++ b/2021/1xxx/CVE-2021-1732.json
@@ -204,6 +204,11 @@
                 "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1732",
                 "refsource": "MISC",
                 "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1732"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html",
+                "url": "http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20077.json b/2021/20xxx/CVE-2021-20077.json
index 27d334750b0..4035315b7e8 100644
--- a/2021/20xxx/CVE-2021-20077.json
+++ b/2021/20xxx/CVE-2021-20077.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20077",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnreport@tenable.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Tenable Nessus Agent",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.2.0 through 8.2.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.tenable.com/security/tns-2021-04-0",
+                "url": "https://www.tenable.com/security/tns-2021-04-0"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Nessus Agent versions 7.2.0 through 8.2.2 were found to inadvertently capture the IAM role security token on the local host during initial linking of the Nessus Agent when installed on an Amazon EC2 instance. This could allow a privileged attacker to obtain the token."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21978.json b/2021/21xxx/CVE-2021-21978.json
index e8a29e71673..c7515b57b27 100644
--- a/2021/21xxx/CVE-2021-21978.json
+++ b/2021/21xxx/CVE-2021-21978.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://www.vmware.com/security/advisories/VMSA-2021-0003.html",
                 "url": "https://www.vmware.com/security/advisories/VMSA-2021-0003.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26990.json b/2021/26xxx/CVE-2021-26990.json
index 1fd6eb898a8..3672d52f218 100644
--- a/2021/26xxx/CVE-2021-26990.json
+++ b/2021/26xxx/CVE-2021-26990.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26990",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@netapp.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cloud Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Prior to 3.9.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Arbitrary File Overwrite"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.netapp.com/advisory/NTAP-20210318-0001",
+                "url": "https://security.netapp.com/advisory/NTAP-20210318-0001"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cloud Manager versions prior to 3.9.4 are susceptible to a vulnerability that could allow a remote attacker to overwrite arbitrary system files."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26991.json b/2021/26xxx/CVE-2021-26991.json
index b8d931363dc..05b8ef50a8a 100644
--- a/2021/26xxx/CVE-2021-26991.json
+++ b/2021/26xxx/CVE-2021-26991.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26991",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@netapp.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cloud Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Prior to 3.9.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Origin Resource Sharing (CORS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.netapp.com/advisory/NTAP-20210318-0002",
+                "url": "https://security.netapp.com/advisory/NTAP-20210318-0002"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cloud Manager versions prior to 3.9.4 contain an insecure Cross-Origin Resource Sharing (CORS) policy which could allow a remote attacker to interact with Cloud Manager."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26992.json b/2021/26xxx/CVE-2021-26992.json
index f41fed5e6c9..9fc0741b201 100644
--- a/2021/26xxx/CVE-2021-26992.json
+++ b/2021/26xxx/CVE-2021-26992.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26992",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@netapp.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cloud Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Prior to 3.9.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial of Service"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.netapp.com/advisory/NTAP-20210318-0003",
+                "url": "https://security.netapp.com/advisory/NTAP-20210318-0003"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cloud Manager versions prior to 3.9.4 are susceptible to a vulnerability which could allow a remote attacker to cause a Denial of Service (DoS)."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27519.json b/2021/27xxx/CVE-2021-27519.json
index da12d5733a6..04f8b741b10 100644
--- a/2021/27xxx/CVE-2021-27519.json
+++ b/2021/27xxx/CVE-2021-27519.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27519",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27519",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the \"srch\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/fudforum/FUDforum/issues/2",
+                "refsource": "MISC",
+                "name": "https://github.com/fudforum/FUDforum/issues/2"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27520.json b/2021/27xxx/CVE-2021-27520.json
index f045e232e6a..f9982a19a63 100644
--- a/2021/27xxx/CVE-2021-27520.json
+++ b/2021/27xxx/CVE-2021-27520.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27520",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27520",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the \"author\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/fudforum/FUDforum/issues/2",
+                "refsource": "MISC",
+                "name": "https://github.com/fudforum/FUDforum/issues/2"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28133.json b/2021/28xxx/CVE-2021-28133.json
index cf89df2a532..98d594fb782 100644
--- a/2021/28xxx/CVE-2021-28133.json
+++ b/2021/28xxx/CVE-2021-28133.json
@@ -71,6 +71,16 @@
                 "refsource": "MISC",
                 "name": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133",
                 "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133"
+            },
+            {
+                "refsource": "FULLDISC",
+                "name": "20210319 [SYSS-2020-044]: Zoom - Exposure of Resource to Wrong Sphere (CWE-668) (CVE-2021-28133)",
+                "url": "http://seclists.org/fulldisclosure/2021/Mar/48"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html",
+                "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3454.json b/2021/3xxx/CVE-2021-3454.json
new file mode 100644
index 00000000000..9608a01489e
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3454.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3454",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3455.json b/2021/3xxx/CVE-2021-3455.json
new file mode 100644
index 00000000000..f912ffee5ab
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3455.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3455",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 9521ae3a6c2f5c73a091ad52e1e9fc4980a07f1f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 20:00:42 +0000
Subject: [PATCH 446/845] "-Synchronized-Data."

---
 2019/10xxx/CVE-2019-10128.json | 55 ++++++++++++++++++++++++++++++++--
 2019/10xxx/CVE-2019-10151.json |  4 +--
 2019/10xxx/CVE-2019-10196.json | 55 ++++++++++++++++++++++++++++++++--
 3 files changed, 106 insertions(+), 8 deletions(-)

diff --git a/2019/10xxx/CVE-2019-10128.json b/2019/10xxx/CVE-2019-10128.json
index 00d2ce5d0df..87c4b4393de 100644
--- a/2019/10xxx/CVE-2019-10128.json
+++ b/2019/10xxx/CVE-2019-10128.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-10128",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "postgresql",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "11.x prior to 11.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-284"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.postgresql.org/about/news/1939/",
+                "url": "https://www.postgresql.org/about/news/1939/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1707102",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707102"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code."
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10151.json b/2019/10xxx/CVE-2019-10151.json
index 3df2aa6adf2..4d91da7f058 100644
--- a/2019/10xxx/CVE-2019-10151.json
+++ b/2019/10xxx/CVE-2019-10151.json
@@ -5,13 +5,13 @@
     "CVE_data_meta": {
         "ID": "CVE-2019-10151",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none."
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10196.json b/2019/10xxx/CVE-2019-10196.json
index 272ba59f656..28e503b3b7a 100644
--- a/2019/10xxx/CVE-2019-10196.json
+++ b/2019/10xxx/CVE-2019-10196.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-10196",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "nodejs-http-proxy-agent",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "prior to nodejs-http-proxy-agent 2.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-665"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1567245",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567245"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.npmjs.com/advisories/607",
+                "url": "https://www.npmjs.com/advisories/607"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter."
             }
         ]
     }

From 93dbc04d8f4573a199b8f279f7931aec07a64b3a Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 19 Mar 2021 14:24:36 -0600
Subject: [PATCH 447/845] Add CVE-2021-21267 for GHSA-f38p-c2gq-4pmr

---
 2021/21xxx/CVE-2021-21267.json | 95 +++++++++++++++++++++++++++++++---
 1 file changed, 89 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21267.json b/2021/21xxx/CVE-2021-21267.json
index 46fd04f7774..eb1a51631ec 100644
--- a/2021/21xxx/CVE-2021-21267.json
+++ b/2021/21xxx/CVE-2021-21267.json
@@ -1,18 +1,101 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21267",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Regular Expression Denial-of-Service in npm schema-inspector"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "schema-inspector",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 2.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "schema-inspector"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.5,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400: Uncontrolled Resource Consumption"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20: Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr"
+            },
+            {
+                "name": "https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f",
+                "refsource": "MISC",
+                "url": "https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f"
+            },
+            {
+                "name": "https://www.npmjs.com/package/schema-inspector",
+                "refsource": "MISC",
+                "url": "https://www.npmjs.com/package/schema-inspector"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-f38p-c2gq-4pmr",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 310d5d5da06b901970edbb9d3fec568231203305 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 21:00:45 +0000
Subject: [PATCH 448/845] "-Synchronized-Data."

---
 2019/10xxx/CVE-2019-10200.json | 55 ++++++++++++++++++++++++++--
 2019/10xxx/CVE-2019-10225.json | 50 +++++++++++++++++++++++--
 2019/14xxx/CVE-2019-14828.json | 62 +++++++++++++++++++++++++++++++
 2019/14xxx/CVE-2019-14829.json | 67 ++++++++++++++++++++++++++++++++++
 2019/14xxx/CVE-2019-14830.json | 67 ++++++++++++++++++++++++++++++++++
 2019/14xxx/CVE-2019-14831.json | 67 ++++++++++++++++++++++++++++++++++
 2021/0xxx/CVE-2021-0384.json   | 50 ++-----------------------
 2021/21xxx/CVE-2021-21381.json |  5 +++
 2021/27xxx/CVE-2021-27291.json |  5 +++
 2021/27xxx/CVE-2021-27807.json |  5 +++
 2021/27xxx/CVE-2021-27906.json |  5 +++
 11 files changed, 385 insertions(+), 53 deletions(-)
 create mode 100644 2019/14xxx/CVE-2019-14828.json
 create mode 100644 2019/14xxx/CVE-2019-14829.json
 create mode 100644 2019/14xxx/CVE-2019-14830.json
 create mode 100644 2019/14xxx/CVE-2019-14831.json

diff --git a/2019/10xxx/CVE-2019-10200.json b/2019/10xxx/CVE-2019-10200.json
index 0bc318065b8..dbc0d981d4c 100644
--- a/2019/10xxx/CVE-2019-10200.json
+++ b/2019/10xxx/CVE-2019-10200.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-10200",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenShift Container Platform",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenShift Container Platform 4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-284"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1730161",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730161"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openshift/cluster-kube-apiserver-operator/pull/524",
+                "url": "https://github.com/openshift/cluster-kube-apiserver-operator/pull/524"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was discovered in OpenShift Container Platform 4 where, by default, users with access to create pods also have the ability to schedule workloads on master nodes. Pods with permission to access the host network, running on master nodes, can retrieve security credentials for the master AWS IAM role, allowing management access to AWS resources. With access to the security credentials, the user then has access to the entire infrastructure. Impact to data and system availability is high."
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10225.json b/2019/10xxx/CVE-2019-10225.json
index 634b1d71d12..c64997a7cbd 100644
--- a/2019/10xxx/CVE-2019-10225.json
+++ b/2019/10xxx/CVE-2019-10225.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-10225",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "atomic-openshift",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "atomic-openshift of openshift-4.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-522"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1743073",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743073"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files."
             }
         ]
     }
diff --git a/2019/14xxx/CVE-2019-14828.json b/2019/14xxx/CVE-2019-14828.json
new file mode 100644
index 00000000000..58566179821
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14828.json
@@ -0,0 +1,62 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14828",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Moodle",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-285"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://moodle.org/mod/forum/discuss.php?d=391031",
+                "url": "https://moodle.org/mod/forum/discuss.php?d=391031"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A vulnerability was found in Moodle affecting 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where users with the capability to create courses were assigned as a teacher in those courses, regardless of whether they had the capability to be automatically assigned that role."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14829.json b/2019/14xxx/CVE-2019-14829.json
new file mode 100644
index 00000000000..cd23705d665
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14829.json
@@ -0,0 +1,67 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14829",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Moodle",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-573"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://moodle.org/mod/forum/discuss.php?d=391035",
+                "url": "https://moodle.org/mod/forum/discuss.php?d=391035"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://git.moodle.org/gw?p=moodle.git;a=commit;h=208397c120b6bf74ca6a173e42cb527904c5ab42",
+                "url": "https://git.moodle.org/gw?p=moodle.git;a=commit;h=208397c120b6bf74ca6a173e42cb527904c5ab42"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A vulnerability was found in Moodle affection 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions where activity creation capabilities were not correctly respected when selecting the activity to use for a course in single activity mode."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14830.json b/2019/14xxx/CVE-2019-14830.json
new file mode 100644
index 00000000000..98820dc3869
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14830.json
@@ -0,0 +1,67 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14830",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Moodle",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-601"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://moodle.org/mod/forum/discuss.php?d=391036",
+                "url": "https://moodle.org/mod/forum/discuss.php?d=391036"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://git.moodle.org/gw?p=moodle.git;a=commit;h=d4985a77391123c5959db432c076328f8d5e3624",
+                "url": "https://git.moodle.org/gw?p=moodle.git;a=commit;h=d4985a77391123c5959db432c076328f8d5e3624"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where the mobile launch endpoint contained an open redirect in some circumstances, which could result in a user's mobile access token being exposed. (Note: This does not affect sites with a forced URL scheme configured, mobile service disabled, or where the mobile app login method is \"via the app\")."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2019/14xxx/CVE-2019-14831.json b/2019/14xxx/CVE-2019-14831.json
new file mode 100644
index 00000000000..86d92c675b0
--- /dev/null
+++ b/2019/14xxx/CVE-2019-14831.json
@@ -0,0 +1,67 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-14831",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Moodle",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-601"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://moodle.org/mod/forum/discuss.php?d=391037",
+                "url": "https://moodle.org/mod/forum/discuss.php?d=391037"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://git.moodle.org/gw?p=moodle.git;a=commit;h=32e2e06a8737afb07ee83abb3eacd39f8b181216",
+                "url": "https://git.moodle.org/gw?p=moodle.git;a=commit;h=32e2e06a8737afb07ee83abb3eacd39f8b181216"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where forum subscribe link contained an open redirect if forced subscription mode was enabled. If a forum's subscription mode was set to \"forced subscription\", the forum's subscribe link contained an open redirect."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/0xxx/CVE-2021-0384.json b/2021/0xxx/CVE-2021-0384.json
index 91ee33448ab..16384f43f99 100644
--- a/2021/0xxx/CVE-2021-0384.json
+++ b/2021/0xxx/CVE-2021-0384.json
@@ -4,58 +4,14 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-0384",
-        "ASSIGNER": "security@android.com",
-        "STATE": "PUBLIC"
-    },
-    "affects": {
-        "vendor": {
-            "vendor_data": [
-                {
-                    "vendor_name": "n/a",
-                    "product": {
-                        "product_data": [
-                            {
-                                "product_name": "Android",
-                                "version": {
-                                    "version_data": [
-                                        {
-                                            "version_value": "Android-11"
-                                        }
-                                    ]
-                                }
-                            }
-                        ]
-                    }
-                }
-            ]
-        }
-    },
-    "problemtype": {
-        "problemtype_data": [
-            {
-                "description": [
-                    {
-                        "lang": "eng",
-                        "value": "Denial of service"
-                    }
-                ]
-            }
-        ]
-    },
-    "references": {
-        "reference_data": [
-            {
-                "refsource": "MISC",
-                "name": "https://source.android.com/security/bulletin/pixel/2021-03-01",
-                "url": "https://source.android.com/security/bulletin/pixel/2021-03-01"
-            }
-        ]
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In read_and_discard_scanlines of jdapistd.c, there is a possible null pointer exception due to a missing NULL check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-173702583"
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21381.json b/2021/21xxx/CVE-2021-21381.json
index 35036fc416e..ed6e8e271eb 100644
--- a/2021/21xxx/CVE-2021-21381.json
+++ b/2021/21xxx/CVE-2021-21381.json
@@ -103,6 +103,11 @@
                 "refsource": "DEBIAN",
                 "name": "DSA-4868",
                 "url": "https://www.debian.org/security/2021/dsa-4868"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-26ad138ffa",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXNVFOIB6ZP4DGOVKAM25T6OIEP3YLGV/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27291.json b/2021/27xxx/CVE-2021-27291.json
index 14d0d0e9ea5..1726a3a43df 100644
--- a/2021/27xxx/CVE-2021-27291.json
+++ b/2021/27xxx/CVE-2021-27291.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14",
                 "url": "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index d1416047a73..a963537a878 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -74,6 +74,11 @@
                 "refsource": "MLIST",
                 "name": "[pdfbox-users] 20210319 CVE-2021-27807: A carefully crafted PDF file can trigger an infinite loop while loading the file",
                 "url": "https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210319 CVE-2021-27807: Apache PDFBox: A carefully crafted PDF file can trigger an infinite loop while loading the file",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/19/9"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index 26eb9d44fa3..b605c4109a8 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -74,6 +74,11 @@
                 "refsource": "MLIST",
                 "name": "[pdfbox-users] 20210319 CVE-2021-27906: A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
                 "url": "https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210319 CVE-2021-27906: Apache PDFBox: A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/19/10"
             }
         ]
     },

From a0a09a4f8b88ae4b358febe96d25dcd6b671ca12 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 22:00:40 +0000
Subject: [PATCH 449/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28243.json | 5 +++++
 2020/28xxx/CVE-2020-28972.json | 5 +++++
 2020/35xxx/CVE-2020-35662.json | 5 +++++
 2020/8xxx/CVE-2020-8625.json   | 5 +++++
 2021/0xxx/CVE-2021-0326.json   | 5 +++++
 2021/21xxx/CVE-2021-21330.json | 5 +++++
 2021/25xxx/CVE-2021-25281.json | 5 +++++
 2021/25xxx/CVE-2021-25282.json | 5 +++++
 2021/25xxx/CVE-2021-25283.json | 5 +++++
 2021/25xxx/CVE-2021-25284.json | 5 +++++
 2021/27xxx/CVE-2021-27803.json | 5 +++++
 2021/3xxx/CVE-2021-3144.json   | 5 +++++
 2021/3xxx/CVE-2021-3148.json   | 5 +++++
 2021/3xxx/CVE-2021-3197.json   | 5 +++++
 2021/3xxx/CVE-2021-3405.json   | 5 +++++
 2021/3xxx/CVE-2021-3406.json   | 5 +++++
 2021/3xxx/CVE-2021-3407.json   | 5 +++++
 17 files changed, 85 insertions(+)

diff --git a/2020/28xxx/CVE-2020-28243.json b/2020/28xxx/CVE-2020-28243.json
index fbfa9195565..63454488edb 100644
--- a/2020/28xxx/CVE-2020-28243.json
+++ b/2020/28xxx/CVE-2020-28243.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2020/28xxx/CVE-2020-28972.json b/2020/28xxx/CVE-2020-28972.json
index 38321041188..66aba89452c 100644
--- a/2020/28xxx/CVE-2020-28972.json
+++ b/2020/28xxx/CVE-2020-28972.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35662.json b/2020/35xxx/CVE-2020-35662.json
index 0bf6944280b..1a26299e06f 100644
--- a/2020/35xxx/CVE-2020-35662.json
+++ b/2020/35xxx/CVE-2020-35662.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8625.json b/2020/8xxx/CVE-2020-8625.json
index 04f9ba21d84..9dfc19c930d 100644
--- a/2020/8xxx/CVE-2020-8625.json
+++ b/2020/8xxx/CVE-2020-8625.json
@@ -121,6 +121,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210319-0001/",
                 "url": "https://security.netapp.com/advisory/ntap-20210319-0001/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-8b4744f152",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/"
             }
         ]
     },
diff --git a/2021/0xxx/CVE-2021-0326.json b/2021/0xxx/CVE-2021-0326.json
index de0af3ec76c..dd8ff75ba8d 100644
--- a/2021/0xxx/CVE-2021-0326.json
+++ b/2021/0xxx/CVE-2021-0326.json
@@ -58,6 +58,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210220 [SECURITY] [DLA 2572-1] wpa security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00033.html"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-defe51d282",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOSA6DZUDLVOCYJNNXD6V3MRBVLCXZFH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21330.json b/2021/21xxx/CVE-2021-21330.json
index 0cd57495a4e..19e935c5d7b 100644
--- a/2021/21xxx/CVE-2021-21330.json
+++ b/2021/21xxx/CVE-2021-21330.json
@@ -98,6 +98,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-673b10ed77",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-902c1b07c9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU7ENI54JNEK3PHEFGCE46DGMFNTVU6L/"
             }
         ]
     },
diff --git a/2021/25xxx/CVE-2021-25281.json b/2021/25xxx/CVE-2021-25281.json
index 2bddf8ee10b..3607414384a 100644
--- a/2021/25xxx/CVE-2021-25281.json
+++ b/2021/25xxx/CVE-2021-25281.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25282.json b/2021/25xxx/CVE-2021-25282.json
index 410aca23bbe..e1fe6b4d794 100644
--- a/2021/25xxx/CVE-2021-25282.json
+++ b/2021/25xxx/CVE-2021-25282.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25283.json b/2021/25xxx/CVE-2021-25283.json
index 895ed10535a..85406db16cf 100644
--- a/2021/25xxx/CVE-2021-25283.json
+++ b/2021/25xxx/CVE-2021-25283.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25284.json b/2021/25xxx/CVE-2021-25284.json
index f22e14df102..656455ea1b5 100644
--- a/2021/25xxx/CVE-2021-25284.json
+++ b/2021/25xxx/CVE-2021-25284.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27803.json b/2021/27xxx/CVE-2021-27803.json
index 1e9183a9a23..5ff34b3b462 100644
--- a/2021/27xxx/CVE-2021-27803.json
+++ b/2021/27xxx/CVE-2021-27803.json
@@ -86,6 +86,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-99cad2b81f",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9b00febe54",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEHS2CFGH3KCSNPHBHNGN5SGV6QPMLZ4/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3144.json b/2021/3xxx/CVE-2021-3144.json
index df2f7750d83..ed7ce187841 100644
--- a/2021/3xxx/CVE-2021-3144.json
+++ b/2021/3xxx/CVE-2021-3144.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3148.json b/2021/3xxx/CVE-2021-3148.json
index 1eb576b7ad1..33b3373f625 100644
--- a/2021/3xxx/CVE-2021-3148.json
+++ b/2021/3xxx/CVE-2021-3148.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3197.json b/2021/3xxx/CVE-2021-3197.json
index bc15ade03cb..9a8ac581bf5 100644
--- a/2021/3xxx/CVE-2021-3197.json
+++ b/2021/3xxx/CVE-2021-3197.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5756fbf8a6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-43eb5584ad",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3405.json b/2021/3xxx/CVE-2021-3405.json
index de2011c4708..67fbd0ed019 100644
--- a/2021/3xxx/CVE-2021-3405.json
+++ b/2021/3xxx/CVE-2021-3405.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa78f97893",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e283997bb9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3406.json b/2021/3xxx/CVE-2021-3406.json
index d161bdd7a4d..cd92da9b1d2 100644
--- a/2021/3xxx/CVE-2021-3406.json
+++ b/2021/3xxx/CVE-2021-3406.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/keylime/keylime/security/advisories/GHSA-78f8-6c68-375m",
                 "url": "https://github.com/keylime/keylime/security/advisories/GHSA-78f8-6c68-375m"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-b7854ccfe4",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAWKEF2LVXUME266T6RNRVBGAD375QAT/"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3407.json b/2021/3xxx/CVE-2021-3407.json
index 5763ac686ef..f8bc062bc8a 100644
--- a/2021/3xxx/CVE-2021-3407.json
+++ b/2021/3xxx/CVE-2021-3407.json
@@ -63,6 +63,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210311 [SECURITY] [DLA 2589-1] mupdf security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00012.html"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-baeaa7bccb",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLC6MPH7YS6JPU427XOFRLF3KKZQUZJN/"
             }
         ]
     },

From 6503aa521761334fb52b92a0c2420843f20deb8a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 19 Mar 2021 23:00:39 +0000
Subject: [PATCH 450/845] "-Synchronized-Data."

---
 2020/11xxx/CVE-2020-11987.json |  5 +++++
 2020/13xxx/CVE-2020-13574.json |  5 +++++
 2020/13xxx/CVE-2020-13575.json |  5 +++++
 2020/13xxx/CVE-2020-13576.json |  5 +++++
 2020/13xxx/CVE-2020-13577.json |  5 +++++
 2020/13xxx/CVE-2020-13578.json |  5 +++++
 2020/13xxx/CVE-2020-13977.json |  5 +++++
 2020/29xxx/CVE-2020-29074.json |  5 +++++
 2020/29xxx/CVE-2020-29385.json |  5 +++++
 2021/20xxx/CVE-2021-20179.json |  5 +++++
 2021/20xxx/CVE-2021-20279.json |  5 +++++
 2021/20xxx/CVE-2021-20280.json |  5 +++++
 2021/20xxx/CVE-2021-20281.json |  5 +++++
 2021/20xxx/CVE-2021-20282.json |  5 +++++
 2021/20xxx/CVE-2021-20283.json |  5 +++++
 2021/21xxx/CVE-2021-21300.json |  5 +++++
 2021/21xxx/CVE-2021-21334.json |  5 +++++
 2021/21xxx/CVE-2021-21367.json |  5 +++++
 2021/21xxx/CVE-2021-21381.json |  5 +++++
 2021/22xxx/CVE-2021-22883.json |  5 +++++
 2021/22xxx/CVE-2021-22884.json |  5 +++++
 2021/23xxx/CVE-2021-23336.json | 15 +++++++++++++++
 2021/23xxx/CVE-2021-23351.json |  5 +++++
 2021/26xxx/CVE-2021-26926.json |  5 +++++
 2021/26xxx/CVE-2021-26927.json |  5 +++++
 2021/27xxx/CVE-2021-27218.json |  5 +++++
 2021/27xxx/CVE-2021-27219.json |  5 +++++
 2021/27xxx/CVE-2021-27645.json |  5 +++++
 2021/27xxx/CVE-2021-27921.json |  5 +++++
 2021/27xxx/CVE-2021-27922.json |  5 +++++
 2021/27xxx/CVE-2021-27923.json |  5 +++++
 2021/3xxx/CVE-2021-3420.json   |  5 +++++
 32 files changed, 170 insertions(+)

diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json
index 9e66f9b4ae3..2a83b51ef87 100644
--- a/2020/11xxx/CVE-2020-11987.json
+++ b/2020/11xxx/CVE-2020-11987.json
@@ -58,6 +58,11 @@
                 "refsource": "MLIST",
                 "name": "[poi-dev] 20210308 [Bug 65166] Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)",
                 "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-65ff5f10e2",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13574.json b/2020/13xxx/CVE-2020-13574.json
index 80b1530cafc..50479a25568 100644
--- a/2020/13xxx/CVE-2020-13574.json
+++ b/2020/13xxx/CVE-2020-13574.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-faea36a9c3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1da151722e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13575.json b/2020/13xxx/CVE-2020-13575.json
index 7427e4f1214..594b1c09a7d 100644
--- a/2020/13xxx/CVE-2020-13575.json
+++ b/2020/13xxx/CVE-2020-13575.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-faea36a9c3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1da151722e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13576.json b/2020/13xxx/CVE-2020-13576.json
index 743a8241620..f22792e2e05 100644
--- a/2020/13xxx/CVE-2020-13576.json
+++ b/2020/13xxx/CVE-2020-13576.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-faea36a9c3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1da151722e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13577.json b/2020/13xxx/CVE-2020-13577.json
index 2c04e5e2266..82a07071baf 100644
--- a/2020/13xxx/CVE-2020-13577.json
+++ b/2020/13xxx/CVE-2020-13577.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-faea36a9c3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1da151722e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13578.json b/2020/13xxx/CVE-2020-13578.json
index a600e4596da..04fcc3b92e8 100644
--- a/2020/13xxx/CVE-2020-13578.json
+++ b/2020/13xxx/CVE-2020-13578.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-faea36a9c3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1da151722e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13977.json b/2020/13xxx/CVE-2020-13977.json
index fdaae1aa133..e2ca969f239 100644
--- a/2020/13xxx/CVE-2020-13977.json
+++ b/2020/13xxx/CVE-2020-13977.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-5689072a7e",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-01a2f76cc3",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/"
             }
         ]
     }
diff --git a/2020/29xxx/CVE-2020-29074.json b/2020/29xxx/CVE-2020-29074.json
index aae10124a3e..8f9c6b5c148 100644
--- a/2020/29xxx/CVE-2020-29074.json
+++ b/2020/29xxx/CVE-2020-29074.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-93911302d6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H2FLWSVH32O6JXLRQBYDQLP7XRSTLUPQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-069c0c3950",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZL6NQTNK5PT63D2JX5YVV5OLUL76S5C/"
             }
         ]
     }
diff --git a/2020/29xxx/CVE-2020-29385.json b/2020/29xxx/CVE-2020-29385.json
index bdd0ee47015..0c090ba194c 100644
--- a/2020/29xxx/CVE-2020-29385.json
+++ b/2020/29xxx/CVE-2020-29385.json
@@ -86,6 +86,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-755ba8968a",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5H3GNVWMZTYZR3JBYCK57PF7PFMQBNP/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c918632e13",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGZVCTH5O7WBJLYXZ2UOKLYNIFPVR55D/"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20179.json b/2021/20xxx/CVE-2021-20179.json
index 6fc2ff6d4c5..0cc6a21ab87 100644
--- a/2021/20xxx/CVE-2021-20179.json
+++ b/2021/20xxx/CVE-2021-20179.json
@@ -73,6 +73,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/dogtagpki/pki/pull/3474",
                 "url": "https://github.com/dogtagpki/pki/pull/3474"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c0d6637ca5",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3I7BRAHLE2WWSY76W3CKFCF5WSSAE24/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20279.json b/2021/20xxx/CVE-2021-20279.json
index c5b96609631..e4cbd117b8d 100644
--- a/2021/20xxx/CVE-2021-20279.json
+++ b/2021/20xxx/CVE-2021-20279.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://moodle.org/mod/forum/discuss.php?d=419650",
                 "url": "https://moodle.org/mod/forum/discuss.php?d=419650"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1c27e89d49",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20280.json b/2021/20xxx/CVE-2021-20280.json
index e4518d10713..7d53f78a96e 100644
--- a/2021/20xxx/CVE-2021-20280.json
+++ b/2021/20xxx/CVE-2021-20280.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://moodle.org/mod/forum/discuss.php?d=419651",
                 "url": "https://moodle.org/mod/forum/discuss.php?d=419651"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1c27e89d49",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20281.json b/2021/20xxx/CVE-2021-20281.json
index e01debb374a..2c647c518df 100644
--- a/2021/20xxx/CVE-2021-20281.json
+++ b/2021/20xxx/CVE-2021-20281.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://moodle.org/mod/forum/discuss.php?d=419652",
                 "url": "https://moodle.org/mod/forum/discuss.php?d=419652"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1c27e89d49",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20282.json b/2021/20xxx/CVE-2021-20282.json
index 942ea152e50..ab84948d2c6 100644
--- a/2021/20xxx/CVE-2021-20282.json
+++ b/2021/20xxx/CVE-2021-20282.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://moodle.org/mod/forum/discuss.php?d=419653",
                 "url": "https://moodle.org/mod/forum/discuss.php?d=419653"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1c27e89d49",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20283.json b/2021/20xxx/CVE-2021-20283.json
index d678215a026..7eb24255fe5 100644
--- a/2021/20xxx/CVE-2021-20283.json
+++ b/2021/20xxx/CVE-2021-20283.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://moodle.org/mod/forum/discuss.php?d=419654",
                 "url": "https://moodle.org/mod/forum/discuss.php?d=419654"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1c27e89d49",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21300.json b/2021/21xxx/CVE-2021-21300.json
index 8c85bbb799d..f2dafbd39d2 100644
--- a/2021/21xxx/CVE-2021-21300.json
+++ b/2021/21xxx/CVE-2021-21300.json
@@ -147,6 +147,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-ffd0b2108d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-03e61a6647",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21334.json b/2021/21xxx/CVE-2021-21334.json
index 120e49a8d34..be2655d8200 100644
--- a/2021/21xxx/CVE-2021-21334.json
+++ b/2021/21xxx/CVE-2021-21334.json
@@ -101,6 +101,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-10ce8fcbf1",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIBPKSX5IOWPM3ZPFB3JVLXWDHSZTTWT/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f049305892",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTXHA5JOWQRCCUZH7ZQBEYN6KZKJEYSD/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21367.json b/2021/21xxx/CVE-2021-21367.json
index bf89dec891c..8ef985df6a5 100644
--- a/2021/21xxx/CVE-2021-21367.json
+++ b/2021/21xxx/CVE-2021-21367.json
@@ -93,6 +93,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-7d55c00267",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV7WKO5SZHTF3QEMX4WZ576HRECIG6VQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6210be0100",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWUPPVFG76PXQA3AHSGKYPRMVZ5AYHZI/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21381.json b/2021/21xxx/CVE-2021-21381.json
index ed6e8e271eb..f7364af67ef 100644
--- a/2021/21xxx/CVE-2021-21381.json
+++ b/2021/21xxx/CVE-2021-21381.json
@@ -108,6 +108,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-26ad138ffa",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXNVFOIB6ZP4DGOVKAM25T6OIEP3YLGV/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-fe7decc595",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MXXLXC2DPJ45HSMTI5MZYHMYEGQN6AA/"
             }
         ]
     },
diff --git a/2021/22xxx/CVE-2021-22883.json b/2021/22xxx/CVE-2021-22883.json
index c48f7905cec..6c813c4169f 100644
--- a/2021/22xxx/CVE-2021-22883.json
+++ b/2021/22xxx/CVE-2021-22883.json
@@ -63,6 +63,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-f6bd75e9d4",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6aaba80ba2",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/"
             }
         ]
     },
diff --git a/2021/22xxx/CVE-2021-22884.json b/2021/22xxx/CVE-2021-22884.json
index f7c89740cc4..252a98e5234 100644
--- a/2021/22xxx/CVE-2021-22884.json
+++ b/2021/22xxx/CVE-2021-22884.json
@@ -68,6 +68,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-f6bd75e9d4",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6aaba80ba2",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/"
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json
index cccbd066d7e..6fd2561ac7a 100644
--- a/2021/23xxx/CVE-2021-23336.json
+++ b/2021/23xxx/CVE-2021-23336.json
@@ -169,6 +169,21 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-309bc2e727",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-5a09621ebb",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e22bb0e548",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e525e48886",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/"
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23351.json b/2021/23xxx/CVE-2021-23351.json
index 59d5784ec91..568be6cfe86 100644
--- a/2021/23xxx/CVE-2021-23351.json
+++ b/2021/23xxx/CVE-2021-23351.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e01c1fe4cc",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f5fcd9b0c1",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU/"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26926.json b/2021/26xxx/CVE-2021-26926.json
index 59cd81a18f1..41320980463 100644
--- a/2021/26xxx/CVE-2021-26926.json
+++ b/2021/26xxx/CVE-2021-26926.json
@@ -63,6 +63,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-56a49b0bc6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-5a34dd3f2d",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26927.json b/2021/26xxx/CVE-2021-26927.json
index ceb9bc36434..c66616e6bd3 100644
--- a/2021/26xxx/CVE-2021-26927.json
+++ b/2021/26xxx/CVE-2021-26927.json
@@ -63,6 +63,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-56a49b0bc6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-5a34dd3f2d",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27218.json b/2021/27xxx/CVE-2021-27218.json
index b291227a330..0983b609d2a 100644
--- a/2021/27xxx/CVE-2021-27218.json
+++ b/2021/27xxx/CVE-2021-27218.json
@@ -76,6 +76,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210319-0004/",
                 "url": "https://security.netapp.com/advisory/ntap-20210319-0004/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-7b5e2e6844",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27219.json b/2021/27xxx/CVE-2021-27219.json
index c3a334e5fa2..2b27311f4c0 100644
--- a/2021/27xxx/CVE-2021-27219.json
+++ b/2021/27xxx/CVE-2021-27219.json
@@ -71,6 +71,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210319-0004/",
                 "url": "https://security.netapp.com/advisory/ntap-20210319-0004/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-7b5e2e6844",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27645.json b/2021/27xxx/CVE-2021-27645.json
index 832599c640f..99ceb83ed60 100644
--- a/2021/27xxx/CVE-2021-27645.json
+++ b/2021/27xxx/CVE-2021-27645.json
@@ -56,6 +56,11 @@
                 "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462",
                 "refsource": "MISC",
                 "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6749bfcfd9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27921.json b/2021/27xxx/CVE-2021-27921.json
index afc73a0a81a..9c24195d8d2 100644
--- a/2021/27xxx/CVE-2021-27921.json
+++ b/2021/27xxx/CVE-2021-27921.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-15845d3abe",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9016a9b7bd",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27922.json b/2021/27xxx/CVE-2021-27922.json
index 87cb1fcd080..f2c5b161db6 100644
--- a/2021/27xxx/CVE-2021-27922.json
+++ b/2021/27xxx/CVE-2021-27922.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-15845d3abe",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9016a9b7bd",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27923.json b/2021/27xxx/CVE-2021-27923.json
index 98e60eebd63..598d4490b65 100644
--- a/2021/27xxx/CVE-2021-27923.json
+++ b/2021/27xxx/CVE-2021-27923.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-15845d3abe",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9016a9b7bd",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3420.json b/2021/3xxx/CVE-2021-3420.json
index 193d49638d7..e5567029b44 100644
--- a/2021/3xxx/CVE-2021-3420.json
+++ b/2021/3xxx/CVE-2021-3420.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-267c08cc40",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSQZEUANAWBBAOC4TF5PTPJVLMUR7SFD/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-0fa2f42d3c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMK54N6UOPBFFX2YT32TWSAEFTHGSKAA/"
             }
         ]
     },

From 44b2cab3aaed48931d0f4632a404b88eca2d05e0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 03:00:39 +0000
Subject: [PATCH 451/845] "-Synchronized-Data."

---
 2020/36xxx/CVE-2020-36241.json |  5 +++++
 2021/20xxx/CVE-2021-20179.json | 10 ++++++++++
 2021/21xxx/CVE-2021-21149.json |  5 +++++
 2021/21xxx/CVE-2021-21150.json |  5 +++++
 2021/21xxx/CVE-2021-21151.json |  5 +++++
 2021/21xxx/CVE-2021-21152.json |  5 +++++
 2021/21xxx/CVE-2021-21153.json |  5 +++++
 2021/21xxx/CVE-2021-21154.json |  5 +++++
 2021/21xxx/CVE-2021-21155.json |  5 +++++
 2021/21xxx/CVE-2021-21156.json |  5 +++++
 2021/21xxx/CVE-2021-21157.json |  5 +++++
 2021/21xxx/CVE-2021-21159.json |  5 +++++
 2021/21xxx/CVE-2021-21160.json |  5 +++++
 2021/21xxx/CVE-2021-21161.json |  5 +++++
 2021/21xxx/CVE-2021-21162.json |  5 +++++
 2021/21xxx/CVE-2021-21163.json |  5 +++++
 2021/21xxx/CVE-2021-21164.json |  5 +++++
 2021/21xxx/CVE-2021-21165.json |  5 +++++
 2021/21xxx/CVE-2021-21166.json |  5 +++++
 2021/21xxx/CVE-2021-21167.json |  5 +++++
 2021/21xxx/CVE-2021-21168.json |  5 +++++
 2021/21xxx/CVE-2021-21169.json |  5 +++++
 2021/21xxx/CVE-2021-21170.json |  5 +++++
 2021/21xxx/CVE-2021-21171.json |  5 +++++
 2021/21xxx/CVE-2021-21172.json |  5 +++++
 2021/21xxx/CVE-2021-21173.json |  5 +++++
 2021/21xxx/CVE-2021-21174.json |  5 +++++
 2021/21xxx/CVE-2021-21175.json |  5 +++++
 2021/21xxx/CVE-2021-21176.json |  5 +++++
 2021/21xxx/CVE-2021-21177.json |  5 +++++
 2021/21xxx/CVE-2021-21178.json |  5 +++++
 2021/21xxx/CVE-2021-21179.json |  5 +++++
 2021/21xxx/CVE-2021-21180.json |  5 +++++
 2021/21xxx/CVE-2021-21181.json |  5 +++++
 2021/21xxx/CVE-2021-21182.json |  5 +++++
 2021/21xxx/CVE-2021-21183.json |  5 +++++
 2021/21xxx/CVE-2021-21184.json |  5 +++++
 2021/21xxx/CVE-2021-21185.json |  5 +++++
 2021/21xxx/CVE-2021-21186.json |  5 +++++
 2021/21xxx/CVE-2021-21187.json |  5 +++++
 2021/21xxx/CVE-2021-21188.json |  5 +++++
 2021/21xxx/CVE-2021-21189.json |  5 +++++
 2021/21xxx/CVE-2021-21190.json |  5 +++++
 2021/28xxx/CVE-2021-28375.json | 10 ++++++++++
 2021/28xxx/CVE-2021-28650.json |  5 +++++
 2021/28xxx/CVE-2021-28660.json |  5 +++++
 46 files changed, 240 insertions(+)

diff --git a/2020/36xxx/CVE-2020-36241.json b/2020/36xxx/CVE-2020-36241.json
index 56e0d708d60..58880b34b9b 100644
--- a/2020/36xxx/CVE-2020-36241.json
+++ b/2020/36xxx/CVE-2020-36241.json
@@ -61,6 +61,11 @@
                 "url": "https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/adb067e645732fdbe7103516e506d09eb6a54429",
                 "refsource": "MISC",
                 "name": "https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/adb067e645732fdbe7103516e506d09eb6a54429"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-303f6623fa",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN5TVQ7OHZEGY6AGFLAZWCVCI53RYNHQ/"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20179.json b/2021/20xxx/CVE-2021-20179.json
index 0cc6a21ab87..8bb24a4ae33 100644
--- a/2021/20xxx/CVE-2021-20179.json
+++ b/2021/20xxx/CVE-2021-20179.json
@@ -78,6 +78,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c0d6637ca5",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3I7BRAHLE2WWSY76W3CKFCF5WSSAE24/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-344dd24c84",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRE44N6P24AEDKRMWK7RPRLMCUUBRJII/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6c412a4601",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDOLFOLEIV7I4EUC3SCZBXL6E2ER7ZEN/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21149.json b/2021/21xxx/CVE-2021-21149.json
index 9e7e4c41351..d747db9cf25 100644
--- a/2021/21xxx/CVE-2021-21149.json
+++ b/2021/21xxx/CVE-2021-21149.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21150.json b/2021/21xxx/CVE-2021-21150.json
index 75a8cf242fe..5538fbc2ba7 100644
--- a/2021/21xxx/CVE-2021-21150.json
+++ b/2021/21xxx/CVE-2021-21150.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21151.json b/2021/21xxx/CVE-2021-21151.json
index 37a76bad182..1eb3dd56988 100644
--- a/2021/21xxx/CVE-2021-21151.json
+++ b/2021/21xxx/CVE-2021-21151.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21152.json b/2021/21xxx/CVE-2021-21152.json
index a7d4d2b2c60..ff13a7694a6 100644
--- a/2021/21xxx/CVE-2021-21152.json
+++ b/2021/21xxx/CVE-2021-21152.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21153.json b/2021/21xxx/CVE-2021-21153.json
index fa972f4cdcc..f6373fb07ec 100644
--- a/2021/21xxx/CVE-2021-21153.json
+++ b/2021/21xxx/CVE-2021-21153.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21154.json b/2021/21xxx/CVE-2021-21154.json
index 444c20400d2..0028b4883a8 100644
--- a/2021/21xxx/CVE-2021-21154.json
+++ b/2021/21xxx/CVE-2021-21154.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21155.json b/2021/21xxx/CVE-2021-21155.json
index 4f7cb465571..81ab226e083 100644
--- a/2021/21xxx/CVE-2021-21155.json
+++ b/2021/21xxx/CVE-2021-21155.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21156.json b/2021/21xxx/CVE-2021-21156.json
index 64d4615073a..d2ced5af1fd 100644
--- a/2021/21xxx/CVE-2021-21156.json
+++ b/2021/21xxx/CVE-2021-21156.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21157.json b/2021/21xxx/CVE-2021-21157.json
index c30503b8101..b515330a623 100644
--- a/2021/21xxx/CVE-2021-21157.json
+++ b/2021/21xxx/CVE-2021-21157.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa764a8531",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21159.json b/2021/21xxx/CVE-2021-21159.json
index ea0c51a4f87..c3197b104b9 100644
--- a/2021/21xxx/CVE-2021-21159.json
+++ b/2021/21xxx/CVE-2021-21159.json
@@ -54,6 +54,11 @@
                 "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html",
                 "refsource": "MISC",
                 "name": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21160.json b/2021/21xxx/CVE-2021-21160.json
index 8583fdb457b..2e9c7f7ba46 100644
--- a/2021/21xxx/CVE-2021-21160.json
+++ b/2021/21xxx/CVE-2021-21160.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1170531",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1170531"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21161.json b/2021/21xxx/CVE-2021-21161.json
index cd12fdd407c..c8267a79c30 100644
--- a/2021/21xxx/CVE-2021-21161.json
+++ b/2021/21xxx/CVE-2021-21161.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1173702",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1173702"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21162.json b/2021/21xxx/CVE-2021-21162.json
index e918671edac..12c1c6e1f5c 100644
--- a/2021/21xxx/CVE-2021-21162.json
+++ b/2021/21xxx/CVE-2021-21162.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1172054",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1172054"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21163.json b/2021/21xxx/CVE-2021-21163.json
index 7e7d08cca3f..1881e05b19d 100644
--- a/2021/21xxx/CVE-2021-21163.json
+++ b/2021/21xxx/CVE-2021-21163.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1111239",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1111239"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21164.json b/2021/21xxx/CVE-2021-21164.json
index 05ae797d9cd..3202783cba1 100644
--- a/2021/21xxx/CVE-2021-21164.json
+++ b/2021/21xxx/CVE-2021-21164.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1164846",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1164846"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21165.json b/2021/21xxx/CVE-2021-21165.json
index dc6d745a9a5..ebe8410e6a2 100644
--- a/2021/21xxx/CVE-2021-21165.json
+++ b/2021/21xxx/CVE-2021-21165.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1174582",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1174582"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21166.json b/2021/21xxx/CVE-2021-21166.json
index 0c0a402f4c4..95cf38d47d3 100644
--- a/2021/21xxx/CVE-2021-21166.json
+++ b/2021/21xxx/CVE-2021-21166.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1177465",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1177465"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21167.json b/2021/21xxx/CVE-2021-21167.json
index 9eae4b2247f..bc68a7eb853 100644
--- a/2021/21xxx/CVE-2021-21167.json
+++ b/2021/21xxx/CVE-2021-21167.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1161144",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1161144"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21168.json b/2021/21xxx/CVE-2021-21168.json
index e8b85c071ce..f4413b59400 100644
--- a/2021/21xxx/CVE-2021-21168.json
+++ b/2021/21xxx/CVE-2021-21168.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1152226",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1152226"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21169.json b/2021/21xxx/CVE-2021-21169.json
index 74d5e71ae08..ac80f9fa215 100644
--- a/2021/21xxx/CVE-2021-21169.json
+++ b/2021/21xxx/CVE-2021-21169.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1166138",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1166138"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21170.json b/2021/21xxx/CVE-2021-21170.json
index d2fd5333cf3..297082737f5 100644
--- a/2021/21xxx/CVE-2021-21170.json
+++ b/2021/21xxx/CVE-2021-21170.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1111646",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1111646"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21171.json b/2021/21xxx/CVE-2021-21171.json
index e6f3114a4c0..1283974c918 100644
--- a/2021/21xxx/CVE-2021-21171.json
+++ b/2021/21xxx/CVE-2021-21171.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1152894",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1152894"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21172.json b/2021/21xxx/CVE-2021-21172.json
index 67acf9337f2..bbe3a24856a 100644
--- a/2021/21xxx/CVE-2021-21172.json
+++ b/2021/21xxx/CVE-2021-21172.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1150810",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1150810"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21173.json b/2021/21xxx/CVE-2021-21173.json
index 0dfa95f203f..6b473262acb 100644
--- a/2021/21xxx/CVE-2021-21173.json
+++ b/2021/21xxx/CVE-2021-21173.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1154250",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1154250"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21174.json b/2021/21xxx/CVE-2021-21174.json
index c3a8b14785b..b4badb1058c 100644
--- a/2021/21xxx/CVE-2021-21174.json
+++ b/2021/21xxx/CVE-2021-21174.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1158010",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1158010"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21175.json b/2021/21xxx/CVE-2021-21175.json
index 488c14356d2..90c658beaee 100644
--- a/2021/21xxx/CVE-2021-21175.json
+++ b/2021/21xxx/CVE-2021-21175.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1146651",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1146651"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21176.json b/2021/21xxx/CVE-2021-21176.json
index 57075dedb6a..62772bd8f7d 100644
--- a/2021/21xxx/CVE-2021-21176.json
+++ b/2021/21xxx/CVE-2021-21176.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1170584",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1170584"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21177.json b/2021/21xxx/CVE-2021-21177.json
index 1bc30fab5e4..252a245c7d7 100644
--- a/2021/21xxx/CVE-2021-21177.json
+++ b/2021/21xxx/CVE-2021-21177.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1173879",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1173879"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21178.json b/2021/21xxx/CVE-2021-21178.json
index b44b68eb806..eedd6e2e1a2 100644
--- a/2021/21xxx/CVE-2021-21178.json
+++ b/2021/21xxx/CVE-2021-21178.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1174186",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1174186"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21179.json b/2021/21xxx/CVE-2021-21179.json
index 208a6edccef..8dddf7ea00a 100644
--- a/2021/21xxx/CVE-2021-21179.json
+++ b/2021/21xxx/CVE-2021-21179.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1174943",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1174943"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21180.json b/2021/21xxx/CVE-2021-21180.json
index 132d317c87d..9831d48699b 100644
--- a/2021/21xxx/CVE-2021-21180.json
+++ b/2021/21xxx/CVE-2021-21180.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1175507",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1175507"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21181.json b/2021/21xxx/CVE-2021-21181.json
index 51dfb7bc9da..650f79bd4d2 100644
--- a/2021/21xxx/CVE-2021-21181.json
+++ b/2021/21xxx/CVE-2021-21181.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1182767",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1182767"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21182.json b/2021/21xxx/CVE-2021-21182.json
index 50a05a88951..d438ce945b2 100644
--- a/2021/21xxx/CVE-2021-21182.json
+++ b/2021/21xxx/CVE-2021-21182.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1049265",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1049265"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21183.json b/2021/21xxx/CVE-2021-21183.json
index 5fd2215ec7a..cef38adf28a 100644
--- a/2021/21xxx/CVE-2021-21183.json
+++ b/2021/21xxx/CVE-2021-21183.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1105875",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1105875"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21184.json b/2021/21xxx/CVE-2021-21184.json
index c0a3d8125db..1a1bc505df9 100644
--- a/2021/21xxx/CVE-2021-21184.json
+++ b/2021/21xxx/CVE-2021-21184.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1131929",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1131929"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21185.json b/2021/21xxx/CVE-2021-21185.json
index 5e902b3258a..e41aaa7881a 100644
--- a/2021/21xxx/CVE-2021-21185.json
+++ b/2021/21xxx/CVE-2021-21185.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1100748",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1100748"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21186.json b/2021/21xxx/CVE-2021-21186.json
index bb2984b0ea7..0dcfe600170 100644
--- a/2021/21xxx/CVE-2021-21186.json
+++ b/2021/21xxx/CVE-2021-21186.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1153445",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1153445"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21187.json b/2021/21xxx/CVE-2021-21187.json
index 3e2506842fb..8f7cee45cfb 100644
--- a/2021/21xxx/CVE-2021-21187.json
+++ b/2021/21xxx/CVE-2021-21187.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1155516",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1155516"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21188.json b/2021/21xxx/CVE-2021-21188.json
index 40690d5187c..1c8394704e8 100644
--- a/2021/21xxx/CVE-2021-21188.json
+++ b/2021/21xxx/CVE-2021-21188.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1161739",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1161739"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21189.json b/2021/21xxx/CVE-2021-21189.json
index c0cd0e35bfc..87af5a449ad 100644
--- a/2021/21xxx/CVE-2021-21189.json
+++ b/2021/21xxx/CVE-2021-21189.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1165392",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1165392"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21190.json b/2021/21xxx/CVE-2021-21190.json
index 09bbffd5e74..3518a116376 100644
--- a/2021/21xxx/CVE-2021-21190.json
+++ b/2021/21xxx/CVE-2021-21190.json
@@ -54,6 +54,11 @@
                 "url": "https://crbug.com/1166091",
                 "refsource": "MISC",
                 "name": "https://crbug.com/1166091"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c88a96bd4b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28375.json b/2021/28xxx/CVE-2021-28375.json
index 45e56b1070a..b632ab52aef 100644
--- a/2021/28xxx/CVE-2021-28375.json
+++ b/2021/28xxx/CVE-2021-28375.json
@@ -61,6 +61,16 @@
                 "url": "https://lore.kernel.org/stable/YD03ew7+6v0XPh6l@kroah.com/",
                 "refsource": "MISC",
                 "name": "https://lore.kernel.org/stable/YD03ew7+6v0XPh6l@kroah.com/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-90083c9c0f",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMRQVOTASD3VZP6GE4JJHE27QU6FHTZ6/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-bb755ed5e3",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28650.json b/2021/28xxx/CVE-2021-28650.json
index 9aaf4201814..acd1ac3aea2 100644
--- a/2021/28xxx/CVE-2021-28650.json
+++ b/2021/28xxx/CVE-2021-28650.json
@@ -56,6 +56,11 @@
                 "url": "https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/8109c368c6cfdb593faaf698c2bf5da32bb1ace4",
                 "refsource": "MISC",
                 "name": "https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/8109c368c6cfdb593faaf698c2bf5da32bb1ace4"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-303f6623fa",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN5TVQ7OHZEGY6AGFLAZWCVCI53RYNHQ/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28660.json b/2021/28xxx/CVE-2021-28660.json
index 7d980815cbe..5c28da436f3 100644
--- a/2021/28xxx/CVE-2021-28660.json
+++ b/2021/28xxx/CVE-2021-28660.json
@@ -56,6 +56,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-bb755ed5e3",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/"
             }
         ]
     }

From 00abfc13c6e0a43b01c155eef50180b19a02538e Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 10:00:38 +0000
Subject: [PATCH 452/845] "-Synchronized-Data."

---
 2019/10xxx/CVE-2019-10172.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2019/10xxx/CVE-2019-10172.json b/2019/10xxx/CVE-2019-10172.json
index f08070d7f64..f13bf2baba7 100644
--- a/2019/10xxx/CVE-2019-10172.json
+++ b/2019/10xxx/CVE-2019-10172.json
@@ -168,6 +168,11 @@
                 "refsource": "MLIST",
                 "name": "[hive-issues] 20210318 [jira] [Comment Edited] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar",
                 "url": "https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hadoop-common-issues] 20210320 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172",
+                "url": "https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E"
             }
         ]
     },

From 1e7c8542261be31e74bdc295ffc8da91133c1d35 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 14:00:42 +0000
Subject: [PATCH 453/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27807.json | 10 ++++++++++
 2021/27xxx/CVE-2021-27906.json | 10 ++++++++++
 2 files changed, 20 insertions(+)

diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index a963537a878..034b2cf00f4 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -79,6 +79,16 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210319 CVE-2021-27807: Apache PDFBox: A carefully crafted PDF file can trigger an infinite loop while loading the file",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/19/9"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pdfbox-users] 20210320 CVE-2021-27807: Apache PDFBox: a carefully crafted PDF file can trigger an infinite loop while loading the file",
+                "url": "https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[announce] 20210320 CVE-2021-27807: Apache PDFBox: a carefully crafted PDF file can trigger an infinite loop while loading the file",
+                "url": "https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index b605c4109a8..56bf2e296af 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -79,6 +79,16 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210319 CVE-2021-27906: Apache PDFBox: A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/19/10"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[announce] 20210320 CVE-2021-27906: Apache PDFBox: a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
+                "url": "https://lists.apache.org/thread.html/rdf78aef4793362e778e21e34328b0456e302bde4b7e74f229df0ee04@%3Cannounce.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pdfbox-users] 20210320 CVE-2021-27906: Apache PDFBox: a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
+                "url": "https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E"
             }
         ]
     },

From 56966479a065c95d8f765db93442b2734f513737 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 20:00:41 +0000
Subject: [PATCH 454/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27135.json | 32 +++++++++++++++-
 2021/28xxx/CVE-2021-28950.json | 67 ++++++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28951.json | 62 +++++++++++++++++++++++++++++++
 3 files changed, 160 insertions(+), 1 deletion(-)
 create mode 100644 2021/28xxx/CVE-2021-28950.json
 create mode 100644 2021/28xxx/CVE-2021-28951.json

diff --git a/2021/27xxx/CVE-2021-27135.json b/2021/27xxx/CVE-2021-27135.json
index 898331c3371..14aca9fdcdd 100644
--- a/2021/27xxx/CVE-2021-27135.json
+++ b/2021/27xxx/CVE-2021-27135.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "xterm through Patch #365 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted UTF-8 character sequence."
+                "value": "xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence."
             }
         ]
     },
@@ -76,6 +76,36 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e7a8e79fa8",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35LK2ZXEIJUOGOA7FV2TJL3L6LFJ4X5S/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://news.ycombinator.com/item?id=26524650",
+                "url": "https://news.ycombinator.com/item?id=26524650"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://access.redhat.com/security/cve/CVE-2021-27135",
+                "url": "https://access.redhat.com/security/cve/CVE-2021-27135"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927559",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927559"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://invisible-island.net/xterm/xterm.log.html",
+                "url": "https://invisible-island.net/xterm/xterm.log.html"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c",
+                "url": "https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://bugzilla.suse.com/show_bug.cgi?id=1182091",
+                "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182091"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28950.json b/2021/28xxx/CVE-2021-28950.json
new file mode 100644
index 00000000000..683a48bb41f
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28950.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28950",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8",
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28951.json b/2021/28xxx/CVE-2021-28951.json
new file mode 100644
index 00000000000..fe526d8844c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28951.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28951",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start, aka CID-3ebba796fa25."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3ebba796fa251d042be42b929a2d916ee5c34a49",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3ebba796fa251d042be42b929a2d916ee5c34a49"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 7cd97bbf245800fab9e93578e8dc895390e776d5 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 21:00:40 +0000
Subject: [PATCH 455/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28117.json | 71 +++++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28952.json | 67 ++++++++++++++++++++++++++++++++
 2 files changed, 132 insertions(+), 6 deletions(-)
 create mode 100644 2021/28xxx/CVE-2021-28952.json

diff --git a/2021/28xxx/CVE-2021-28117.json b/2021/28xxx/CVE-2021-28117.json
index 326b9f853e3..16f0de0c9ee 100644
--- a/2021/28xxx/CVE-2021-28117.json
+++ b/2021/28xxx/CVE-2021-28117.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28117",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28117",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "libdiscover/backends/KNSBackend/KNSResource.cpp in KDE Discover before 5.21.3 automatically creates links to potentially dangerous URLs (that are neither https:// nor http://) based on the content of the store.kde.org web site. (5.18.7 is also a fixed version.)"
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://userbase.kde.org/Discover",
+                "refsource": "MISC",
+                "name": "https://userbase.kde.org/Discover"
+            },
+            {
+                "url": "https://github.com/KDE/discover/releases",
+                "refsource": "MISC",
+                "name": "https://github.com/KDE/discover/releases"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://kde.org/info/security/advisory-20210310-1.txt",
+                "url": "https://kde.org/info/security/advisory-20210310-1.txt"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://invent.kde.org/plasma/discover/commit/94478827aab63d2e2321f0ca9ec5553718798e60",
+                "url": "https://invent.kde.org/plasma/discover/commit/94478827aab63d2e2321f0ca9ec5553718798e60"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28952.json b/2021/28xxx/CVE-2021-28952.json
new file mode 100644
index 00000000000..67f4f693d51
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28952.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28952",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)"
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://lore.kernel.org/alsa-devel/20210309142129.14182-2-srinivas.kandagatla@linaro.org/",
+                "refsource": "MISC",
+                "name": "https://lore.kernel.org/alsa-devel/20210309142129.14182-2-srinivas.kandagatla@linaro.org/"
+            },
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c668e1c0a0f74472469cd514f40c9012b324c31",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c668e1c0a0f74472469cd514f40c9012b324c31"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 7515b684ab7e046658cfa8ceee6ea3fe90975159 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 22:00:40 +0000
Subject: [PATCH 456/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27170.json | 66 ++++++++++++++++++++++++++++++----
 2020/27xxx/CVE-2020-27171.json | 66 ++++++++++++++++++++++++++++++----
 2 files changed, 120 insertions(+), 12 deletions(-)

diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json
index 1d327e07651..3a995360954 100644
--- a/2020/27xxx/CVE-2020-27170.json
+++ b/2020/27xxx/CVE-2020-27170.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-27170",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-27170",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8",
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/19/2",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/19/2"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76",
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json
index a22db6aa0a2..dc13be36d8a 100644
--- a/2020/27xxx/CVE-2020-27171.json
+++ b/2020/27xxx/CVE-2020-27171.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-27171",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-27171",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8",
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/19/3",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/19/3"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899",
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899"
             }
         ]
     }

From a6555af1e7f0b9f80a12e33e0d83349b61180ae1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 20 Mar 2021 23:00:40 +0000
Subject: [PATCH 457/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 2259067fd88..b2cb8f0cb48 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -258,6 +258,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210319 [jira] [Comment Edited] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210320 RE: [jira] [Work started] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },

From d59c97a730ab723ecf938e19c4c5e1159bdd6db0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 03:00:39 +0000
Subject: [PATCH 458/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27363.json | 5 +++++
 2021/27xxx/CVE-2021-27364.json | 5 +++++
 2021/27xxx/CVE-2021-27365.json | 5 +++++
 2021/28xxx/CVE-2021-28375.json | 5 +++++
 4 files changed, 20 insertions(+)

diff --git a/2021/27xxx/CVE-2021-27363.json b/2021/27xxx/CVE-2021-27363.json
index cd36d716205..001d7b31f90 100644
--- a/2021/27xxx/CVE-2021-27363.json
+++ b/2021/27xxx/CVE-2021-27363.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html",
+                "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27364.json b/2021/27xxx/CVE-2021-27364.json
index aeb40a6ea16..86a6fc68735 100644
--- a/2021/27xxx/CVE-2021-27364.json
+++ b/2021/27xxx/CVE-2021-27364.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html",
+                "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27365.json b/2021/27xxx/CVE-2021-27365.json
index 27526b4281a..ecd31266ad2 100644
--- a/2021/27xxx/CVE-2021-27365.json
+++ b/2021/27xxx/CVE-2021-27365.json
@@ -76,6 +76,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html",
+                "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28375.json b/2021/28xxx/CVE-2021-28375.json
index b632ab52aef..75fd1a754ae 100644
--- a/2021/28xxx/CVE-2021-28375.json
+++ b/2021/28xxx/CVE-2021-28375.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-bb755ed5e3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-14f6642aa6",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XAUNYDTGE6MB4NWL2SIHPCODCLET3JZB/"
             }
         ]
     }

From 22013c57a8856fa446975ff52e31dfbb7b9e2135 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 05:00:42 +0000
Subject: [PATCH 459/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28953.json | 67 ++++++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28954.json | 62 +++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28955.json | 18 +++++++++
 2021/28xxx/CVE-2021-28956.json | 18 +++++++++
 2021/28xxx/CVE-2021-28957.json | 67 ++++++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28958.json | 18 +++++++++
 2021/28xxx/CVE-2021-28959.json | 18 +++++++++
 2021/28xxx/CVE-2021-28960.json | 18 +++++++++
 8 files changed, 286 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28953.json
 create mode 100644 2021/28xxx/CVE-2021-28954.json
 create mode 100644 2021/28xxx/CVE-2021-28955.json
 create mode 100644 2021/28xxx/CVE-2021-28956.json
 create mode 100644 2021/28xxx/CVE-2021-28957.json
 create mode 100644 2021/28xxx/CVE-2021-28958.json
 create mode 100644 2021/28xxx/CVE-2021-28959.json
 create mode 100644 2021/28xxx/CVE-2021-28960.json

diff --git a/2021/28xxx/CVE-2021-28953.json b/2021/28xxx/CVE-2021-28953.json
new file mode 100644
index 00000000000..cf7e5c8e4cc
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28953.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28953",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The unofficial C/C++ Advanced Lint extension before 1.9.0 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted repository."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://marketplace.visualstudio.com/items?itemName=jbenden.c-cpp-flylint",
+                "refsource": "MISC",
+                "name": "https://marketplace.visualstudio.com/items?itemName=jbenden.c-cpp-flylint"
+            },
+            {
+                "url": "https://github.com/jbenden/vscode-c-cpp-flylint/compare/v1.8.2...v1.9.0",
+                "refsource": "MISC",
+                "name": "https://github.com/jbenden/vscode-c-cpp-flylint/compare/v1.8.2...v1.9.0"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28954.json b/2021/28xxx/CVE-2021-28954.json
new file mode 100644
index 00000000000..d0b15f23045
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28954.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28954",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/chriswalz/bit/releases/tag/v1.0.5",
+                "refsource": "MISC",
+                "name": "https://github.com/chriswalz/bit/releases/tag/v1.0.5"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28955.json b/2021/28xxx/CVE-2021-28955.json
new file mode 100644
index 00000000000..05f4e9cfaeb
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28955.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28955",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28956.json b/2021/28xxx/CVE-2021-28956.json
new file mode 100644
index 00000000000..032f5fbec65
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28956.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28956",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28957.json b/2021/28xxx/CVE-2021-28957.json
new file mode 100644
index 00000000000..68c1769ce4e
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28957.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28957",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "lxml 4.6.2 places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://bugs.launchpad.net/lxml/+bug/1888153",
+                "refsource": "MISC",
+                "name": "https://bugs.launchpad.net/lxml/+bug/1888153"
+            },
+            {
+                "url": "https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270",
+                "refsource": "MISC",
+                "name": "https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28958.json b/2021/28xxx/CVE-2021-28958.json
new file mode 100644
index 00000000000..6f967b88e45
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28958.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28958",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28959.json b/2021/28xxx/CVE-2021-28959.json
new file mode 100644
index 00000000000..4b8bed82c20
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28959.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28959",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28960.json b/2021/28xxx/CVE-2021-28960.json
new file mode 100644
index 00000000000..d426957e88d
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28960.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28960",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 7cc8fd81c53e5c36cbe684dd2cb1df20b7f7627f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 06:00:42 +0000
Subject: [PATCH 460/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28961.json | 62 ++++++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28962.json | 18 ++++++++++
 2 files changed, 80 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28961.json
 create mode 100644 2021/28xxx/CVE-2021-28962.json

diff --git a/2021/28xxx/CVE-2021-28961.json b/2021/28xxx/CVE-2021-28961.json
new file mode 100644
index 00000000000..9f14d38d455
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28961.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28961",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "applications/luci-app-ddns/luasrc/model/cbi/ddns/detail.lua in the DDNS package for OpenWrt 19.07 allows remote authenticated users to inject arbitrary commands via POST requests."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/openwrt/luci/commit/9df7ea4d66644df69fcea18b36bc465912ffc",
+                "refsource": "MISC",
+                "name": "https://github.com/openwrt/luci/commit/9df7ea4d66644df69fcea18b36bc465912ffc"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28962.json b/2021/28xxx/CVE-2021-28962.json
new file mode 100644
index 00000000000..cc6c1568f67
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28962.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28962",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 2f5675a9f3be028862a297f9c58f80db942b4d02 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 15:00:42 +0000
Subject: [PATCH 461/845] "-Synchronized-Data."

---
 2019/12xxx/CVE-2019-12425.json | 5 +++++
 2020/13xxx/CVE-2020-13923.json | 5 +++++
 2020/9xxx/CVE-2020-9496.json   | 5 +++++
 3 files changed, 15 insertions(+)

diff --git a/2019/12xxx/CVE-2019-12425.json b/2019/12xxx/CVE-2019-12425.json
index 2ead42c033c..5555961903e 100644
--- a/2019/12xxx/CVE-2019-12425.json
+++ b/2019/12xxx/CVE-2019-12425.json
@@ -58,6 +58,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-user] 20200504 Re: [CVE-2019-12425] Apache OFBiz Host Header Injection",
                 "url": "https://lists.apache.org/thread.html/r907ce90745b52d2d5b6a815de03fd1d5f3831ab579a81d70cfda6f3d@%3Cuser.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06",
+                "url": "https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5@%3Ccommits.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13923.json b/2020/13xxx/CVE-2020-13923.json
index 95eb4943959..28619a20145 100644
--- a/2020/13xxx/CVE-2020-13923.json
+++ b/2020/13xxx/CVE-2020-13923.json
@@ -58,6 +58,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-notifications] 20200716 [jira] [Updated] (OFBIZ-11836) IDOR vulnerability in the order processing feature in ecommerce component (CVE-2020-13923)",
                 "url": "https://lists.apache.org/thread.html/rac7e36c3daa60dd4b813f72942921b4fad71da821480ebcea96ecea1@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06",
+                "url": "https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5@%3Ccommits.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9496.json b/2020/9xxx/CVE-2020-9496.json
index 264cab1b95f..0875a2076e6 100644
--- a/2020/9xxx/CVE-2020-9496.json
+++ b/2020/9xxx/CVE-2020-9496.json
@@ -78,6 +78,11 @@
                 "refsource": "MISC",
                 "name": "http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html",
                 "url": "http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06",
+                "url": "https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5@%3Ccommits.ofbiz.apache.org%3E"
             }
         ]
     },

From 03f443a2498a06aeb4235b5447c6f8670b40daaf Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Sun, 21 Mar 2021 17:43:10 +0200
Subject: [PATCH 462/845] Adds CVE-2021-23360

---
 2021/23xxx/CVE-2021-23360.json | 84 ++++++++++++++++++++++++++++++++--
 1 file changed, 80 insertions(+), 4 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23360.json b/2021/23xxx/CVE-2021-23360.json
index ac4de7733c4..d19482aec85 100644
--- a/2021/23xxx/CVE-2021-23360.json
+++ b/2021/23xxx/CVE-2021-23360.json
@@ -3,16 +3,92 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-21T15:43:08.814741Z",
         "ID": "CVE-2021-23360",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Arbitrary Command Injection"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "killport",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "1.0.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Arbitrary Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "This affects the package killport before 1.0.2.\n If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\nRunning this PoC will cause the command touch success to be executed, leading to the creation of a file called success.\r\n\r\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P",
+            "baseScore": 7.5,
+            "baseSeverity": "HIGH",
+            "attackVector": "NETWORK",
+            "attackComplexity": "HIGH",
+            "privilegesRequired": "LOW",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "OmniTaint"
+        }
+    ]
 }
\ No newline at end of file

From f94963e9efc9aebf68698b51645eaab4ace32204 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 16:00:41 +0000
Subject: [PATCH 463/845] "-Synchronized-Data."

---
 2021/23xxx/CVE-2021-23360.json | 17 ++++++++++-------
 1 file changed, 10 insertions(+), 7 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23360.json b/2021/23xxx/CVE-2021-23360.json
index d19482aec85..90980fb896a 100644
--- a/2021/23xxx/CVE-2021-23360.json
+++ b/2021/23xxx/CVE-2021-23360.json
@@ -48,16 +48,19 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535",
+                "name": "https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9"
+                "refsource": "MISC",
+                "url": "https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9",
+                "name": "https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638"
+                "refsource": "MISC",
+                "url": "https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638",
+                "name": "https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638"
             }
         ]
     },
@@ -65,7 +68,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "This affects the package killport before 1.0.2.\n If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\nRunning this PoC will cause the command touch success to be executed, leading to the creation of a file called success.\r\n\r\n"
+                "value": "This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success."
             }
         ]
     },

From 7457d694332c2fa2fd2a813ddf1e131834e980e6 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 17:00:38 +0000
Subject: [PATCH 464/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27807.json | 20 ++++++++++++++++++++
 2021/27xxx/CVE-2021-27906.json | 20 ++++++++++++++++++++
 2 files changed, 40 insertions(+)

diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 034b2cf00f4..3c165b571eb 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -89,6 +89,26 @@
                 "refsource": "MLIST",
                 "name": "[announce] 20210320 CVE-2021-27807: Apache PDFBox: a carefully crafted PDF file can trigger an infinite loop while loading the file",
                 "url": "https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch trunk updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
+                "url": "https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Created] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Commented] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Updated] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index 56bf2e296af..dd55d9d1af2 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -89,6 +89,26 @@
                 "refsource": "MLIST",
                 "name": "[pdfbox-users] 20210320 CVE-2021-27906: Apache PDFBox: a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file",
                 "url": "https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch trunk updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
+                "url": "https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Created] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Commented] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Updated] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E"
             }
         ]
     },

From 9efbf64774e4087e2847d620ccd658ab7072c123 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 18:00:38 +0000
Subject: [PATCH 465/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27807.json | 15 +++++++++++++++
 2021/27xxx/CVE-2021-27906.json | 15 +++++++++++++++
 2 files changed, 30 insertions(+)

diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 3c165b571eb..2174d0022d5 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -109,6 +109,21 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-notifications] 20210321 [jira] [Updated] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
                 "url": "https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch release17.12 updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
+                "url": "https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Closed] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch release18.12 updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
+                "url": "https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index dd55d9d1af2..dccbe68510d 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -109,6 +109,21 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-notifications] 20210321 [jira] [Updated] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
                 "url": "https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch release17.12 updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
+                "url": "https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210321 [jira] [Closed] (OFBIZ-12205) Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906",
+                "url": "https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch release18.12 updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
+                "url": "https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E"
             }
         ]
     },

From 7c1242a97792efe5f3a55dd20d09d680b3a8a872 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 21 Mar 2021 21:00:41 +0000
Subject: [PATCH 466/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13963.json | 61 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28957.json |  2 +-
 2 files changed, 56 insertions(+), 7 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13963.json b/2020/13xxx/CVE-2020-13963.json
index 6ef14d61dfe..2b4caffa0c0 100644
--- a/2020/13xxx/CVE-2020-13963.json
+++ b/2020/13xxx/CVE-2020-13963.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-13963",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-13963",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "SOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account)."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://forum.soplanning.org/viewforum.php?f=8",
+                "refsource": "MISC",
+                "name": "https://forum.soplanning.org/viewforum.php?f=8"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://labs.integrity.pt/advisories/cve-2020-13963/",
+                "url": "https://labs.integrity.pt/advisories/cve-2020-13963/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28957.json b/2021/28xxx/CVE-2021-28957.json
index 68c1769ce4e..57fb4197775 100644
--- a/2021/28xxx/CVE-2021-28957.json
+++ b/2021/28xxx/CVE-2021-28957.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "lxml 4.6.2 places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute."
+                "value": "lxml 4.6.2 allows XSS. It places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute."
             }
         ]
     },

From 05b8ad0522f0f3af34d8693b0d30c662bfa3699f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 03:00:41 +0000
Subject: [PATCH 467/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28153.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2021/28xxx/CVE-2021-28153.json b/2021/28xxx/CVE-2021-28153.json
index 656d5cda5c6..1f00b04617c 100644
--- a/2021/28xxx/CVE-2021-28153.json
+++ b/2021/28xxx/CVE-2021-28153.json
@@ -56,6 +56,11 @@
                 "url": "https://gitlab.gnome.org/GNOME/glib/-/issues/2325",
                 "refsource": "MISC",
                 "name": "https://gitlab.gnome.org/GNOME/glib/-/issues/2325"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-a1f51fc418",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/"
             }
         ]
     }

From e4eb2ba2848b2463cefd0fbd76ea165f94352936 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 04:00:39 +0000
Subject: [PATCH 468/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21772.json |  5 +++++
 2021/26xxx/CVE-2021-26701.json | 10 ++++++++++
 2021/28xxx/CVE-2021-28543.json |  5 +++++
 3 files changed, 20 insertions(+)

diff --git a/2021/21xxx/CVE-2021-21772.json b/2021/21xxx/CVE-2021-21772.json
index da11e1d671f..1775423b9d7 100644
--- a/2021/21xxx/CVE-2021-21772.json
+++ b/2021/21xxx/CVE-2021-21772.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226",
                 "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-bb1b7591c4",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDGGB65YBQL662M3MOBNNJJNRNURW4TG/"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26701.json b/2021/26xxx/CVE-2021-26701.json
index 3115a748d93..5ccbee30acf 100644
--- a/2021/26xxx/CVE-2021-26701.json
+++ b/2021/26xxx/CVE-2021-26701.json
@@ -69,6 +69,16 @@
                 "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701",
                 "refsource": "MISC",
                 "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e2d218afe6",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-904d0bd496",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28543.json b/2021/28xxx/CVE-2021-28543.json
index eec56f7db80..19a4c1855a3 100644
--- a/2021/28xxx/CVE-2021-28543.json
+++ b/2021/28xxx/CVE-2021-28543.json
@@ -56,6 +56,11 @@
                 "url": "https://varnish-cache.org/security/VSV00006.html",
                 "refsource": "MISC",
                 "name": "https://varnish-cache.org/security/VSV00006.html"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2ad352ec70",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPFBRQUJNWHCB3GQHSSAPRLQU6Q6PY43/"
             }
         ]
     },

From e6f5bba3b4aed81d9d8f3fc0b54ee743bdd71aa4 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Anton=20Black=20=F0=9F=86=8E?= 
Date: Mon, 22 Mar 2021 15:36:49 +1100
Subject: [PATCH 469/845] Register a Jira Server bug.

---
 2021/26xxx/CVE-2021-26070.json | 99 +++++++++++++++++++++++++++++-----
 1 file changed, 85 insertions(+), 14 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26070.json b/2021/26xxx/CVE-2021-26070.json
index e21c2731c61..34d9b5fc046 100644
--- a/2021/26xxx/CVE-2021-26070.json
+++ b/2021/26xxx/CVE-2021-26070.json
@@ -1,18 +1,89 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-26070",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta": {
+      "ASSIGNER": "security@atlassian.com",
+      "DATE_PUBLIC": "2021-01-27T00:00:00",
+      "ID": "CVE-2021-26070",
+      "STATE": "PUBLIC"
+   },
+   "affects": {
+      "vendor": {
+         "vendor_data": [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product": {
+                  "product_data": [
+                     {
+                        "product_name": "Jira Server",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.13.3",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.14.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name": "Jira Data Center",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.13.3",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.14.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name": "Atlassian"
             }
-        ]
-    }
+         ]
+      }
+   },
+   "data_format": "MITRE",
+   "data_type": "CVE",
+   "data_version": "4.0",
+   "description": {
+      "description_data": [
+         {
+            "lang": "eng",
+            "value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1."
+         }
+      ]
+   },
+   "problemtype": {
+      "problemtype_data": [
+         {
+            "description": [
+               {
+                  "lang": "eng",
+                  "value": "Broken Authentication"
+               }
+            ]
+         }
+      ]
+   },
+   "references": {
+      "reference_data": [
+         {
+            "url": "https://jira.atlassian.com/browse/JRASERVER-72029"
+         }
+      ]
+   }
 }
\ No newline at end of file

From 9b0bfa9240b4203701abcf30f2000431ff1950fc Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Anton=20Black=20=F0=9F=86=8E?= 
Date: Mon, 22 Mar 2021 15:38:43 +1100
Subject: [PATCH 470/845] Register a Jira Server bug.

---
 2021/26xxx/CVE-2021-26070.json | 83 +++++++++++++++++++++++++++++++---
 1 file changed, 77 insertions(+), 6 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26070.json b/2021/26xxx/CVE-2021-26070.json
index e21c2731c61..d5ce3598dd7 100644
--- a/2021/26xxx/CVE-2021-26070.json
+++ b/2021/26xxx/CVE-2021-26070.json
@@ -1,17 +1,88 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-01-27T00:00:00",
         "ID": "CVE-2021-26070",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jira Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.13.3",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.14.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Jira Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.13.3",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.14.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Atlassian"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Broken Authentication"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72029"
             }
         ]
     }

From d6bb6af989f961142b6627c0602b5878b35de39c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Anton=20Black=20=F0=9F=86=8E?= 
Date: Mon, 22 Mar 2021 15:47:47 +1100
Subject: [PATCH 471/845] Register a Jira Server bug.

---
 2021/26xxx/CVE-2021-26069.json | 115 +++++++++++++++++++++++++++++----
 1 file changed, 101 insertions(+), 14 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26069.json b/2021/26xxx/CVE-2021-26069.json
index 1652b9e283e..23770dbfb00 100644
--- a/2021/26xxx/CVE-2021-26069.json
+++ b/2021/26xxx/CVE-2021-26069.json
@@ -1,18 +1,105 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-26069",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta": {
+      "ASSIGNER": "security@atlassian.com",
+      "DATE_PUBLIC": "2021-01-21T00:00:00",
+      "ID": "CVE-2021-26069",
+      "STATE": "PUBLIC"
+   },
+   "affects": {
+      "vendor": {
+         "vendor_data": [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product": {
+                  "product_data": [
+                     {
+                        "product_name": "Jira Server",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.11",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.3",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.0",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     },
+                    {
+                      "product_name": "Jira Data Center",
+                      "version": {
+                        "version_data": [
+                          {
+                            "version_value": "8.5.11",
+                            "version_affected": "<"
+                          },
+                          {
+                            "version_value": "8.6.0",
+                            "version_affected": ">="
+                          },
+                          {
+                            "version_value": "8.13.3",
+                            "version_affected": "<"
+                          },
+                          {
+                            "version_value": "8.14.0",
+                            "version_affected": ">="
+                          },
+                          {
+                            "version_value": "8.15.0",
+                            "version_affected": "<"
+                          }
+                        ]
+                      }
+                    }
+                  ]
+               },
+               "vendor_name": "Atlassian"
             }
-        ]
-    }
+         ]
+      }
+   },
+   "data_format": "MITRE",
+   "data_type": "CVE",
+   "data_version": "4.0",
+   "description": {
+      "description_data": [
+         {
+            "lang": "eng",
+            "value": "Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to download temporary files and enumerate project keys via an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0."
+         }
+      ]
+   },
+   "problemtype": {
+      "problemtype_data": [
+         {
+            "description": [
+               {
+                  "lang": "eng",
+                  "value": "Information Disclosure"
+               }
+            ]
+         }
+      ]
+   },
+   "references": {
+      "reference_data": [
+         {
+            "url": "https://jira.atlassian.com/browse/JRASERVER-72010"
+         }
+      ]
+   }
 }
\ No newline at end of file

From 4c6a4f348ffcc3cc63f275a264f319cc751efa66 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 05:00:41 +0000
Subject: [PATCH 472/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26069.json | 204 +++++++++++++++++----------------
 2021/26xxx/CVE-2021-26070.json |   4 +-
 2 files changed, 106 insertions(+), 102 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26069.json b/2021/26xxx/CVE-2021-26069.json
index 23770dbfb00..9fd0f988a34 100644
--- a/2021/26xxx/CVE-2021-26069.json
+++ b/2021/26xxx/CVE-2021-26069.json
@@ -1,105 +1,107 @@
 {
-   "CVE_data_meta": {
-      "ASSIGNER": "security@atlassian.com",
-      "DATE_PUBLIC": "2021-01-21T00:00:00",
-      "ID": "CVE-2021-26069",
-      "STATE": "PUBLIC"
-   },
-   "affects": {
-      "vendor": {
-         "vendor_data": [
-            {
-               "product": {
-                  "product_data": [
-                     {
-                        "product_name": "Jira Server",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.11",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.3",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.0",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     },
-                    {
-                      "product_name": "Jira Data Center",
-                      "version": {
-                        "version_data": [
-                          {
-                            "version_value": "8.5.11",
-                            "version_affected": "<"
-                          },
-                          {
-                            "version_value": "8.6.0",
-                            "version_affected": ">="
-                          },
-                          {
-                            "version_value": "8.13.3",
-                            "version_affected": "<"
-                          },
-                          {
-                            "version_value": "8.14.0",
-                            "version_affected": ">="
-                          },
-                          {
-                            "version_value": "8.15.0",
-                            "version_affected": "<"
-                          }
+    "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-01-21T00:00:00",
+        "ID": "CVE-2021-26069",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jira Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.11",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.3",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.0",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Jira Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.11",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.3",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.0",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
                         ]
-                      }
-                    }
-                  ]
-               },
-               "vendor_name": "Atlassian"
-            }
-         ]
-      }
-   },
-   "data_format": "MITRE",
-   "data_type": "CVE",
-   "data_version": "4.0",
-   "description": {
-      "description_data": [
-         {
-            "lang": "eng",
-            "value": "Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to download temporary files and enumerate project keys via an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0."
-         }
-      ]
-   },
-   "problemtype": {
-      "problemtype_data": [
-         {
-            "description": [
-               {
-                  "lang": "eng",
-                  "value": "Information Disclosure"
-               }
+                    },
+                    "vendor_name": "Atlassian"
+                }
             ]
-         }
-      ]
-   },
-   "references": {
-      "reference_data": [
-         {
-            "url": "https://jira.atlassian.com/browse/JRASERVER-72010"
-         }
-      ]
-   }
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to download temporary files and enumerate project keys via an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72010",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/JRASERVER-72010"
+            }
+        ]
+    }
 }
\ No newline at end of file
diff --git a/2021/26xxx/CVE-2021-26070.json b/2021/26xxx/CVE-2021-26070.json
index d5ce3598dd7..4ca9be711ff 100644
--- a/2021/26xxx/CVE-2021-26070.json
+++ b/2021/26xxx/CVE-2021-26070.json
@@ -82,7 +82,9 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://jira.atlassian.com/browse/JRASERVER-72029"
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72029",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/JRASERVER-72029"
             }
         ]
     }

From cad9fc0234678aafcab0b68469ee40dd96818360 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 07:00:38 +0000
Subject: [PATCH 473/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28955.json | 56 ++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28956.json | 71 +++++++++++++++++++++++++++++++---
 2 files changed, 115 insertions(+), 12 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28955.json b/2021/28xxx/CVE-2021-28955.json
index 05f4e9cfaeb..94692382771 100644
--- a/2021/28xxx/CVE-2021-28955.json
+++ b/2021/28xxx/CVE-2021-28955.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28955",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28955",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "git-bug before 0.7.2 has an Uncontrolled Search Path Element. It will execute git.bat from the current directory in certain PATH situations (most often seen on Windows)."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/MichaelMure/git-bug/security/advisories/GHSA-m898-h4pm-pqfr",
+                "url": "https://github.com/MichaelMure/git-bug/security/advisories/GHSA-m898-h4pm-pqfr"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28956.json b/2021/28xxx/CVE-2021-28956.json
index 032f5fbec65..d78c4d539f9 100644
--- a/2021/28xxx/CVE-2021-28956.json
+++ b/2021/28xxx/CVE-2021-28956.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28956",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28956",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** The unofficial vscode-sass-lint (aka Sass Lint) extension through 1.0.7 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/glen-84/vscode-sass-lint/releases",
+                "refsource": "MISC",
+                "name": "https://github.com/glen-84/vscode-sass-lint/releases"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://marketplace.visualstudio.com/items/glen-84.sass-lint/changelog",
+                "url": "https://marketplace.visualstudio.com/items/glen-84.sass-lint/changelog"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/glen-84/vscode-sass-lint/compare/v1.0.6...v1.0.7",
+                "url": "https://github.com/glen-84/vscode-sass-lint/compare/v1.0.6...v1.0.7"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/1.txt",
+                "url": "https://vuln.ryotak.me/advisories/1.txt"
             }
         ]
     }

From 0f0d2ed13eed9cb7e38489225b33a9f30b6e8e02 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 08:00:40 +0000
Subject: [PATCH 474/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28963.json | 82 ++++++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28964.json | 18 ++++++++
 2021/28xxx/CVE-2021-28965.json | 18 ++++++++
 2021/28xxx/CVE-2021-28966.json | 18 ++++++++
 2021/28xxx/CVE-2021-28967.json | 18 ++++++++
 5 files changed, 154 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28963.json
 create mode 100644 2021/28xxx/CVE-2021-28964.json
 create mode 100644 2021/28xxx/CVE-2021-28965.json
 create mode 100644 2021/28xxx/CVE-2021-28966.json
 create mode 100644 2021/28xxx/CVE-2021-28967.json

diff --git a/2021/28xxx/CVE-2021-28963.json b/2021/28xxx/CVE-2021-28963.json
new file mode 100644
index 00000000000..265e2aa65e1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28963.json
@@ -0,0 +1,82 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28963",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://bugs.debian.org/985405",
+                "refsource": "MISC",
+                "name": "https://bugs.debian.org/985405"
+            },
+            {
+                "url": "https://shibboleth.net/community/advisories/secadv_20210317.txt",
+                "refsource": "MISC",
+                "name": "https://shibboleth.net/community/advisories/secadv_20210317.txt"
+            },
+            {
+                "url": "https://issues.shibboleth.net/jira/browse/SSPCPP-922",
+                "refsource": "MISC",
+                "name": "https://issues.shibboleth.net/jira/browse/SSPCPP-922"
+            },
+            {
+                "url": "https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=d1dbebfadc1bdb824fea63843c4c38fa69e54379",
+                "refsource": "MISC",
+                "name": "https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=d1dbebfadc1bdb824fea63843c4c38fa69e54379"
+            },
+            {
+                "url": "https://www.debian.org/security/2021/dsa-4872",
+                "refsource": "MISC",
+                "name": "https://www.debian.org/security/2021/dsa-4872"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28964.json b/2021/28xxx/CVE-2021-28964.json
new file mode 100644
index 00000000000..f5b717878cb
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28964.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28964",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28965.json b/2021/28xxx/CVE-2021-28965.json
new file mode 100644
index 00000000000..de8a83871d7
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28965.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28965",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28966.json b/2021/28xxx/CVE-2021-28966.json
new file mode 100644
index 00000000000..f25edb7a455
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28966.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28966",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28967.json b/2021/28xxx/CVE-2021-28967.json
new file mode 100644
index 00000000000..35a86864776
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28967.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28967",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 30dea7733a3d1c45e578a73e863d4580f4726302 Mon Sep 17 00:00:00 2001
From: jensoliver 
Date: Mon, 22 Mar 2021 09:44:39 +0100
Subject: [PATCH 475/845] OSA-2021-07 and OSA-2021-08

---
 2021/21xxx/CVE-2021-21437.json | 109 +++++++++++++++++++++++++++++++--
 2021/21xxx/CVE-2021-21438.json | 108 ++++++++++++++++++++++++++++++--
 2 files changed, 205 insertions(+), 12 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21437.json b/2021/21xxx/CVE-2021-21437.json
index f784cb9e602..8807e298128 100644
--- a/2021/21xxx/CVE-2021-21437.json
+++ b/2021/21xxx/CVE-2021-21437.json
@@ -1,18 +1,115 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@otrs.com",
+        "DATE_PUBLIC": "2021-03-22T00:00:00.000Z",
         "ID": "CVE-2021-21437",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Config Items are shown to users without permission"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OTRSCIsInCustomerFrontend",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "7.0.x",
+                                            "version_value": "7.0.15"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ITSMConfigurationManagement",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "7.0.x",
+                                            "version_value": "7.0.24"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "OTRS AG"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Jaroslav Balaz"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " Agents are able to see linked Config Items without permissions, which are defined in General Catalog. \nThis issue affects:\nOTRSCIsInCustomerFrontend 7.0.15 and prior versions,\nITSMConfigurationManagement 7.0.24 and prior versions"
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.5,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-264 Permissions, Privileges, and Access Controls"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-07/"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "Update to ITSMConfigurationManagement 7.0.25 and OTRSCIsInCustomerFrontend 7.0.16. "
+        }
+    ],
+    "source": {
+        "advisory": "OSA-2021-07",
+        "defect": [
+            "2021012842001309"
+        ],
+        "discovery": "INTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/21xxx/CVE-2021-21438.json b/2021/21xxx/CVE-2021-21438.json
index ae036a7382e..938d91ccd2e 100644
--- a/2021/21xxx/CVE-2021-21438.json
+++ b/2021/21xxx/CVE-2021-21438.json
@@ -1,18 +1,114 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@otrs.com",
+        "DATE_PUBLIC": "2021-03-22T00:00:00.000Z",
         "ID": "CVE-2021-21438",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "FAQ articles are shown to users without permission"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FAQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "6.0.x",
+                                            "version_value": "6.0.29"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "OTRS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "7.0.24"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "OTRS AG"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Christopher Theuerkauf"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). \nThis issue affects:\nFAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.5,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-264 Permissions, Privileges, and Access Controls"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "Update to OTRS 7.0.25."
+        }
+    ],
+    "source": {
+        "advisory": "OSA-2021-08",
+        "defect": [
+            "2021020842001809"
+        ],
+        "discovery": "USER"
     }
 }
\ No newline at end of file

From 64e42dca7994bb2f35e1ddc6a3ee9e5f24073b1c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 09:00:41 +0000
Subject: [PATCH 476/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21437.json |  7 +++--
 2021/21xxx/CVE-2021-21438.json |  7 +++--
 2021/28xxx/CVE-2021-28964.json | 56 ++++++++++++++++++++++++++++++----
 2021/3xxx/CVE-2021-3456.json   | 18 +++++++++++
 4 files changed, 76 insertions(+), 12 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3456.json

diff --git a/2021/21xxx/CVE-2021-21437.json b/2021/21xxx/CVE-2021-21437.json
index 8807e298128..a13fe073e0e 100644
--- a/2021/21xxx/CVE-2021-21437.json
+++ b/2021/21xxx/CVE-2021-21437.json
@@ -56,7 +56,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " Agents are able to see linked Config Items without permissions, which are defined in General Catalog. \nThis issue affects:\nOTRSCIsInCustomerFrontend 7.0.15 and prior versions,\nITSMConfigurationManagement 7.0.24 and prior versions"
+                "value": "Agents are able to see linked Config Items without permissions, which are defined in General Catalog. This issue affects: OTRSCIsInCustomerFrontend 7.0.15 and prior versions, ITSMConfigurationManagement 7.0.24 and prior versions"
             }
         ]
     },
@@ -94,8 +94,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-07/"
+                "refsource": "MISC",
+                "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-07/",
+                "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-07/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21438.json b/2021/21xxx/CVE-2021-21438.json
index 938d91ccd2e..9ddf6894250 100644
--- a/2021/21xxx/CVE-2021-21438.json
+++ b/2021/21xxx/CVE-2021-21438.json
@@ -55,7 +55,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). \nThis issue affects:\nFAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions."
+                "value": "Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions."
             }
         ]
     },
@@ -93,8 +93,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/"
+                "refsource": "MISC",
+                "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/",
+                "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28964.json b/2021/28xxx/CVE-2021-28964.json
index f5b717878cb..f8e777b6959 100644
--- a/2021/28xxx/CVE-2021-28964.json
+++ b/2021/28xxx/CVE-2021-28964.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28964",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28964",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3456.json b/2021/3xxx/CVE-2021-3456.json
new file mode 100644
index 00000000000..6c8ed30c57b
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3456.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3456",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From bc70175760bb2f4b3cab470a5fcb90dfa4e165e1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 10:00:38 +0000
Subject: [PATCH 477/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3457.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/3xxx/CVE-2021-3457.json

diff --git a/2021/3xxx/CVE-2021-3457.json b/2021/3xxx/CVE-2021-3457.json
new file mode 100644
index 00000000000..961115e712a
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3457.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3457",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 4546c7d4f0ea4d0011e53712757061ed771ba61f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 11:00:40 +0000
Subject: [PATCH 478/845] "-Synchronized-Data."

---
 2020/11xxx/CVE-2020-11986.json | 10 ++++++++++
 2020/13xxx/CVE-2020-13936.json |  5 +++++
 2 files changed, 15 insertions(+)

diff --git a/2020/11xxx/CVE-2020-11986.json b/2020/11xxx/CVE-2020-11986.json
index 1652d33923a..b758e5ecef1 100644
--- a/2020/11xxx/CVE-2020-11986.json
+++ b/2020/11xxx/CVE-2020-11986.json
@@ -48,6 +48,16 @@
                 "refsource": "MISC",
                 "name": "https://lists.apache.org/thread.html/rbb8ea1b684e73107a0a6a30245ad6112bec2e6e171368c808e69217e%40%3Cannounce.netbeans.apache.org%3E",
                 "url": "https://lists.apache.org/thread.html/rbb8ea1b684e73107a0a6a30245ad6112bec2e6e171368c808e69217e%40%3Cannounce.netbeans.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[netbeans-notifications] 20210322 [GitHub] [netbeans] jtulach commented on pull request #2822: Offer to trust and prime the project when it is being opened.",
+                "url": "https://lists.apache.org/thread.html/r0fb2ba21a0469f64c2dff945dbe68f7b1122e1bff2b2b46271682406@%3Cnotifications.netbeans.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[netbeans-notifications] 20210322 [GitHub] [netbeans] jtulach edited a comment on pull request #2822: Offer to trust and prime the project when it is being opened.",
+                "url": "https://lists.apache.org/thread.html/ra81cdcf325bf4ea085c178f95ed6b50d4f1c095be50577b2f9b88984@%3Cnotifications.netbeans.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index e2fa34047d1..974d58d6a09 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -119,6 +119,11 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210319 [jira] [Comment Edited] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210322 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c@%3Cdev.ws.apache.org%3E"
             }
         ]
     },

From 27b1ce017a6a9b583dbd41e5c9e5305a0069b662 Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Mon, 22 Mar 2021 11:54:57 +0000
Subject: [PATCH 479/845] Add CVE-2021-26295 for OFBiz

---
 2021/26xxx/CVE-2021-26295.json | 85 ++++++++++++++++++++++++++++++----
 1 file changed, 77 insertions(+), 8 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index 9f3445b67fc..c5745308c6c 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "AKA": "Java serialisation",
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-26295",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache OFBiz",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_name": "Apache OFBiz",
+                                            "version_value": "17.12.01 to 17.12.05"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Apache OFBiz would like to thank the first report from \"r00t4dm at Cloud-Penetrating Arrow Lab and Longofo at Knownsec 404 Team\" and the second report by MagicZero from SGLAB of Legendsec at Qi'anxin Group."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz.\n"
             }
         ]
-    }
-}
\ No newline at end of file
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Java serialisation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "OFBIZ-12167",
+        "defect": [
+            "OFBIZ-12167"
+        ],
+        "discovery": "UNKNOWN"
+    },
+    "work_around": [
+        {
+            "lang": "eng",
+            "value": "Upgrade to at least 17.12.06 or apply the patch at https://github.com/apache/ofbiz-framework/commit/af9ed4e/\n"
+        }
+    ]
+}

From 14f3dc1cba0f9590baa5e91357c5d48d46692d4f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 12:00:49 +0000
Subject: [PATCH 480/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27506.json | 7 ++++++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/2021/27xxx/CVE-2021-27506.json b/2021/27xxx/CVE-2021-27506.json
index 898329c15c3..ab9d808bb70 100644
--- a/2021/27xxx/CVE-2021-27506.json
+++ b/2021/27xxx/CVE-2021-27506.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In Stormshield Network Security (SNS) 1.0 through 4.2.0, the parsing of some malformed files can lead to the crash of ClamAV service causing a Denial of Service."
+                "value": "The ClamAV Engine (Version 0.103.1 and below) embedded in Storsmshield Network Security (1.0 to 4.1.5) is subject to DoS in case of parsing of malformed png files."
             }
         ]
     },
@@ -56,6 +56,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://advisories.stormshield.eu/2021-003/",
                 "url": "https://advisories.stormshield.eu/2021-003/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog.clamav.net/2021/02/clamav-01031-patch-release.html",
+                "url": "https://blog.clamav.net/2021/02/clamav-01031-patch-release.html"
             }
         ]
     }

From c2eb73bd4e87fbdac03953643f5e4569e7984d06 Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Mon, 22 Mar 2021 14:08:47 +0200
Subject: [PATCH 481/845] Adds CVE-2020-28501

---
 2020/28xxx/CVE-2020-28501.json | 80 ++++++++++++++++++++++++++++++++--
 1 file changed, 76 insertions(+), 4 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28501.json b/2020/28xxx/CVE-2020-28501.json
index 719c4a9d887..5b5123152e9 100644
--- a/2020/28xxx/CVE-2020-28501.json
+++ b/2020/28xxx/CVE-2020-28501.json
@@ -3,16 +3,88 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-22T12:08:45.601570Z",
         "ID": "CVE-2020-28501",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Regular Expression Denial of Service (ReDoS)"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "es6-crawler-detect",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "3.1.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Regular Expression Denial of Service (ReDoS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/JefferyHus/es6-crawler-detect/pull/27"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "This affects the package es6-crawler-detect before 3.1.3.\n No limitation of user agent string length supplied to regex operators.\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "availabilityImpact": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Eran Levin"
+        }
+    ]
 }
\ No newline at end of file

From d2c08cb152ceb1aa622599ee66a8f54d65fb0a2b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 13:00:41 +0000
Subject: [PATCH 482/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28501.json | 12 +++++++-----
 2021/26xxx/CVE-2021-26295.json |  9 +++++----
 2 files changed, 12 insertions(+), 9 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28501.json b/2020/28xxx/CVE-2020-28501.json
index 5b5123152e9..376a2856f84 100644
--- a/2020/28xxx/CVE-2020-28501.json
+++ b/2020/28xxx/CVE-2020-28501.json
@@ -48,12 +48,14 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529",
+                "name": "https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/JefferyHus/es6-crawler-detect/pull/27"
+                "refsource": "MISC",
+                "url": "https://github.com/JefferyHus/es6-crawler-detect/pull/27",
+                "name": "https://github.com/JefferyHus/es6-crawler-detect/pull/27"
             }
         ]
     },
@@ -61,7 +63,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "This affects the package es6-crawler-detect before 3.1.3.\n No limitation of user agent string length supplied to regex operators.\n"
+                "value": "This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators."
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index c5745308c6c..fcf8eae56ee 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -43,7 +43,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz.\n"
+                "value": "Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz."
             }
         ]
     },
@@ -66,8 +66,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E"
+                "refsource": "MISC",
+                "url": "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E",
+                "name": "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E"
             }
         ]
     },
@@ -84,4 +85,4 @@
             "value": "Upgrade to at least 17.12.06 or apply the patch at https://github.com/apache/ofbiz-framework/commit/af9ed4e/\n"
         }
     ]
-}
+}
\ No newline at end of file

From cd3f061d140ee320de3b98464ca8548cdf323243 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 14:00:42 +0000
Subject: [PATCH 483/845] "-Synchronized-Data."

---
 2020/9xxx/CVE-2020-9759.json   | 49 +++++++++++++++-----------
 2021/27xxx/CVE-2021-27962.json | 64 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28146.json | 61 ++++++++++++++++++++++++++++----
 3 files changed, 142 insertions(+), 32 deletions(-)

diff --git a/2020/9xxx/CVE-2020-9759.json b/2020/9xxx/CVE-2020-9759.json
index 3fce353e482..a3632c2cc49 100644
--- a/2020/9xxx/CVE-2020-9759.json
+++ b/2020/9xxx/CVE-2020-9759.json
@@ -1,8 +1,10 @@
 {
     "CVE_data_meta": {
         "ASSIGNER": "cve@mitre.org",
+        "DATE_PUBLIC": "2020-10-08T02:19:00.000Z",
         "ID": "CVE-2020-9759",
-        "STATE": "PUBLIC"
+        "STATE": "PUBLIC",
+        "TITLE": "webOS TV Emulator privilege escalation vulnerability"
     },
     "affects": {
         "vendor": {
@@ -34,10 +36,29 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "An issue was discovered in WeeChat before 2.7.1 (0.4.0 to 2.7 are affected). A malformed message 352 (who) can cause a NULL pointer dereference in the callback function, resulting in a crash."
+                "value": "A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files."
             }
         ]
     },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 4.6,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
     "problemtype": {
         "problemtype_data": [
             {
@@ -53,25 +74,13 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://weechat.org/doc/security/",
-                "refsource": "MISC",
-                "name": "https://weechat.org/doc/security/"
-            },
-            {
-                "url": "https://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a",
-                "refsource": "MISC",
-                "name": "https://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[debian-lts-announce] 20200324 [SECURITY] [DLA 2157-1] weechat security update",
-                "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00031.html"
-            },
-            {
-                "refsource": "GENTOO",
-                "name": "GLSA-202003-51",
-                "url": "https://security.gentoo.org/glsa/202003-51"
+                "refsource": "CONFIRM",
+                "name": "https://blog.recurity-labs.com/2021-02-03/webOS_Pt1.html",
+                "url": "https://blog.recurity-labs.com/2021-02-03/webOS_Pt1.html"
             }
         ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27962.json b/2021/27xxx/CVE-2021-27962.json
index 792ffc71f0c..129216414a6 100644
--- a/2021/27xxx/CVE-2021-27962.json
+++ b/2021/27xxx/CVE-2021-27962.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27962",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27962",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access."
             }
         ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://community.grafana.com",
+                "refsource": "MISC",
+                "name": "https://community.grafana.com"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "http://www.openwall.com/lists/oss-security/2021/03/19/5",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/19/5"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "INTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28146.json b/2021/28xxx/CVE-2021-28146.json
index 9ca4030123a..a96b7c9c0a7 100644
--- a/2021/28xxx/CVE-2021-28146.json
+++ b/2021/28xxx/CVE-2021-28146.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28146",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28146",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The team sync HTTP API in Grafana Enterprise 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service, this vulnerability allows any authenticated user to add external groups to existing teams. This can be used to grant a user team permissions that the user isn't supposed to have."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://grafana.com/products/enterprise/",
+                "refsource": "MISC",
+                "name": "https://grafana.com/products/enterprise/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/19/5",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/19/5"
             }
         ]
     }

From 311e4853d9e231fc9a3cc4f459298dbe2b7b0d55 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 15:00:41 +0000
Subject: [PATCH 484/845] "-Synchronized-Data."

---
 2020/36xxx/CVE-2020-36144.json |  2 +-
 2021/25xxx/CVE-2021-25346.json |  5 ++
 2021/27xxx/CVE-2021-27308.json | 56 +++++++++++++++++++---
 2021/27xxx/CVE-2021-27962.json | 20 ++++++++
 2021/28xxx/CVE-2021-28146.json | 25 ++++++++++
 2021/28xxx/CVE-2021-28147.json | 86 +++++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28148.json | 86 +++++++++++++++++++++++++++++++---
 7 files changed, 261 insertions(+), 19 deletions(-)

diff --git a/2020/36xxx/CVE-2020-36144.json b/2020/36xxx/CVE-2020-36144.json
index 10d292a40b5..a979f1a77a3 100644
--- a/2020/36xxx/CVE-2020-36144.json
+++ b/2020/36xxx/CVE-2020-36144.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Redash 8.0.0 is affected by LDAP Injection. There is an authentication bypass and information leak through the crafting of special queries, escaping the provided template because the ldap_user = auth_ldap_user(request.form[\"email\"], request.form[\"password\"]) auth_ldap_user(username, password) settings.LDAP_SEARCH_TEMPLATE % {\"username\": username} code lacks sanitization."
+                "value": "Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization."
             }
         ]
     },
diff --git a/2021/25xxx/CVE-2021-25346.json b/2021/25xxx/CVE-2021-25346.json
index 06e295fd054..abc719bf1ff 100644
--- a/2021/25xxx/CVE-2021-25346.json
+++ b/2021/25xxx/CVE-2021-25346.json
@@ -82,6 +82,11 @@
                 "refsource": "MISC",
                 "url": "https://security.samsungmobile.com/",
                 "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-342/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-342/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27308.json b/2021/27xxx/CVE-2021-27308.json
index 7fca2cbda8b..4dd6f38a9d3 100644
--- a/2021/27xxx/CVE-2021-27308.json
+++ b/2021/27xxx/CVE-2021-27308.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27308",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27308",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the \"redirect\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/4images/4images/issues/3",
+                "refsource": "MISC",
+                "name": "https://github.com/4images/4images/issues/3"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27962.json b/2021/27xxx/CVE-2021-27962.json
index 129216414a6..9416f1b0ce0 100644
--- a/2021/27xxx/CVE-2021-27962.json
+++ b/2021/27xxx/CVE-2021-27962.json
@@ -52,6 +52,11 @@
     },
     "references": {
         "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/release-notes-v6-7-x/27119",
+                "url": "https://community.grafana.com/t/release-notes-v6-7-x/27119"
+            },
             {
                 "url": "https://community.grafana.com",
                 "refsource": "MISC",
@@ -61,6 +66,21 @@
                 "refsource": "CONFIRM",
                 "name": "http://www.openwall.com/lists/oss-security/2021/03/19/5",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/19/5"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/",
+                "url": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724",
+                "url": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28146.json b/2021/28xxx/CVE-2021-28146.json
index a96b7c9c0a7..4c3b8deca1e 100644
--- a/2021/28xxx/CVE-2021-28146.json
+++ b/2021/28xxx/CVE-2021-28146.json
@@ -52,6 +52,11 @@
     },
     "references": {
         "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/release-notes-v6-7-x/27119",
+                "url": "https://community.grafana.com/t/release-notes-v6-7-x/27119"
+            },
             {
                 "url": "https://grafana.com/products/enterprise/",
                 "refsource": "MISC",
@@ -61,6 +66,26 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.openwall.com/lists/oss-security/2021/03/19/5",
                 "url": "https://www.openwall.com/lists/oss-security/2021/03/19/5"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/",
+                "url": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724",
+                "url": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-3-10/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-3-10/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28147.json b/2021/28xxx/CVE-2021-28147.json
index 586cceafc20..dbfc8b0d9d7 100644
--- a/2021/28xxx/CVE-2021-28147.json
+++ b/2021/28xxx/CVE-2021-28147.json
@@ -1,17 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28147",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28147",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The team sync HTTP API in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service and having the EditorsCanAdmin feature enabled, this vulnerability allows any authenticated user to add external groups to any existing team. This can be used to grant a user team permissions that the user isn't supposed to have."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/release-notes-v6-7-x/27119",
+                "url": "https://community.grafana.com/t/release-notes-v6-7-x/27119"
+            },
+            {
+                "url": "https://grafana.com/products/enterprise/",
+                "refsource": "MISC",
+                "name": "https://grafana.com/products/enterprise/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/19/5",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/19/5"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/",
+                "url": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724",
+                "url": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-3-10/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-3-10/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28148.json b/2021/28xxx/CVE-2021-28148.json
index 26d420f57a4..246af3ce24f 100644
--- a/2021/28xxx/CVE-2021-28148.json
+++ b/2021/28xxx/CVE-2021-28148.json
@@ -1,17 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28148",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28148",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "One of the usage insights HTTP API endpoints in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 is accessible without any authentication. This allows any unauthenticated user to send an unlimited number of requests to the endpoint, leading to a denial of service (DoS) attack against a Grafana Enterprise instance."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/release-notes-v6-7-x/27119",
+                "url": "https://community.grafana.com/t/release-notes-v6-7-x/27119"
+            },
+            {
+                "url": "https://grafana.com/products/enterprise/",
+                "refsource": "MISC",
+                "name": "https://grafana.com/products/enterprise/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/19/5",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/19/5"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/",
+                "url": "https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724",
+                "url": "https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-3-10/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-3-10/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/",
+                "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/"
             }
         ]
     }

From c237ad0895741de5ef0351e7e28519f84495692f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 16:00:39 +0000
Subject: [PATCH 485/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27807.json |  5 +++
 2021/27xxx/CVE-2021-27906.json |  5 +++
 2021/28xxx/CVE-2021-28968.json | 62 ++++++++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28969.json | 18 ++++++++++
 2021/28xxx/CVE-2021-28970.json | 18 ++++++++++
 5 files changed, 108 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28968.json
 create mode 100644 2021/28xxx/CVE-2021-28969.json
 create mode 100644 2021/28xxx/CVE-2021-28970.json

diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 2174d0022d5..0c346b9098a 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -124,6 +124,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch release18.12 updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
                 "url": "https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pdfbox-dev] 20210322 OSS-Fuzz integration",
+                "url": "https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index dccbe68510d..37a29dd7223 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -124,6 +124,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-commits] 20210321 [ofbiz-framework] branch release18.12 updated: Fixed: Upgrade Apache PDFBox to 2.0.23 because of CVE-2021-27807 and CVE-2021-27906 (OFBIZ-12205)",
                 "url": "https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pdfbox-dev] 20210322 OSS-Fuzz integration",
+                "url": "https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28968.json b/2021/28xxx/CVE-2021-28968.json
new file mode 100644
index 00000000000..125010a59ae
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28968.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28968",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in PunBB before 1.4.6. An XSS vulnerability in the [email] BBcode tag allows (with authentication) injecting arbitrary JavaScript into any forum message."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://punbb.informer.com/",
+                "refsource": "MISC",
+                "name": "https://punbb.informer.com/"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28969.json b/2021/28xxx/CVE-2021-28969.json
new file mode 100644
index 00000000000..68c0eb6c6d5
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28969.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28969",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28970.json b/2021/28xxx/CVE-2021-28970.json
new file mode 100644
index 00000000000..28b38c73fac
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28970.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28970",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From cf32ebe888a02323c77edd8b55615c75f4479cfd Mon Sep 17 00:00:00 2001
From: Scott Moore - IBM 
Date: Mon, 22 Mar 2021 12:53:32 -0400
Subject: [PATCH 486/845] IBM20210322-125332

Added CVE-2020-4882
---
 2020/4xxx/CVE-2020-4882.json | 102 +++++++++++++++++++++++++++++------
 1 file changed, 87 insertions(+), 15 deletions(-)

diff --git a/2020/4xxx/CVE-2020-4882.json b/2020/4xxx/CVE-2020-4882.json
index 2511909aee4..52177492327 100644
--- a/2020/4xxx/CVE-2020-4882.json
+++ b/2020/4xxx/CVE-2020-4882.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-4882",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "data_version" : "4.0",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "vendor_name" : "IBM",
+               "product" : {
+                  "product_data" : [
+                     {
+                        "product_name" : "Planning Analytics",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "2.0"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               }
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format" : "MITRE",
+   "data_type" : "CVE",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Planning Analytics 2.0 could be vulnerable to a Server-Side Request Forgery (SSRF) attack by constucting URLs from user-controlled data . This could enable attackers to make arbitrary requests to the internal network or to the local file system.  IBM X-Force ID:  190852.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "CVE_data_meta" : {
+      "STATE" : "PUBLIC",
+      "ID" : "CVE-2020-4882",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "DATE_PUBLIC" : "2021-03-19T00:00:00"
+   },
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Gain Access"
+               }
+            ]
+         }
+      ]
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "refsource" : "CONFIRM",
+            "name" : "https://www.ibm.com/support/pages/node/6430643",
+            "url" : "https://www.ibm.com/support/pages/node/6430643",
+            "title" : "IBM Security Bulletin 6430643 (Planning Analytics)"
+         },
+         {
+            "name" : "ibm-planning-cve20204882-ssrf (190852)",
+            "refsource" : "XF",
+            "title" : "X-Force Vulnerability Report",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190852"
+         }
+      ]
+   },
+   "impact" : {
+      "cvssv3" : {
+         "TM" : {
+            "E" : "U",
+            "RL" : "O",
+            "RC" : "C"
+         },
+         "BM" : {
+            "S" : "C",
+            "AC" : "L",
+            "SCORE" : "6.100",
+            "A" : "N",
+            "UI" : "R",
+            "AV" : "N",
+            "I" : "L",
+            "PR" : "N",
+            "C" : "L"
+         }
+      }
+   }
+}

From 63608cfe7a46f2264d67d7a00b2f8326479da09c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 17:00:42 +0000
Subject: [PATCH 487/845] "-Synchronized-Data."

---
 2017/1000xxx/CVE-2017-1000170.json |  5 +++
 2020/27xxx/CVE-2020-27216.json     | 10 +++++
 2021/27xxx/CVE-2021-27593.json     | 63 ++++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27594.json     | 63 ++++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27595.json     | 63 ++++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27596.json     | 63 ++++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27646.json     |  5 +++
 2021/27xxx/CVE-2021-27647.json     |  7 +++-
 2021/27xxx/CVE-2021-27889.json     |  5 +++
 2021/27xxx/CVE-2021-27890.json     |  5 +++
 2021/28xxx/CVE-2021-28133.json     |  5 +++
 2021/28xxx/CVE-2021-28971.json     | 62 +++++++++++++++++++++++++++++
 2021/28xxx/CVE-2021-28972.json     | 62 +++++++++++++++++++++++++++++
 13 files changed, 405 insertions(+), 13 deletions(-)
 create mode 100644 2021/28xxx/CVE-2021-28971.json
 create mode 100644 2021/28xxx/CVE-2021-28972.json

diff --git a/2017/1000xxx/CVE-2017-1000170.json b/2017/1000xxx/CVE-2017-1000170.json
index c2ab8fff40e..05a53d7775d 100644
--- a/2017/1000xxx/CVE-2017-1000170.json
+++ b/2017/1000xxx/CVE-2017-1000170.json
@@ -58,6 +58,11 @@
                 "name": "https://github.com/jqueryfiletree/jqueryfiletree/issues/66",
                 "refsource": "MISC",
                 "url": "https://github.com/jqueryfiletree/jqueryfiletree/issues/66"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161900/WordPress-Delightful-Downloads-Jquery-File-Tree-1.6.6-Path-Traversal.html",
+                "url": "http://packetstormsecurity.com/files/161900/WordPress-Delightful-Downloads-Jquery-File-Tree-1.6.6-Path-Traversal.html"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index eeff4848cc3..93aedf3faf8 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -520,6 +520,16 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210316 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210322 [jira] [Commented] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210322 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27593.json b/2021/27xxx/CVE-2021-27593.json
index c6eb30744f8..8fb1e43d317 100644
--- a/2021/27xxx/CVE-2021-27593.json
+++ b/2021/27xxx/CVE-2021-27593.json
@@ -4,14 +4,71 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27593",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cna@sap.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "SAP SE",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "SAP 3D Visual Enterprise Viewer",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_name": "<",
+                                            "version_value": "9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "When a user opens manipulated Graphics Interchange Format (.GIF) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": "4.3",
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107",
+                "refsource": "MISC",
+                "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
+            },
+            {
+                "url": "https://launchpad.support.sap.com/#/notes/3035472",
+                "refsource": "MISC",
+                "name": "https://launchpad.support.sap.com/#/notes/3035472"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27594.json b/2021/27xxx/CVE-2021-27594.json
index 0681ae8c27c..e1e262448ca 100644
--- a/2021/27xxx/CVE-2021-27594.json
+++ b/2021/27xxx/CVE-2021-27594.json
@@ -4,14 +4,71 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27594",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cna@sap.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "SAP SE",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "SAP 3D Visual Enterprise Viewer",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_name": "<",
+                                            "version_value": "9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "When a user opens manipulated Windows Bitmap (.BMP) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": "4.3",
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107",
+                "refsource": "MISC",
+                "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
+            },
+            {
+                "url": "https://launchpad.support.sap.com/#/notes/3035472",
+                "refsource": "MISC",
+                "name": "https://launchpad.support.sap.com/#/notes/3035472"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27595.json b/2021/27xxx/CVE-2021-27595.json
index 68d34cfec52..0b2708e25da 100644
--- a/2021/27xxx/CVE-2021-27595.json
+++ b/2021/27xxx/CVE-2021-27595.json
@@ -4,14 +4,71 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27595",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cna@sap.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "SAP SE",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "SAP 3D Visual Enterprise Viewer",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_name": "<",
+                                            "version_value": "9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "When a user opens manipulated Portable Document Format (.PDF) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": "4.3",
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107",
+                "refsource": "MISC",
+                "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
+            },
+            {
+                "url": "https://launchpad.support.sap.com/#/notes/3035472",
+                "refsource": "MISC",
+                "name": "https://launchpad.support.sap.com/#/notes/3035472"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27596.json b/2021/27xxx/CVE-2021-27596.json
index b2b647d8304..ff47dc6994e 100644
--- a/2021/27xxx/CVE-2021-27596.json
+++ b/2021/27xxx/CVE-2021-27596.json
@@ -4,14 +4,71 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27596",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cna@sap.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "SAP SE",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "SAP 3D Visual Enterprise Viewer",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_name": "<",
+                                            "version_value": "9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "When a user opens manipulated Autodesk 3D Studio for MS-DOS (.3DS) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": "4.3",
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107",
+                "refsource": "MISC",
+                "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107"
+            },
+            {
+                "url": "https://launchpad.support.sap.com/#/notes/3035472",
+                "refsource": "MISC",
+                "name": "https://launchpad.support.sap.com/#/notes/3035472"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27646.json b/2021/27xxx/CVE-2021-27646.json
index 11b24d9a4f1..2bc0a83e78f 100644
--- a/2021/27xxx/CVE-2021-27646.json
+++ b/2021/27xxx/CVE-2021-27646.json
@@ -66,6 +66,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.synology.com/security/advisory/Synology_SA_20_26"
             },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/"
+            },
             {
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/",
diff --git a/2021/27xxx/CVE-2021-27647.json b/2021/27xxx/CVE-2021-27647.json
index 5cc0025aa38..599f4265653 100644
--- a/2021/27xxx/CVE-2021-27647.json
+++ b/2021/27xxx/CVE-2021-27647.json
@@ -65,7 +65,12 @@
                 "url": "https://www.synology.com/security/advisory/Synology_SA_20_26",
                 "refsource": "CONFIRM",
                 "name": "https://www.synology.com/security/advisory/Synology_SA_20_26"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/"
             }
         ]
     }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27889.json b/2021/27xxx/CVE-2021-27889.json
index 3303826b20e..0a639addc63 100644
--- a/2021/27xxx/CVE-2021-27889.json
+++ b/2021/27xxx/CVE-2021-27889.json
@@ -56,6 +56,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/mybb/mybb/security/advisories/GHSA-xhj7-3349-mqcm",
                 "url": "https://github.com/mybb/mybb/security/advisories/GHSA-xhj7-3349-mqcm"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27890.json b/2021/27xxx/CVE-2021-27890.json
index 02cf3a1a655..a05c3f52b04 100644
--- a/2021/27xxx/CVE-2021-27890.json
+++ b/2021/27xxx/CVE-2021-27890.json
@@ -56,6 +56,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/mybb/mybb/security/advisories/GHSA-r34m-ccm8-mfhq",
                 "url": "https://github.com/mybb/mybb/security/advisories/GHSA-r34m-ccm8-mfhq"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28133.json b/2021/28xxx/CVE-2021-28133.json
index 98d594fb782..f76e1b3f5b7 100644
--- a/2021/28xxx/CVE-2021-28133.json
+++ b/2021/28xxx/CVE-2021-28133.json
@@ -81,6 +81,11 @@
                 "refsource": "MISC",
                 "name": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html",
                 "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html",
+                "url": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28971.json b/2021/28xxx/CVE-2021-28971.json
new file mode 100644
index 00000000000..ccb8accdd9d
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28971.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28971",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28972.json b/2021/28xxx/CVE-2021-28972.json
new file mode 100644
index 00000000000..15469fc3dde
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28972.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-28972",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\\0' termination, aka CID-cc7a0bb058b8."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678"
+            }
+        ]
+    }
+}
\ No newline at end of file

From b9831a182b116a09107d06ab76e06d1879ef4be4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 18:00:40 +0000
Subject: [PATCH 488/845] "-Synchronized-Data."

---
 2020/4xxx/CVE-2020-4882.json   | 176 ++++++++++++++++-----------------
 2020/9xxx/CVE-2020-9206.json   |  50 +++++++++-
 2020/9xxx/CVE-2020-9212.json   |  50 +++++++++-
 2020/9xxx/CVE-2020-9213.json   |  71 ++++++++++++-
 2021/22xxx/CVE-2021-22309.json |  59 ++++++++++-
 2021/26xxx/CVE-2021-26578.json |  50 +++++++++-
 2021/28xxx/CVE-2021-28973.json |  18 ++++
 2021/28xxx/CVE-2021-28974.json |  18 ++++
 2021/28xxx/CVE-2021-28975.json |  18 ++++
 9 files changed, 407 insertions(+), 103 deletions(-)
 create mode 100644 2021/28xxx/CVE-2021-28973.json
 create mode 100644 2021/28xxx/CVE-2021-28974.json
 create mode 100644 2021/28xxx/CVE-2021-28975.json

diff --git a/2020/4xxx/CVE-2020-4882.json b/2020/4xxx/CVE-2020-4882.json
index 52177492327..20b3510ca66 100644
--- a/2020/4xxx/CVE-2020-4882.json
+++ b/2020/4xxx/CVE-2020-4882.json
@@ -1,90 +1,90 @@
 {
-   "data_version" : "4.0",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "vendor_name" : "IBM",
-               "product" : {
-                  "product_data" : [
-                     {
-                        "product_name" : "Planning Analytics",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "2.0"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               }
-            }
-         ]
-      }
-   },
-   "data_format" : "MITRE",
-   "data_type" : "CVE",
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Planning Analytics 2.0 could be vulnerable to a Server-Side Request Forgery (SSRF) attack by constucting URLs from user-controlled data . This could enable attackers to make arbitrary requests to the internal network or to the local file system.  IBM X-Force ID:  190852.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "CVE_data_meta" : {
-      "STATE" : "PUBLIC",
-      "ID" : "CVE-2020-4882",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "DATE_PUBLIC" : "2021-03-19T00:00:00"
-   },
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Gain Access"
-               }
+    "data_version": "4.0",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "IBM",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Planning Analytics",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
             ]
-         }
-      ]
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "refsource" : "CONFIRM",
-            "name" : "https://www.ibm.com/support/pages/node/6430643",
-            "url" : "https://www.ibm.com/support/pages/node/6430643",
-            "title" : "IBM Security Bulletin 6430643 (Planning Analytics)"
-         },
-         {
-            "name" : "ibm-planning-cve20204882-ssrf (190852)",
-            "refsource" : "XF",
-            "title" : "X-Force Vulnerability Report",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190852"
-         }
-      ]
-   },
-   "impact" : {
-      "cvssv3" : {
-         "TM" : {
-            "E" : "U",
-            "RL" : "O",
-            "RC" : "C"
-         },
-         "BM" : {
-            "S" : "C",
-            "AC" : "L",
-            "SCORE" : "6.100",
-            "A" : "N",
-            "UI" : "R",
-            "AV" : "N",
-            "I" : "L",
-            "PR" : "N",
-            "C" : "L"
-         }
-      }
-   }
-}
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Planning Analytics 2.0 could be vulnerable to a Server-Side Request Forgery (SSRF) attack by constucting URLs from user-controlled data . This could enable attackers to make arbitrary requests to the internal network or to the local file system. IBM X-Force ID: 190852.",
+                "lang": "eng"
+            }
+        ]
+    },
+    "CVE_data_meta": {
+        "STATE": "PUBLIC",
+        "ID": "CVE-2020-4882",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "DATE_PUBLIC": "2021-03-19T00:00:00"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Gain Access"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.ibm.com/support/pages/node/6430643",
+                "url": "https://www.ibm.com/support/pages/node/6430643",
+                "title": "IBM Security Bulletin 6430643 (Planning Analytics)"
+            },
+            {
+                "name": "ibm-planning-cve20204882-ssrf (190852)",
+                "refsource": "XF",
+                "title": "X-Force Vulnerability Report",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190852"
+            }
+        ]
+    },
+    "impact": {
+        "cvssv3": {
+            "TM": {
+                "E": "U",
+                "RL": "O",
+                "RC": "C"
+            },
+            "BM": {
+                "S": "C",
+                "AC": "L",
+                "SCORE": "6.100",
+                "A": "N",
+                "UI": "R",
+                "AV": "N",
+                "I": "L",
+                "PR": "N",
+                "C": "L"
+            }
+        }
+    }
+}
\ No newline at end of file
diff --git a/2020/9xxx/CVE-2020-9206.json b/2020/9xxx/CVE-2020-9206.json
index 3b05bdf2c8f..f73b99c50a8 100644
--- a/2020/9xxx/CVE-2020-9206.json
+++ b/2020/9xxx/CVE-2020-9206.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9206",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "eUDC660",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V100R005C00"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Resource Management"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-resourcemanagement-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-resourcemanagement-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The eUDC660 product has a resource management vulnerability. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the device, as a result, the key file can be obtained and data can be decrypted, affecting confidentiality, integrity, and availability of the device."
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9212.json b/2020/9xxx/CVE-2020-9212.json
index d45291dacd7..2f57aa399b0 100644
--- a/2020/9xxx/CVE-2020-9212.json
+++ b/2020/9xxx/CVE-2020-9212.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9212",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "USG9500",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Information Processing"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak."
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9213.json b/2020/9xxx/CVE-2020-9213.json
index ae12490d348..f9b62b13e59 100644
--- a/2020/9xxx/CVE-2020-9213.json
+++ b/2020/9xxx/CVE-2020-9213.json
@@ -4,14 +4,79 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9213",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60,V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60,V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C60,V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60,V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60,V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60,V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60,V500R005C00"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial of Service"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22309.json b/2021/22xxx/CVE-2021-22309.json
index dd3467cbc4f..04afe824e1a 100644
--- a/2021/22xxx/CVE-2021-22309.json
+++ b/2021/22xxx/CVE-2021-22309.json
@@ -4,14 +4,67 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22309",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "USG9500,USG9520,USG9560,USG9580",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200"
+                                        },
+                                        {
+                                            "version_value": "V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R005C00"
+                                        },
+                                        {
+                                            "version_value": "V500R005C00"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Leakage"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26578.json b/2021/26xxx/CVE-2021-26578.json
index a79f678f9ea..f1a029b8610 100644
--- a/2021/26xxx/CVE-2021-26578.json
+++ b/2021/26xxx/CVE-2021-26578.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26578",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "HPE Network Orchestrator",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Prior to Version 2.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote sql injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04097en_us",
+                "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04097en_us"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A potential security vulnerability has been identified in HPE Network Orchestrator (NetO) version(s): Prior to 2.5. The vulnerability could be remotely exploited with SQL injection."
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28973.json b/2021/28xxx/CVE-2021-28973.json
new file mode 100644
index 00000000000..c234047f6fc
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28973.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28973",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28974.json b/2021/28xxx/CVE-2021-28974.json
new file mode 100644
index 00000000000..6aa657d76ec
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28974.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28974",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28975.json b/2021/28xxx/CVE-2021-28975.json
new file mode 100644
index 00000000000..1ddc55cc6af
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28975.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28975",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 1708204e63658f3d792fe022d3bf476a3d0e3f15 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 19:00:40 +0000
Subject: [PATCH 489/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22310.json | 65 ++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22311.json | 50 +++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22320.json | 68 ++++++++++++++++++++++++++++++++--
 3 files changed, 174 insertions(+), 9 deletions(-)

diff --git a/2021/22xxx/CVE-2021-22310.json b/2021/22xxx/CVE-2021-22310.json
index 9d17e77eefa..1f6c1e94489 100644
--- a/2021/22xxx/CVE-2021-22310.json
+++ b/2021/22xxx/CVE-2021-22310.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22310",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V500R001C00,V500R001C20,V500R001C30"
+                                        },
+                                        {
+                                            "version_value": "V500R001C00,V500R001C20,V500R001C30"
+                                        },
+                                        {
+                                            "version_value": "V500R001C00,V500R001C20,V500R001C30"
+                                        },
+                                        {
+                                            "version_value": "V500R001C00,V500R001C20,V500R001C30"
+                                        },
+                                        {
+                                            "version_value": "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80"
+                                        },
+                                        {
+                                            "version_value": "V500R005C00,V500R005C10"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Leakage"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22311.json b/2021/22xxx/CVE-2021-22311.json
index 4e15bc9c6ba..087056a8d9d 100644
--- a/2021/22xxx/CVE-2021-22311.json
+++ b/2021/22xxx/CVE-2021-22311.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22311",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ManageOne",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.0.0,8.0.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Permission Assignment"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-manageone-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-manageone-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is an improper permission assignment vulnerability in Huawei ManageOne product. Due to improper security hardening, the process can run with a higher privilege. Successful exploit could allow certain users to do certain operations with improper permissions. Affected product versions include: ManageOne versions 8.0.0, 8.0.1."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22320.json b/2021/22xxx/CVE-2021-22320.json
index edf009e9ed8..1f60396928d 100644
--- a/2021/22xxx/CVE-2021-22320.json
+++ b/2021/22xxx/CVE-2021-22320.json
@@ -4,14 +4,76 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22320",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "IPS Module;NGFW Module;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300"
+                                        },
+                                        {
+                                            "version_value": "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500"
+                                        },
+                                        {
+                                            "version_value": "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial of Service"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-03-dos-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-03-dos-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages correctly. Attackers can exploit this vulnerability by sending malicious messages to an affected module. This can lead to denial of service. Affected product include some versions of IPS Module, NGFW Module, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500 and Secospace USG6600."
             }
         ]
     }

From 28c5e8dc72efb547505b660f5b06b9e5000e8596 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 20:00:40 +0000
Subject: [PATCH 490/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28431.json | 77 ++---------------------------
 2020/28xxx/CVE-2020-28432.json | 77 ++---------------------------
 2021/22xxx/CVE-2021-22314.json | 50 +++++++++++++++++--
 2021/22xxx/CVE-2021-22321.json | 89 ++++++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25917.json | 55 +++++++++++++++++++--
 2021/25xxx/CVE-2021-25918.json | 55 +++++++++++++++++++--
 2021/25xxx/CVE-2021-25919.json | 55 +++++++++++++++++++--
 2021/25xxx/CVE-2021-25920.json | 55 +++++++++++++++++++--
 2021/25xxx/CVE-2021-25921.json | 55 +++++++++++++++++++--
 2021/25xxx/CVE-2021-25922.json | 55 +++++++++++++++++++--
 10 files changed, 453 insertions(+), 170 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28431.json b/2020/28xxx/CVE-2020-28431.json
index bf5d09776e7..2449825cf27 100644
--- a/2020/28xxx/CVE-2020-28431.json
+++ b/2020/28xxx/CVE-2020-28431.json
@@ -3,85 +3,16 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
-        "ASSIGNER": "report@snyk.io",
-        "DATE_PUBLIC": "2021-02-23T15:19:13.882047Z",
         "ID": "CVE-2020-28431",
-        "STATE": "PUBLIC",
-        "TITLE": "Command Injection"
-    },
-    "affects": {
-        "vendor": {
-            "vendor_data": [
-                {
-                    "product": {
-                        "product_data": [
-                            {
-                                "product_name": "wc-cmd",
-                                "version": {
-                                    "version_data": [
-                                        {
-                                            "version_affected": ">=",
-                                            "version_value": "0"
-                                        }
-                                    ]
-                                }
-                            }
-                        ]
-                    },
-                    "vendor_name": "n/a"
-                }
-            ]
-        }
-    },
-    "problemtype": {
-        "problemtype_data": [
-            {
-                "description": [
-                    {
-                        "lang": "eng",
-                        "value": "Command Injection"
-                    }
-                ]
-            }
-        ]
-    },
-    "references": {
-        "reference_data": [
-            {
-                "refsource": "MISC",
-                "url": "https://snyk.io/vuln/SNYK-JS-WCCMD-1050423",
-                "name": "https://snyk.io/vuln/SNYK-JS-WCCMD-1050423"
-            }
-        ]
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "All versions of package wc-cmd are vulnerable to Command Injection via the index.js file. PoC: var a =require(\"wc-cmd\"); a(\"touch JHU\")"
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
             }
         ]
-    },
-    "impact": {
-        "cvss": {
-            "version": "3.1",
-            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
-            "baseScore": 7.3,
-            "baseSeverity": "HIGH",
-            "attackVector": "NETWORK",
-            "attackComplexity": "LOW",
-            "privilegesRequired": "NONE",
-            "userInteraction": "NONE",
-            "scope": "UNCHANGED",
-            "confidentialityImpact": "LOW",
-            "integrityImpact": "LOW",
-            "availabilityImpact": "LOW"
-        }
-    },
-    "credit": [
-        {
-            "lang": "eng",
-            "value": "JHU System Security Lab"
-        }
-    ]
+    }
 }
\ No newline at end of file
diff --git a/2020/28xxx/CVE-2020-28432.json b/2020/28xxx/CVE-2020-28432.json
index d7540857795..ee352d2ad32 100644
--- a/2020/28xxx/CVE-2020-28432.json
+++ b/2020/28xxx/CVE-2020-28432.json
@@ -3,85 +3,16 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
-        "ASSIGNER": "report@snyk.io",
-        "DATE_PUBLIC": "2021-02-23T15:23:08.267334Z",
         "ID": "CVE-2020-28432",
-        "STATE": "PUBLIC",
-        "TITLE": "Command Injection"
-    },
-    "affects": {
-        "vendor": {
-            "vendor_data": [
-                {
-                    "product": {
-                        "product_data": [
-                            {
-                                "product_name": "theme-core",
-                                "version": {
-                                    "version_data": [
-                                        {
-                                            "version_affected": ">=",
-                                            "version_value": "0"
-                                        }
-                                    ]
-                                }
-                            }
-                        ]
-                    },
-                    "vendor_name": "n/a"
-                }
-            ]
-        }
-    },
-    "problemtype": {
-        "problemtype_data": [
-            {
-                "description": [
-                    {
-                        "lang": "eng",
-                        "value": "Command Injection"
-                    }
-                ]
-            }
-        ]
-    },
-    "references": {
-        "reference_data": [
-            {
-                "refsource": "MISC",
-                "url": "https://snyk.io/vuln/SNYK-JS-THEMECORE-1050425",
-                "name": "https://snyk.io/vuln/SNYK-JS-THEMECORE-1050425"
-            }
-        ]
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "All versions of package theme-core are vulnerable to Command Injection via the lib/utils.js file, which is required by main entry of the package. PoC: var a =require(\"theme-core\"); a.utils.sh(\"touch JHU\")"
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
             }
         ]
-    },
-    "impact": {
-        "cvss": {
-            "version": "3.1",
-            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
-            "baseScore": 7.3,
-            "baseSeverity": "HIGH",
-            "attackVector": "NETWORK",
-            "attackComplexity": "LOW",
-            "privilegesRequired": "NONE",
-            "userInteraction": "NONE",
-            "scope": "UNCHANGED",
-            "confidentialityImpact": "LOW",
-            "integrityImpact": "LOW",
-            "availabilityImpact": "LOW"
-        }
-    },
-    "credit": [
-        {
-            "lang": "eng",
-            "value": "JHU System Security Lab"
-        }
-    ]
+    }
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22314.json b/2021/22xxx/CVE-2021-22314.json
index 86c32b95ae8..a45b326bcb5 100644
--- a/2021/22xxx/CVE-2021-22314.json
+++ b/2021/22xxx/CVE-2021-22314.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22314",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ManageOne",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.5.1.1.B010,6.5.1RC1.B060,6.5.1RC1.B070,6.5.1RC2.B020,6.5.1RC2.B030"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Local Privilege Escalation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210218-01-privilege-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210218-01-privilege-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is a local privilege escalation vulnerability in some versions of ManageOne. A local authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22321.json b/2021/22xxx/CVE-2021-22321.json
index 8918423d2c3..472ebf2ae79 100644
--- a/2021/22xxx/CVE-2021-22321.json
+++ b/2021/22xxx/CVE-2021-22321.json
@@ -4,14 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22321",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30"
+                                        },
+                                        {
+                                            "version_value": "V500R001C60"
+                                        },
+                                        {
+                                            "version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
+                                        },
+                                        {
+                                            "version_value": "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
+                                        },
+                                        {
+                                            "version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
+                                        },
+                                        {
+                                            "version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
+                                        },
+                                        {
+                                            "version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
+                                        },
+                                        {
+                                            "version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
+                                        },
+                                        {
+                                            "version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60"
+                                        },
+                                        {
+                                            "version_value": "V500R001C30,V500R001C60"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
+                "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25917.json b/2021/25xxx/CVE-2021-25917.json
index 88195350997..0e48cb20bfd 100644
--- a/2021/25xxx/CVE-2021-25917.json
+++ b/2021/25xxx/CVE-2021-25917.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25917",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openemr",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 6.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site-Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f",
+                "url": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25917",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25917"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25918.json b/2021/25xxx/CVE-2021-25918.json
index 513761ab5c7..ecbeb701b6e 100644
--- a/2021/25xxx/CVE-2021-25918.json
+++ b/2021/25xxx/CVE-2021-25918.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25918",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openemr",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 6.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site-Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f",
+                "url": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25918",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25918"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25919.json b/2021/25xxx/CVE-2021-25919.json
index c79e7c02e2e..b4e034b7a8e 100644
--- a/2021/25xxx/CVE-2021-25919.json
+++ b/2021/25xxx/CVE-2021-25919.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25919",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openemr",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 6.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site-Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25919",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25919"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f",
+                "url": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25920.json b/2021/25xxx/CVE-2021-25920.json
index cc6325d347a..260aa609bc4 100644
--- a/2021/25xxx/CVE-2021-25920.json
+++ b/2021/25xxx/CVE-2021-25920.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25920",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openemr",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "2.7.2-rc1, 2.7.2-rc2, 2.7.2, 2.7.3-rc1, 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.9.0, 3.0.0, 3.0.1, 3.1.0, 3.2.0, 4.0.0, 4.1.0, 4.1.1, 4.1.2, 4.1.2.3, 4.1.2.6, 4.1.2.7, 4.2.0, 4.2.0.3, 4.2.1, 4.2.2, 5.0.0, 5.0.0.5, 5.0.0.6, 5.0.1, 5.0.1.1, 5.0.1.2, 5.0.1.3, 5.0.1.4, 5.0.1.5, 5.0.1.6, 5.0.1.7, 5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 6.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Access Control"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f",
+                "url": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25920",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25920"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25921.json b/2021/25xxx/CVE-2021-25921.json
index 3ddc0c3ed7b..9f8c10c3fef 100644
--- a/2021/25xxx/CVE-2021-25921.json
+++ b/2021/25xxx/CVE-2021-25921.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25921",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openemr",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "2.7.3-rc1, 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.9.0, 3.0.0, 3.0.1, 3.1.0, 3.2.0, 4.0.0, 4.1.0, 4.1.1, 4.1.2, 4.1.2.3, 4.1.2.6, 4.1.2.7, 4.2.0, 4.2.0.3, 4.2.1, 4.2.2, 5.0.0, 5.0.0.5, 5.0.0.6, 5.0.1, 5.0.1.1, 5.0.1.2, 5.0.1.3, 5.0.1.4, 5.0.1.5, 5.0.1.6, 5.0.1.7, 5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 6.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site-Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f",
+                "url": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25922.json b/2021/25xxx/CVE-2021-25922.json
index 69528cbd176..d7c3aff4188 100644
--- a/2021/25xxx/CVE-2021-25922.json
+++ b/2021/25xxx/CVE-2021-25922.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25922",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openemr",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "4.2.0, 4.2.0.3, 4.2.1, 4.2.2, 5.0.0, 5.0.0.5, 5.0.0.6, 5.0.1, 5.0.1.1, 5.0.1.2, 5.0.1.3, 5.0.1.4, 5.0.1.5, 5.0.1.6, 5.0.1.7, 5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 6.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site-Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f",
+                "url": "https://github.com/openemr/openemr/commit/0fadc3e592d84bc9dfe9e0403f8bd6e3c7d8427f"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25922",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25922"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code."
             }
         ]
     }

From a96ed1f38088b071c73b6396b9bf65a47eaf29d1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 21:00:45 +0000
Subject: [PATCH 491/845] "-Synchronized-Data."

---
 2020/25xxx/CVE-2020-25681.json |  5 +++++
 2020/25xxx/CVE-2020-25682.json |  5 +++++
 2020/25xxx/CVE-2020-25683.json |  5 +++++
 2020/25xxx/CVE-2020-25684.json |  5 +++++
 2020/25xxx/CVE-2020-25687.json |  5 +++++
 2021/28xxx/CVE-2021-28976.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28977.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28978.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28979.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28980.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28981.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28982.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28983.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28984.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28985.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28986.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28987.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28988.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28989.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28990.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28991.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28992.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28993.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28994.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28995.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28996.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28997.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28998.json | 18 ++++++++++++++++++
 2021/28xxx/CVE-2021-28999.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29000.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29001.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29002.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29003.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29004.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29005.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29006.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29007.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29008.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29009.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29010.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29011.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29012.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29013.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29014.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29015.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29016.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29017.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29018.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29019.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29020.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29021.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29022.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29023.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29024.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29025.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29026.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29027.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29028.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29029.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29030.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29031.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29032.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29033.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29034.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29035.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29036.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29037.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29038.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29039.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29040.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29041.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29042.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29043.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29044.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29045.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29046.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29047.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29048.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29049.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29050.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29051.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29052.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29053.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29054.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29055.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29056.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29057.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29058.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29059.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29060.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29061.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29062.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29063.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29064.json | 18 ++++++++++++++++++
 2021/3xxx/CVE-2021-3458.json   | 18 ++++++++++++++++++
 2021/3xxx/CVE-2021-3459.json   | 18 ++++++++++++++++++
 96 files changed, 1663 insertions(+)
 create mode 100644 2021/28xxx/CVE-2021-28976.json
 create mode 100644 2021/28xxx/CVE-2021-28977.json
 create mode 100644 2021/28xxx/CVE-2021-28978.json
 create mode 100644 2021/28xxx/CVE-2021-28979.json
 create mode 100644 2021/28xxx/CVE-2021-28980.json
 create mode 100644 2021/28xxx/CVE-2021-28981.json
 create mode 100644 2021/28xxx/CVE-2021-28982.json
 create mode 100644 2021/28xxx/CVE-2021-28983.json
 create mode 100644 2021/28xxx/CVE-2021-28984.json
 create mode 100644 2021/28xxx/CVE-2021-28985.json
 create mode 100644 2021/28xxx/CVE-2021-28986.json
 create mode 100644 2021/28xxx/CVE-2021-28987.json
 create mode 100644 2021/28xxx/CVE-2021-28988.json
 create mode 100644 2021/28xxx/CVE-2021-28989.json
 create mode 100644 2021/28xxx/CVE-2021-28990.json
 create mode 100644 2021/28xxx/CVE-2021-28991.json
 create mode 100644 2021/28xxx/CVE-2021-28992.json
 create mode 100644 2021/28xxx/CVE-2021-28993.json
 create mode 100644 2021/28xxx/CVE-2021-28994.json
 create mode 100644 2021/28xxx/CVE-2021-28995.json
 create mode 100644 2021/28xxx/CVE-2021-28996.json
 create mode 100644 2021/28xxx/CVE-2021-28997.json
 create mode 100644 2021/28xxx/CVE-2021-28998.json
 create mode 100644 2021/28xxx/CVE-2021-28999.json
 create mode 100644 2021/29xxx/CVE-2021-29000.json
 create mode 100644 2021/29xxx/CVE-2021-29001.json
 create mode 100644 2021/29xxx/CVE-2021-29002.json
 create mode 100644 2021/29xxx/CVE-2021-29003.json
 create mode 100644 2021/29xxx/CVE-2021-29004.json
 create mode 100644 2021/29xxx/CVE-2021-29005.json
 create mode 100644 2021/29xxx/CVE-2021-29006.json
 create mode 100644 2021/29xxx/CVE-2021-29007.json
 create mode 100644 2021/29xxx/CVE-2021-29008.json
 create mode 100644 2021/29xxx/CVE-2021-29009.json
 create mode 100644 2021/29xxx/CVE-2021-29010.json
 create mode 100644 2021/29xxx/CVE-2021-29011.json
 create mode 100644 2021/29xxx/CVE-2021-29012.json
 create mode 100644 2021/29xxx/CVE-2021-29013.json
 create mode 100644 2021/29xxx/CVE-2021-29014.json
 create mode 100644 2021/29xxx/CVE-2021-29015.json
 create mode 100644 2021/29xxx/CVE-2021-29016.json
 create mode 100644 2021/29xxx/CVE-2021-29017.json
 create mode 100644 2021/29xxx/CVE-2021-29018.json
 create mode 100644 2021/29xxx/CVE-2021-29019.json
 create mode 100644 2021/29xxx/CVE-2021-29020.json
 create mode 100644 2021/29xxx/CVE-2021-29021.json
 create mode 100644 2021/29xxx/CVE-2021-29022.json
 create mode 100644 2021/29xxx/CVE-2021-29023.json
 create mode 100644 2021/29xxx/CVE-2021-29024.json
 create mode 100644 2021/29xxx/CVE-2021-29025.json
 create mode 100644 2021/29xxx/CVE-2021-29026.json
 create mode 100644 2021/29xxx/CVE-2021-29027.json
 create mode 100644 2021/29xxx/CVE-2021-29028.json
 create mode 100644 2021/29xxx/CVE-2021-29029.json
 create mode 100644 2021/29xxx/CVE-2021-29030.json
 create mode 100644 2021/29xxx/CVE-2021-29031.json
 create mode 100644 2021/29xxx/CVE-2021-29032.json
 create mode 100644 2021/29xxx/CVE-2021-29033.json
 create mode 100644 2021/29xxx/CVE-2021-29034.json
 create mode 100644 2021/29xxx/CVE-2021-29035.json
 create mode 100644 2021/29xxx/CVE-2021-29036.json
 create mode 100644 2021/29xxx/CVE-2021-29037.json
 create mode 100644 2021/29xxx/CVE-2021-29038.json
 create mode 100644 2021/29xxx/CVE-2021-29039.json
 create mode 100644 2021/29xxx/CVE-2021-29040.json
 create mode 100644 2021/29xxx/CVE-2021-29041.json
 create mode 100644 2021/29xxx/CVE-2021-29042.json
 create mode 100644 2021/29xxx/CVE-2021-29043.json
 create mode 100644 2021/29xxx/CVE-2021-29044.json
 create mode 100644 2021/29xxx/CVE-2021-29045.json
 create mode 100644 2021/29xxx/CVE-2021-29046.json
 create mode 100644 2021/29xxx/CVE-2021-29047.json
 create mode 100644 2021/29xxx/CVE-2021-29048.json
 create mode 100644 2021/29xxx/CVE-2021-29049.json
 create mode 100644 2021/29xxx/CVE-2021-29050.json
 create mode 100644 2021/29xxx/CVE-2021-29051.json
 create mode 100644 2021/29xxx/CVE-2021-29052.json
 create mode 100644 2021/29xxx/CVE-2021-29053.json
 create mode 100644 2021/29xxx/CVE-2021-29054.json
 create mode 100644 2021/29xxx/CVE-2021-29055.json
 create mode 100644 2021/29xxx/CVE-2021-29056.json
 create mode 100644 2021/29xxx/CVE-2021-29057.json
 create mode 100644 2021/29xxx/CVE-2021-29058.json
 create mode 100644 2021/29xxx/CVE-2021-29059.json
 create mode 100644 2021/29xxx/CVE-2021-29060.json
 create mode 100644 2021/29xxx/CVE-2021-29061.json
 create mode 100644 2021/29xxx/CVE-2021-29062.json
 create mode 100644 2021/29xxx/CVE-2021-29063.json
 create mode 100644 2021/29xxx/CVE-2021-29064.json
 create mode 100644 2021/3xxx/CVE-2021-3458.json
 create mode 100644 2021/3xxx/CVE-2021-3459.json

diff --git a/2020/25xxx/CVE-2020-25681.json b/2020/25xxx/CVE-2020-25681.json
index cfb2ff0b33c..906c5b8d205 100644
--- a/2020/25xxx/CVE-2020-25681.json
+++ b/2020/25xxx/CVE-2020-25681.json
@@ -73,6 +73,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2e4c3d5a9d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25682.json b/2020/25xxx/CVE-2020-25682.json
index b6c6c7694dc..c159986dc83 100644
--- a/2020/25xxx/CVE-2020-25682.json
+++ b/2020/25xxx/CVE-2020-25682.json
@@ -73,6 +73,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2e4c3d5a9d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25683.json b/2020/25xxx/CVE-2020-25683.json
index 291b691530a..5e2d525b1b6 100644
--- a/2020/25xxx/CVE-2020-25683.json
+++ b/2020/25xxx/CVE-2020-25683.json
@@ -73,6 +73,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2e4c3d5a9d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25684.json b/2020/25xxx/CVE-2020-25684.json
index b51582d044d..4e2b6100795 100644
--- a/2020/25xxx/CVE-2020-25684.json
+++ b/2020/25xxx/CVE-2020-25684.json
@@ -73,6 +73,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2e4c3d5a9d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25687.json b/2020/25xxx/CVE-2020-25687.json
index 83eecbba812..993324937ed 100644
--- a/2020/25xxx/CVE-2020-25687.json
+++ b/2020/25xxx/CVE-2020-25687.json
@@ -73,6 +73,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2e4c3d5a9d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28976.json b/2021/28xxx/CVE-2021-28976.json
new file mode 100644
index 00000000000..4b2a8f5f833
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28976.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28976",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28977.json b/2021/28xxx/CVE-2021-28977.json
new file mode 100644
index 00000000000..8880210296d
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28977.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28977",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28978.json b/2021/28xxx/CVE-2021-28978.json
new file mode 100644
index 00000000000..99a542bb02b
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28978.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28978",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28979.json b/2021/28xxx/CVE-2021-28979.json
new file mode 100644
index 00000000000..a8c730471ee
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28979.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28979",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28980.json b/2021/28xxx/CVE-2021-28980.json
new file mode 100644
index 00000000000..4065154a0b8
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28980.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28980",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28981.json b/2021/28xxx/CVE-2021-28981.json
new file mode 100644
index 00000000000..c56af71488b
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28981.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28981",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28982.json b/2021/28xxx/CVE-2021-28982.json
new file mode 100644
index 00000000000..52ac06c90a4
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28982.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28982",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28983.json b/2021/28xxx/CVE-2021-28983.json
new file mode 100644
index 00000000000..1b240e44ba2
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28983.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28983",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28984.json b/2021/28xxx/CVE-2021-28984.json
new file mode 100644
index 00000000000..3425a7e7096
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28984.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28984",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28985.json b/2021/28xxx/CVE-2021-28985.json
new file mode 100644
index 00000000000..c430719bb65
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28985.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28985",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28986.json b/2021/28xxx/CVE-2021-28986.json
new file mode 100644
index 00000000000..75e64cd2769
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28986.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28986",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28987.json b/2021/28xxx/CVE-2021-28987.json
new file mode 100644
index 00000000000..e46ba52cdc1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28987.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28987",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28988.json b/2021/28xxx/CVE-2021-28988.json
new file mode 100644
index 00000000000..a97f6f150d7
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28988.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28988",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28989.json b/2021/28xxx/CVE-2021-28989.json
new file mode 100644
index 00000000000..603fb7e05d7
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28989.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28989",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28990.json b/2021/28xxx/CVE-2021-28990.json
new file mode 100644
index 00000000000..25ad01a3315
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28990.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28990",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28991.json b/2021/28xxx/CVE-2021-28991.json
new file mode 100644
index 00000000000..e52ca654d63
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28991.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28991",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28992.json b/2021/28xxx/CVE-2021-28992.json
new file mode 100644
index 00000000000..a6b80d68118
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28992.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28992",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28993.json b/2021/28xxx/CVE-2021-28993.json
new file mode 100644
index 00000000000..8d4b8680563
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28993.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28993",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28994.json b/2021/28xxx/CVE-2021-28994.json
new file mode 100644
index 00000000000..a1a5300d952
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28994.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28994",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28995.json b/2021/28xxx/CVE-2021-28995.json
new file mode 100644
index 00000000000..80066b47649
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28995.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28995",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28996.json b/2021/28xxx/CVE-2021-28996.json
new file mode 100644
index 00000000000..09abfe1aaf3
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28996.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28996",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28997.json b/2021/28xxx/CVE-2021-28997.json
new file mode 100644
index 00000000000..ac6f5d1f4e1
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28997.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28997",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28998.json b/2021/28xxx/CVE-2021-28998.json
new file mode 100644
index 00000000000..cdcd2061a4c
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28998.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28998",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28999.json b/2021/28xxx/CVE-2021-28999.json
new file mode 100644
index 00000000000..26c7bb954d7
--- /dev/null
+++ b/2021/28xxx/CVE-2021-28999.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-28999",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29000.json b/2021/29xxx/CVE-2021-29000.json
new file mode 100644
index 00000000000..ea40fbde65e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29000.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29000",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29001.json b/2021/29xxx/CVE-2021-29001.json
new file mode 100644
index 00000000000..b878f996a25
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29001.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29001",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29002.json b/2021/29xxx/CVE-2021-29002.json
new file mode 100644
index 00000000000..49db5b23898
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29002.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29002",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29003.json b/2021/29xxx/CVE-2021-29003.json
new file mode 100644
index 00000000000..fb5f1d0f468
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29003.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29003",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29004.json b/2021/29xxx/CVE-2021-29004.json
new file mode 100644
index 00000000000..a4c90e62d88
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29004.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29004",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29005.json b/2021/29xxx/CVE-2021-29005.json
new file mode 100644
index 00000000000..b060f4a4719
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29005.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29005",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29006.json b/2021/29xxx/CVE-2021-29006.json
new file mode 100644
index 00000000000..728cc41d06e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29006.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29006",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29007.json b/2021/29xxx/CVE-2021-29007.json
new file mode 100644
index 00000000000..3c1e254d7d6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29007.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29007",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29008.json b/2021/29xxx/CVE-2021-29008.json
new file mode 100644
index 00000000000..74dc43fe72f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29008.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29008",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29009.json b/2021/29xxx/CVE-2021-29009.json
new file mode 100644
index 00000000000..fed10ab0b41
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29009.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29009",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29010.json b/2021/29xxx/CVE-2021-29010.json
new file mode 100644
index 00000000000..eb739608a91
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29010.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29010",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29011.json b/2021/29xxx/CVE-2021-29011.json
new file mode 100644
index 00000000000..bd4ad037d9d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29011.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29011",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29012.json b/2021/29xxx/CVE-2021-29012.json
new file mode 100644
index 00000000000..bf844d566a9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29012.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29012",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29013.json b/2021/29xxx/CVE-2021-29013.json
new file mode 100644
index 00000000000..74c32f825f7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29013.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29013",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29014.json b/2021/29xxx/CVE-2021-29014.json
new file mode 100644
index 00000000000..5e5d4538fc7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29014.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29014",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29015.json b/2021/29xxx/CVE-2021-29015.json
new file mode 100644
index 00000000000..40e4a7e044b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29015.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29015",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29016.json b/2021/29xxx/CVE-2021-29016.json
new file mode 100644
index 00000000000..42ab062709b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29016.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29016",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29017.json b/2021/29xxx/CVE-2021-29017.json
new file mode 100644
index 00000000000..6e85d54b31a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29017.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29017",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29018.json b/2021/29xxx/CVE-2021-29018.json
new file mode 100644
index 00000000000..8d12d44cdc8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29018.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29018",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29019.json b/2021/29xxx/CVE-2021-29019.json
new file mode 100644
index 00000000000..eaceb4b7ef7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29019.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29019",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29020.json b/2021/29xxx/CVE-2021-29020.json
new file mode 100644
index 00000000000..d2a71e91e23
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29020.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29020",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29021.json b/2021/29xxx/CVE-2021-29021.json
new file mode 100644
index 00000000000..b877ec53c04
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29021.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29021",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29022.json b/2021/29xxx/CVE-2021-29022.json
new file mode 100644
index 00000000000..f488c3566e9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29022.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29022",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29023.json b/2021/29xxx/CVE-2021-29023.json
new file mode 100644
index 00000000000..10e653540e3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29023.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29023",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29024.json b/2021/29xxx/CVE-2021-29024.json
new file mode 100644
index 00000000000..44338169523
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29024.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29024",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29025.json b/2021/29xxx/CVE-2021-29025.json
new file mode 100644
index 00000000000..51298dabb47
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29025.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29025",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29026.json b/2021/29xxx/CVE-2021-29026.json
new file mode 100644
index 00000000000..d0b428ccebb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29026.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29026",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29027.json b/2021/29xxx/CVE-2021-29027.json
new file mode 100644
index 00000000000..6195e7d98f3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29027.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29027",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29028.json b/2021/29xxx/CVE-2021-29028.json
new file mode 100644
index 00000000000..6de68dcbb2e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29028.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29028",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29029.json b/2021/29xxx/CVE-2021-29029.json
new file mode 100644
index 00000000000..beacfd49dfc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29029.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29029",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29030.json b/2021/29xxx/CVE-2021-29030.json
new file mode 100644
index 00000000000..c9a2c06ea86
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29030.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29030",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29031.json b/2021/29xxx/CVE-2021-29031.json
new file mode 100644
index 00000000000..62e6c0b2244
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29031.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29031",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29032.json b/2021/29xxx/CVE-2021-29032.json
new file mode 100644
index 00000000000..8cfc8f69cfa
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29032.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29032",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29033.json b/2021/29xxx/CVE-2021-29033.json
new file mode 100644
index 00000000000..7ff623b959b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29033.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29033",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29034.json b/2021/29xxx/CVE-2021-29034.json
new file mode 100644
index 00000000000..d588c71c868
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29034.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29034",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29035.json b/2021/29xxx/CVE-2021-29035.json
new file mode 100644
index 00000000000..ba836398067
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29035.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29035",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29036.json b/2021/29xxx/CVE-2021-29036.json
new file mode 100644
index 00000000000..bc2d892ff05
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29036.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29036",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29037.json b/2021/29xxx/CVE-2021-29037.json
new file mode 100644
index 00000000000..80a23e1b939
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29037.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29037",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29038.json b/2021/29xxx/CVE-2021-29038.json
new file mode 100644
index 00000000000..fda5d775775
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29038.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29038",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29039.json b/2021/29xxx/CVE-2021-29039.json
new file mode 100644
index 00000000000..44e1cc55944
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29039.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29039",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29040.json b/2021/29xxx/CVE-2021-29040.json
new file mode 100644
index 00000000000..2a98b3a8c12
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29040.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29040",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29041.json b/2021/29xxx/CVE-2021-29041.json
new file mode 100644
index 00000000000..f1d639103c7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29041.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29041",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29042.json b/2021/29xxx/CVE-2021-29042.json
new file mode 100644
index 00000000000..4f0b4628aa5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29042.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29042",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29043.json b/2021/29xxx/CVE-2021-29043.json
new file mode 100644
index 00000000000..a68b88a53f8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29043.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29043",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29044.json b/2021/29xxx/CVE-2021-29044.json
new file mode 100644
index 00000000000..34abe342305
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29044.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29044",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29045.json b/2021/29xxx/CVE-2021-29045.json
new file mode 100644
index 00000000000..df1b12fba49
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29045.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29045",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29046.json b/2021/29xxx/CVE-2021-29046.json
new file mode 100644
index 00000000000..39b4f85c41a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29046.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29046",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29047.json b/2021/29xxx/CVE-2021-29047.json
new file mode 100644
index 00000000000..2cfed6aa183
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29047.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29047",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29048.json b/2021/29xxx/CVE-2021-29048.json
new file mode 100644
index 00000000000..4bb09be4d46
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29048.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29048",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29049.json b/2021/29xxx/CVE-2021-29049.json
new file mode 100644
index 00000000000..a54d3680792
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29049.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29049",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29050.json b/2021/29xxx/CVE-2021-29050.json
new file mode 100644
index 00000000000..f31d06fc4e8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29050.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29050",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29051.json b/2021/29xxx/CVE-2021-29051.json
new file mode 100644
index 00000000000..6e7b0905102
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29051.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29051",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29052.json b/2021/29xxx/CVE-2021-29052.json
new file mode 100644
index 00000000000..dcd7a0d9b31
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29052.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29052",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29053.json b/2021/29xxx/CVE-2021-29053.json
new file mode 100644
index 00000000000..8d268e22859
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29053.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29053",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29054.json b/2021/29xxx/CVE-2021-29054.json
new file mode 100644
index 00000000000..5022ba7f652
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29054.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29054",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29055.json b/2021/29xxx/CVE-2021-29055.json
new file mode 100644
index 00000000000..bb65c59dd86
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29055.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29055",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29056.json b/2021/29xxx/CVE-2021-29056.json
new file mode 100644
index 00000000000..e217c246723
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29056.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29056",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29057.json b/2021/29xxx/CVE-2021-29057.json
new file mode 100644
index 00000000000..cac01f93852
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29057.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29057",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29058.json b/2021/29xxx/CVE-2021-29058.json
new file mode 100644
index 00000000000..09c048219d4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29058.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29058",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29059.json b/2021/29xxx/CVE-2021-29059.json
new file mode 100644
index 00000000000..c11021d137a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29059.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29059",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29060.json b/2021/29xxx/CVE-2021-29060.json
new file mode 100644
index 00000000000..523508f45ae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29060.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29060",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29061.json b/2021/29xxx/CVE-2021-29061.json
new file mode 100644
index 00000000000..7edcb06524c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29061.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29061",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29062.json b/2021/29xxx/CVE-2021-29062.json
new file mode 100644
index 00000000000..78e225722d4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29062.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29062",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29063.json b/2021/29xxx/CVE-2021-29063.json
new file mode 100644
index 00000000000..7a0355f585d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29063.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29063",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29064.json b/2021/29xxx/CVE-2021-29064.json
new file mode 100644
index 00000000000..572a2605e8b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29064.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29064",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3458.json b/2021/3xxx/CVE-2021-3458.json
new file mode 100644
index 00000000000..d54f51ae391
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3458.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3458",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3459.json b/2021/3xxx/CVE-2021-3459.json
new file mode 100644
index 00000000000..29f97afe2ee
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3459.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3459",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 8bda24f4ef5abc8a34f8b30bbc267f44556106c9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 22 Mar 2021 22:00:41 +0000
Subject: [PATCH 492/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3460.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/3xxx/CVE-2021-3460.json

diff --git a/2021/3xxx/CVE-2021-3460.json b/2021/3xxx/CVE-2021-3460.json
new file mode 100644
index 00000000000..193f01933fe
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3460.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3460",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From f8532bb0c423a894693522601215255363669ad1 Mon Sep 17 00:00:00 2001
From: "Alan Hartless (he/him)" 
Date: Mon, 22 Mar 2021 17:30:55 -0500
Subject: [PATCH 493/845] Add CVE-2021-27908

---
 2021/27xxx/CVE-2021-27908.json | 89 +++++++++++++++++++++++++++++++---
 1 file changed, 83 insertions(+), 6 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27908.json b/2021/27xxx/CVE-2021-27908.json
index 2ff9175fdae..8962aca76e2 100644
--- a/2021/27xxx/CVE-2021-27908.json
+++ b/2021/27xxx/CVE-2021-27908.json
@@ -1,18 +1,95 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@mautic.org",
+        "DATE_PUBLIC": "2021-03-22T20:15:00.000Z",
         "ID": "CVE-2021-27908",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Mautic",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "3.3.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Mautic"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Discovered by Petr Gregor, Acquia"
+        },
+        {
+            "lang": "eng",
+            "value": "Fixed by Miroslav Fedeles, Acquia"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "LOW",
+            "baseScore": 5.8,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200 Information Exposure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 2b97e1fabac1fff40238a351d9682b08c75b81cd Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:30:45 -0600
Subject: [PATCH 494/845] Add CVE-2021-21341 for GHSA-2p3x-qw9c-25hh

---
 2021/21xxx/CVE-2021-21341.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21341.json b/2021/21xxx/CVE-2021-21341.json
index 3227fe65752..e811f352bd7 100644
--- a/2021/21xxx/CVE-2021-21341.json
+++ b/2021/21xxx/CVE-2021-21341.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21341",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream can cause a Denial of Service"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n\n"
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.5,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400 Uncontrolled Resource Consumption"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21341.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21341.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-2p3x-qw9c-25hh",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 385cfbf563716b1396f87bd23ed278f6e577461c Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:31:24 -0600
Subject: [PATCH 495/845] Add CVE-2021-21342 for GHSA-hvv8-336g-rx3m

---
 2021/21xxx/CVE-2021-21342.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21342.json b/2021/21xxx/CVE-2021-21342.json
index bad68f84bc5..8a6e58d179c 100644
--- a/2021/21xxx/CVE-2021-21342.json
+++ b/2021/21xxx/CVE-2021-21342.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21342",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information.  An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-918 Server-Side Request Forgery (SSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21342.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21342.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-hvv8-336g-rx3m",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 7294821b152741f5f91292aded99fa626b51bea8 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:32:09 -0600
Subject: [PATCH 496/845] Add CVE-2021-21343 for GHSA-74cv-f58x-f9wf

---
 2021/21xxx/CVE-2021-21343.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21343.json b/2021/21xxx/CVE-2021-21343.json
index 017223a8c95..9c2d1763991 100644
--- a/2021/21xxx/CVE-2021-21343.json
+++ b/2021/21xxx/CVE-2021-21343.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21343",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects.  XStream creates therefore new instances based on these type information.  An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-73 External Control of File Name or Path"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21343.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21343.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-74cv-f58x-f9wf",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 577708411eebbea3ebb10b99ba5f89e36416a6b2 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:32:37 -0600
Subject: [PATCH 497/845] Add CVE-2021-21344 for GHSA-59jw-jqf4-3wq3

---
 2021/21xxx/CVE-2021-21344.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21344.json b/2021/21xxx/CVE-2021-21344.json
index 4428c423d3d..8ebe5b85b29 100644
--- a/2021/21xxx/CVE-2021-21344.json
+++ b/2021/21xxx/CVE-2021-21344.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21344",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21344.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21344.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-59jw-jqf4-3wq3",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 4075dca3fdbbad1dbcac049d471229148d715c60 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:33:07 -0600
Subject: [PATCH 498/845] Add CVE-2021-21345 for GHSA-hwpc-8xqv-jvj4

---
 2021/21xxx/CVE-2021-21345.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21345.json b/2021/21xxx/CVE-2021-21345.json
index ddb411b2098..c9dad3a88bc 100644
--- a/2021/21xxx/CVE-2021-21345.json
+++ b/2021/21xxx/CVE-2021-21345.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21345",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to a Remote Command Execution attack"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.8,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21345.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21345.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-hwpc-8xqv-jvj4",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From b608f170cfa992f81290b7b3d59f42225b16caf5 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:33:46 -0600
Subject: [PATCH 499/845] Add CVE-2021-21346 for GHSA-4hrm-m67v-5cxr

---
 2021/21xxx/CVE-2021-21346.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21346.json b/2021/21xxx/CVE-2021-21346.json
index c5a147b5c18..186a162c100 100644
--- a/2021/21xxx/CVE-2021-21346.json
+++ b/2021/21xxx/CVE-2021-21346.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21346",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21346.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21346.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-4hrm-m67v-5cxr",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 1cc1dec22324250d6252d30c9266926abf14f89b Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:34:22 -0600
Subject: [PATCH 500/845] Add CVE-2021-21347 for GHSA-qpfq-ph7r-qv6f

---
 2021/21xxx/CVE-2021-21347.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21347.json b/2021/21xxx/CVE-2021-21347.json
index 158049e59ea..0f03dc2b152 100644
--- a/2021/21xxx/CVE-2021-21347.json
+++ b/2021/21xxx/CVE-2021-21347.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21347",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21347.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21347.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-qpfq-ph7r-qv6f",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 8e7a0bc2cfa189682140a8fb0b8e663d0b399855 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:35:02 -0600
Subject: [PATCH 501/845] Add CVE-2021-21348 for GHSA-56p8-3fh9-4cvq

---
 2021/21xxx/CVE-2021-21348.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21348.json b/2021/21xxx/CVE-2021-21348.json
index 33cccf250b7..ec4b89f38f2 100644
--- a/2021/21xxx/CVE-2021-21348.json
+++ b/2021/21xxx/CVE-2021-21348.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21348",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos)"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400 Uncontrolled Resource Consumption"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21348.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21348.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-56p8-3fh9-4cvq",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 9db7afe47013d523beae5d7ca5980cec059564ec Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:35:30 -0600
Subject: [PATCH 502/845] Add CVE-2021-21349 for GHSA-f6hm-88x3-mfjv

---
 2021/21xxx/CVE-2021-21349.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21349.json b/2021/21xxx/CVE-2021-21349.json
index 400ef27cd19..a11c6c7e608 100644
--- a/2021/21xxx/CVE-2021-21349.json
+++ b/2021/21xxx/CVE-2021-21349.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21349",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-918 Server-Side Request Forgery (SSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21349.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21349.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-f6hm-88x3-mfjv",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 833417bdc608902793110f57be6f5d9a150f1860 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:36:01 -0600
Subject: [PATCH 503/845] Add CVE-2021-21350 for GHSA-43gc-mjxg-gvrq

---
 2021/21xxx/CVE-2021-21350.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21350.json b/2021/21xxx/CVE-2021-21350.json
index b5e31a47803..cdca98b5b6a 100644
--- a/2021/21xxx/CVE-2021-21350.json
+++ b/2021/21xxx/CVE-2021-21350.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21350",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21350.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21350.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-43gc-mjxg-gvrq",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From ebea829c197d0f5c14cf8691e7ae9982638fa7c3 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 17:36:27 -0600
Subject: [PATCH 504/845] Add CVE-2021-21351 for GHSA-hrcp-8f3q-4w2c

---
 2021/21xxx/CVE-2021-21351.json | 100 +++++++++++++++++++++++++++++++--
 1 file changed, 94 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21351.json b/2021/21xxx/CVE-2021-21351.json
index a3e5074d296..8865c260d47 100644
--- a/2021/21xxx/CVE-2021-21351.json
+++ b/2021/21xxx/CVE-2021-21351.json
@@ -1,18 +1,106 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21351",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xstream",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.4.16"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "x-stream"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502 Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c"
+            },
+            {
+                "name": "https://x-stream.github.io/security.html#workaround",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/security.html#workaround"
+            },
+            {
+                "name": "http://x-stream.github.io/changes.html#1.4.16",
+                "refsource": "MISC",
+                "url": "http://x-stream.github.io/changes.html#1.4.16"
+            },
+            {
+                "name": "https://x-stream.github.io/CVE-2021-21351.html",
+                "refsource": "MISC",
+                "url": "https://x-stream.github.io/CVE-2021-21351.html"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-hrcp-8f3q-4w2c",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 073583941c959e0a35344506e563f0243cd1806c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 00:00:43 +0000
Subject: [PATCH 505/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27918.json |  5 +++++
 2020/9xxx/CVE-2020-9947.json   |  5 +++++
 2021/21xxx/CVE-2021-21341.json | 12 ++++++------
 2021/21xxx/CVE-2021-21342.json | 12 ++++++------
 2021/21xxx/CVE-2021-21343.json | 12 ++++++------
 2021/21xxx/CVE-2021-21344.json | 10 +++++-----
 2021/21xxx/CVE-2021-21345.json | 10 +++++-----
 2021/21xxx/CVE-2021-21346.json | 10 +++++-----
 2021/21xxx/CVE-2021-21348.json | 10 +++++-----
 2021/21xxx/CVE-2021-21349.json | 10 +++++-----
 2021/21xxx/CVE-2021-21350.json | 10 +++++-----
 2021/21xxx/CVE-2021-21351.json | 10 +++++-----
 12 files changed, 63 insertions(+), 53 deletions(-)

diff --git a/2020/27xxx/CVE-2020-27918.json b/2020/27xxx/CVE-2020-27918.json
index 858bfbe5a12..0be79e1584a 100644
--- a/2020/27xxx/CVE-2020-27918.json
+++ b/2020/27xxx/CVE-2020-27918.json
@@ -161,6 +161,11 @@
                 "refsource": "FULLDISC",
                 "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
                 "url": "http://seclists.org/fulldisclosure/2020/Dec/32"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9947.json b/2020/9xxx/CVE-2020-9947.json
index 90ac3991308..28f1883a1d9 100644
--- a/2020/9xxx/CVE-2020-9947.json
+++ b/2020/9xxx/CVE-2020-9947.json
@@ -129,6 +129,11 @@
                 "refsource": "MISC",
                 "url": "https://support.apple.com/en-us/HT211845",
                 "name": "https://support.apple.com/en-us/HT211845"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21341.json b/2021/21xxx/CVE-2021-21341.json
index e811f352bd7..cea9ac727f3 100644
--- a/2021/21xxx/CVE-2021-21341.json
+++ b/2021/21xxx/CVE-2021-21341.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n\n"
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
     },
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21341.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21342.json b/2021/21xxx/CVE-2021-21342.json
index 8a6e58d179c..9c3e7b50ef2 100644
--- a/2021/21xxx/CVE-2021-21342.json
+++ b/2021/21xxx/CVE-2021-21342.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information.  An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
     },
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21342.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21343.json b/2021/21xxx/CVE-2021-21343.json
index 9c2d1763991..5bd8b7f12d2 100644
--- a/2021/21xxx/CVE-2021-21343.json
+++ b/2021/21xxx/CVE-2021-21343.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects.  XStream creates therefore new instances based on these type information.  An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
+                "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16."
             }
         ]
     },
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21343.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21344.json b/2021/21xxx/CVE-2021-21344.json
index 8ebe5b85b29..084f83f0d2d 100644
--- a/2021/21xxx/CVE-2021-21344.json
+++ b/2021/21xxx/CVE-2021-21344.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21344.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21345.json b/2021/21xxx/CVE-2021-21345.json
index c9dad3a88bc..510bbdbcbd9 100644
--- a/2021/21xxx/CVE-2021-21345.json
+++ b/2021/21xxx/CVE-2021-21345.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21345.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21346.json b/2021/21xxx/CVE-2021-21346.json
index 186a162c100..cb35f1395b5 100644
--- a/2021/21xxx/CVE-2021-21346.json
+++ b/2021/21xxx/CVE-2021-21346.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21346.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21348.json b/2021/21xxx/CVE-2021-21348.json
index ec4b89f38f2..c8060c8d21f 100644
--- a/2021/21xxx/CVE-2021-21348.json
+++ b/2021/21xxx/CVE-2021-21348.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21348.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21349.json b/2021/21xxx/CVE-2021-21349.json
index a11c6c7e608..997a29ab1f6 100644
--- a/2021/21xxx/CVE-2021-21349.json
+++ b/2021/21xxx/CVE-2021-21349.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21349.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21350.json b/2021/21xxx/CVE-2021-21350.json
index cdca98b5b6a..56378ff4a4e 100644
--- a/2021/21xxx/CVE-2021-21350.json
+++ b/2021/21xxx/CVE-2021-21350.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21350.html",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21351.json b/2021/21xxx/CVE-2021-21351.json
index 8865c260d47..1f6fba28e1f 100644
--- a/2021/21xxx/CVE-2021-21351.json
+++ b/2021/21xxx/CVE-2021-21351.json
@@ -77,11 +77,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c"
-            },
             {
                 "name": "https://x-stream.github.io/security.html#workaround",
                 "refsource": "MISC",
@@ -92,6 +87,11 @@
                 "refsource": "MISC",
                 "url": "http://x-stream.github.io/changes.html#1.4.16"
             },
+            {
+                "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c"
+            },
             {
                 "name": "https://x-stream.github.io/CVE-2021-21351.html",
                 "refsource": "MISC",

From 509203a60196c358bff760329e972a65bac55cc4 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:43:17 -0600
Subject: [PATCH 506/845] Add CVE-2021-21338 for GHSA-4jhw-2p6j-5wmp

---
 2021/21xxx/CVE-2021-21338.json | 102 +++++++++++++++++++++++++++++++--
 1 file changed, 96 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21338.json b/2021/21xxx/CVE-2021-21338.json
index 2dde050db88..a3adfe07249 100644
--- a/2021/21xxx/CVE-2021-21338.json
+++ b/2021/21xxx/CVE-2021-21338.json
@@ -1,18 +1,108 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21338",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Open Redirection in Login Handling"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 6.2.0, <= 6.2.56"
+                                        },
+                                        {
+                                            "version_value": ">= 7.0.0, <= 7.6.50"
+                                        },
+                                        {
+                                            "version_value": ">= 8.0.0, <= 8.7.39"
+                                        },
+                                        {
+                                            "version_value": ">= 9.0.0, <= 9.5.24"
+                                        },
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 it has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. This is fixed in versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 4.7,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-601 URL Redirection to Untrusted Site ('Open Redirect')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-core",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-core"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-001",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-001"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-4jhw-2p6j-5wmp",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 57cc30d45e4b7f0470d4368bf9d36b0e0371c06a Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:44:55 -0600
Subject: [PATCH 507/845] Add CVE-2021-21339 for GHSA-qx3w-4864-94ch

---
 2021/21xxx/CVE-2021-21339.json | 102 +++++++++++++++++++++++++++++++--
 1 file changed, 96 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21339.json b/2021/21xxx/CVE-2021-21339.json
index 2af25b495c5..4dddf3cae28 100644
--- a/2021/21xxx/CVE-2021-21339.json
+++ b/2021/21xxx/CVE-2021-21339.json
@@ -1,18 +1,108 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21339",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cleartext storage of session identifier"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 6.2.0, <= 6.2.56"
+                                        },
+                                        {
+                                            "version_value": ">= 7.0.0, <= 7.6.50"
+                                        },
+                                        {
+                                            "version_value": ">= 8.0.0, <= 8.7.39"
+                                        },
+                                        {
+                                            "version_value": ">= 9.0.0, <= 9.5.24"
+                                        },
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 user session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. This is fixed in versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.9,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-312: Cleartext Storage of Sensitive Information"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-core",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-core"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-006",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-006"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-qx3w-4864-94ch",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 7d845a1b4c2f3b5d862946892333d89a856543a0 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:45:57 -0600
Subject: [PATCH 508/845] Add CVE-2021-21340 for GHSA-fjh3-g8gq-9q92

---
 2021/21xxx/CVE-2021-21340.json | 90 +++++++++++++++++++++++++++++++---
 1 file changed, 84 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21340.json b/2021/21xxx/CVE-2021-21340.json
index f7123f9c60f..ccfde976325 100644
--- a/2021/21xxx/CVE-2021-21340.json
+++ b/2021/21xxx/CVE-2021-21340.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21340",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cross-Site Scripting in Content Preview"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 10.4.14, 11.1.1 it has been discovered that database fields used as _descriptionColumn_ are vulnerable to cross-site scripting when their content gets previewed. A valid backend user account is needed to exploit this vulnerability. This is fixed in versions 10.4.14, 11.1.1 ."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79 Cross-site Scripting (XSS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-fjh3-g8gq-9q92",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-fjh3-g8gq-9q92"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-backend",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-backend"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-007",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-007"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-fjh3-g8gq-9q92",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 5370e49263b609aa272bbcd2181910c048a5d67e Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:47:09 -0600
Subject: [PATCH 509/845] Add CVE-2021-21355 for GHSA-2r6j-862c-m2v2

---
 2021/21xxx/CVE-2021-21355.json | 104 +++++++++++++++++++++++++++++++--
 1 file changed, 98 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21355.json b/2021/21xxx/CVE-2021-21355.json
index 3e06132f1ad..ece5624e89f 100644
--- a/2021/21xxx/CVE-2021-21355.json
+++ b/2021/21xxx/CVE-2021-21355.json
@@ -1,18 +1,110 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21355",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Unrestricted File Upload in Form Framework"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 8.0.0, <= 8.7.39"
+                                        },
+                                        {
+                                            "version_value": ">= 9.0.0, <= 9.5.24"
+                                        },
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 8.7.40, 9.5.25, 10.4.14, 11.1.1, due to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, _UploadedFileReferenceConverter_ transforming uploaded files into proper FileReference domain model objects handles possible file uploads for other extensions as well - given those extensions use the Extbase MVC framework, make use of FileReference items in their direct or inherited domain model definitions and did not implement their own type converter. In case this scenario applies, _UploadedFileReferenceConverter_ accepts any file mime-type and persists files in the default location. In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information. No authentication is required to exploit this vulnerability. This is fixed in versions 8.7.40, 9.5.25, 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "baseScore": 8.6,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-552 Files or Directories Accessible to External Parties"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-form",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-form"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-002",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-002"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-2r6j-862c-m2v2",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 68dd9d835e4a672900d402456cd627c9c966d1d9 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:48:21 -0600
Subject: [PATCH 510/845] Add CVE-2021-21357 for GHSA-3vg7-jw9m-pc3f

---
 2021/21xxx/CVE-2021-21357.json | 112 +++++++++++++++++++++++++++++++--
 1 file changed, 106 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21357.json b/2021/21xxx/CVE-2021-21357.json
index 3159a4b8c28..82db9b7f7c7 100644
--- a/2021/21xxx/CVE-2021-21357.json
+++ b/2021/21xxx/CVE-2021-21357.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21357",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Broken Access Control in Form Framework"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 8.0.0, <= 8.7.39"
+                                        },
+                                        {
+                                            "version_value": ">= 9.0.0, <= 9.5.24"
+                                        },
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework. In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation. A valid backend user account with access to the form module is needed to exploit this vulnerability. This is fixed in versions 8.7.40, 9.5.25, 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.3,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20 Improper Input Validation"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-form",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-form"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-003",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-003"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-3vg7-jw9m-pc3f",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 8fc0bb9bc0e1aaffaeaae34f2c88dc891ce178f1 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:49:33 -0600
Subject: [PATCH 511/845] Add CVE-2021-21358 for GHSA-x79j-wgqv-g8h2

---
 2021/21xxx/CVE-2021-21358.json | 90 +++++++++++++++++++++++++++++++---
 1 file changed, 84 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21358.json b/2021/21xxx/CVE-2021-21358.json
index 0506ad2264d..32d16bba088 100644
--- a/2021/21xxx/CVE-2021-21358.json
+++ b/2021/21xxx/CVE-2021-21358.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21358",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 10.2.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 10.4.14, 11.1.1 it has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. This is fixed in versions 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79 Cross-site Scripting (XSS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-form",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-form"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-004",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-004"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-x79j-wgqv-g8h2",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 0c7e31ba96ed974b68434eb8c7bd3823b428c656 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:50:50 -0600
Subject: [PATCH 512/845] Add CVE-2021-21359 for GHSA-4p9g-qgx9-397p

---
 2021/21xxx/CVE-2021-21359.json | 101 +++++++++++++++++++++++++++++++--
 1 file changed, 95 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21359.json b/2021/21xxx/CVE-2021-21359.json
index f05adb8e85c..29eda67e90a 100644
--- a/2021/21xxx/CVE-2021-21359.json
+++ b/2021/21xxx/CVE-2021-21359.json
@@ -1,18 +1,107 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21359",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Denial of Service in Page Error Handling"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 9.0.0, <= 9.5.24"
+                                        },
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.25, 10.4.14, 11.1.1 requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content  to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. This is fixed in versions 9.5.25, 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 5.9,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-674 Uncontrolled Recursion"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-405 Asymmetric Resource Consumption (Amplification)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-core",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-core"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-005",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-005"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-4p9g-qgx9-397p",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From a8998a5adfe48209037778ec8cc8e88481b35aff Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Mon, 22 Mar 2021 19:52:05 -0600
Subject: [PATCH 513/845] Add CVE-2021-21370 for GHSA-x7hc-x7fm-f7qh

---
 2021/21xxx/CVE-2021-21370.json | 99 +++++++++++++++++++++++++++++++---
 1 file changed, 93 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21370.json b/2021/21xxx/CVE-2021-21370.json
index 3c4bf7b6b43..b237ebc71da 100644
--- a/2021/21xxx/CVE-2021-21370.json
+++ b/2021/21xxx/CVE-2021-21370.json
@@ -1,18 +1,105 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21370",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cross-Site Scripting in Content Preview (CType menu)"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TYPO3.CMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 7.0.0, <= 7.6.50"
+                                        },
+                                        {
+                                            "version_value": ">= 8.0.0, <= 8.7.39"
+                                        },
+                                        {
+                                            "version_value": ">= 9.0.0, <= 9.5.24"
+                                        },
+                                        {
+                                            "version_value": ">= 10.0.0, <= 10.4.13"
+                                        },
+                                        {
+                                            "version_value": ">= 11.0.0, <= 11.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TYPO3"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 it has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability. This is fixed in versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79 Cross-site Scripting (XSS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh"
+            },
+            {
+                "name": "https://packagist.org/packages/typo3/cms-backend",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/typo3/cms-backend"
+            },
+            {
+                "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-008",
+                "refsource": "MISC",
+                "url": "https://typo3.org/security/advisory/typo3-core-sa-2021-008"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-x7hc-x7fm-f7qh",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 51ba8b03d046f1d969513bb2063280dc11645c78 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 02:00:42 +0000
Subject: [PATCH 514/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21357.json | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21357.json b/2021/21xxx/CVE-2021-21357.json
index 82db9b7f7c7..d24f437be20 100644
--- a/2021/21xxx/CVE-2021-21357.json
+++ b/2021/21xxx/CVE-2021-21357.json
@@ -94,16 +94,16 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f"
-            },
             {
                 "name": "https://packagist.org/packages/typo3/cms-form",
                 "refsource": "MISC",
                 "url": "https://packagist.org/packages/typo3/cms-form"
             },
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f"
+            },
             {
                 "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-003",
                 "refsource": "MISC",

From d4e66fffce04ad4a5ca03d2980c34aeee3dedf2e Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 03:00:41 +0000
Subject: [PATCH 515/845] "-Synchronized-Data."

---
 2020/16xxx/CVE-2020-16269.json |  5 +++++
 2020/17xxx/CVE-2020-17487.json |  5 +++++
 2020/28xxx/CVE-2020-28591.json |  5 +++++
 2020/28xxx/CVE-2020-28601.json |  5 +++++
 2020/28xxx/CVE-2020-28636.json |  5 +++++
 2020/35xxx/CVE-2020-35628.json |  5 +++++
 2020/35xxx/CVE-2020-35636.json |  5 +++++
 2021/20xxx/CVE-2021-20279.json |  5 +++++
 2021/20xxx/CVE-2021-20280.json |  5 +++++
 2021/20xxx/CVE-2021-20281.json |  5 +++++
 2021/20xxx/CVE-2021-20282.json |  5 +++++
 2021/20xxx/CVE-2021-20283.json |  5 +++++
 2021/21xxx/CVE-2021-21339.json | 10 +++++-----
 2021/21xxx/CVE-2021-21355.json | 10 +++++-----
 2021/21xxx/CVE-2021-21359.json | 12 ++++++------
 2021/21xxx/CVE-2021-21370.json | 10 +++++-----
 2021/28xxx/CVE-2021-28041.json |  5 +++++
 17 files changed, 86 insertions(+), 21 deletions(-)

diff --git a/2020/16xxx/CVE-2020-16269.json b/2020/16xxx/CVE-2020-16269.json
index 9d06791079a..266a22c202c 100644
--- a/2020/16xxx/CVE-2020-16269.json
+++ b/2020/16xxx/CVE-2020-16269.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e3c95619c1",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45SGGCWFIIV7N2X2QZRREHOW7ODT3IH7/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f3ebd7554c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJET3RR6W7LAK4H6VPTMAZS24W7XYHRZ/"
             }
         ]
     }
diff --git a/2020/17xxx/CVE-2020-17487.json b/2020/17xxx/CVE-2020-17487.json
index 7c2c85d4cda..e58feae1ad3 100644
--- a/2020/17xxx/CVE-2020-17487.json
+++ b/2020/17xxx/CVE-2020-17487.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e3c95619c1",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45SGGCWFIIV7N2X2QZRREHOW7ODT3IH7/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f3ebd7554c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJET3RR6W7LAK4H6VPTMAZS24W7XYHRZ/"
             }
         ]
     }
diff --git a/2020/28xxx/CVE-2020-28591.json b/2020/28xxx/CVE-2020-28591.json
index 69925d96b8c..2174c8201ef 100644
--- a/2020/28xxx/CVE-2020-28591.json
+++ b/2020/28xxx/CVE-2020-28591.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215",
                 "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-70a78ade08",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCSYYURJTUKJSEZIPDAXK4NHRXZMHIVA/"
             }
         ]
     },
diff --git a/2020/28xxx/CVE-2020-28601.json b/2020/28xxx/CVE-2020-28601.json
index 2b1df1daf64..383d5b1fd80 100644
--- a/2020/28xxx/CVE-2020-28601.json
+++ b/2020/28xxx/CVE-2020-28601.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
                 "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-0d42c7cb33",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
             }
         ]
     },
diff --git a/2020/28xxx/CVE-2020-28636.json b/2020/28xxx/CVE-2020-28636.json
index 52276187330..85d71769e22 100644
--- a/2020/28xxx/CVE-2020-28636.json
+++ b/2020/28xxx/CVE-2020-28636.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
                 "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-0d42c7cb33",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
             }
         ]
     },
diff --git a/2020/35xxx/CVE-2020-35628.json b/2020/35xxx/CVE-2020-35628.json
index b7ce6741101..eecd414e33d 100644
--- a/2020/35xxx/CVE-2020-35628.json
+++ b/2020/35xxx/CVE-2020-35628.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
                 "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-0d42c7cb33",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
             }
         ]
     },
diff --git a/2020/35xxx/CVE-2020-35636.json b/2020/35xxx/CVE-2020-35636.json
index 882becfbd5d..8fd41dff236 100644
--- a/2020/35xxx/CVE-2020-35636.json
+++ b/2020/35xxx/CVE-2020-35636.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
                 "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-0d42c7cb33",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20279.json b/2021/20xxx/CVE-2021-20279.json
index e4cbd117b8d..9c0109a109f 100644
--- a/2021/20xxx/CVE-2021-20279.json
+++ b/2021/20xxx/CVE-2021-20279.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-1c27e89d49",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-50f63a0161",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20280.json b/2021/20xxx/CVE-2021-20280.json
index 7d53f78a96e..ea9479d4224 100644
--- a/2021/20xxx/CVE-2021-20280.json
+++ b/2021/20xxx/CVE-2021-20280.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-1c27e89d49",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-50f63a0161",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20281.json b/2021/20xxx/CVE-2021-20281.json
index 2c647c518df..77348257437 100644
--- a/2021/20xxx/CVE-2021-20281.json
+++ b/2021/20xxx/CVE-2021-20281.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-1c27e89d49",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-50f63a0161",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20282.json b/2021/20xxx/CVE-2021-20282.json
index ab84948d2c6..0f6af05f53c 100644
--- a/2021/20xxx/CVE-2021-20282.json
+++ b/2021/20xxx/CVE-2021-20282.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-1c27e89d49",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-50f63a0161",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20283.json b/2021/20xxx/CVE-2021-20283.json
index 7eb24255fe5..bdf48a471ac 100644
--- a/2021/20xxx/CVE-2021-20283.json
+++ b/2021/20xxx/CVE-2021-20283.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-1c27e89d49",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-50f63a0161",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21339.json b/2021/21xxx/CVE-2021-21339.json
index 4dddf3cae28..b3d3fbf3b07 100644
--- a/2021/21xxx/CVE-2021-21339.json
+++ b/2021/21xxx/CVE-2021-21339.json
@@ -84,16 +84,16 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch"
-            },
             {
                 "name": "https://packagist.org/packages/typo3/cms-core",
                 "refsource": "MISC",
                 "url": "https://packagist.org/packages/typo3/cms-core"
             },
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch"
+            },
             {
                 "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-006",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21355.json b/2021/21xxx/CVE-2021-21355.json
index ece5624e89f..5183c622156 100644
--- a/2021/21xxx/CVE-2021-21355.json
+++ b/2021/21xxx/CVE-2021-21355.json
@@ -86,16 +86,16 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2"
-            },
             {
                 "name": "https://packagist.org/packages/typo3/cms-form",
                 "refsource": "MISC",
                 "url": "https://packagist.org/packages/typo3/cms-form"
             },
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2"
+            },
             {
                 "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-002",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21359.json b/2021/21xxx/CVE-2021-21359.json
index 29eda67e90a..367a68b5c99 100644
--- a/2021/21xxx/CVE-2021-21359.json
+++ b/2021/21xxx/CVE-2021-21359.json
@@ -41,7 +41,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.25, 10.4.14, 11.1.1 requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content  to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. This is fixed in versions 9.5.25, 10.4.14, 11.1.1."
+                "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.25, 10.4.14, 11.1.1 requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. This is fixed in versions 9.5.25, 10.4.14, 11.1.1."
             }
         ]
     },
@@ -83,16 +83,16 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p"
-            },
             {
                 "name": "https://packagist.org/packages/typo3/cms-core",
                 "refsource": "MISC",
                 "url": "https://packagist.org/packages/typo3/cms-core"
             },
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p"
+            },
             {
                 "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-005",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21370.json b/2021/21xxx/CVE-2021-21370.json
index b237ebc71da..e6e2c34ec7a 100644
--- a/2021/21xxx/CVE-2021-21370.json
+++ b/2021/21xxx/CVE-2021-21370.json
@@ -81,16 +81,16 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh"
-            },
             {
                 "name": "https://packagist.org/packages/typo3/cms-backend",
                 "refsource": "MISC",
                 "url": "https://packagist.org/packages/typo3/cms-backend"
             },
+            {
+                "name": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh"
+            },
             {
                 "name": "https://typo3.org/security/advisory/typo3-core-sa-2021-008",
                 "refsource": "MISC",
diff --git a/2021/28xxx/CVE-2021-28041.json b/2021/28xxx/CVE-2021-28041.json
index 3cfff0f83ce..a1e8d5723f4 100644
--- a/2021/28xxx/CVE-2021-28041.json
+++ b/2021/28xxx/CVE-2021-28041.json
@@ -71,6 +71,11 @@
                 "url": "https://www.openssh.com/txt/release-8.5",
                 "refsource": "MISC",
                 "name": "https://www.openssh.com/txt/release-8.5"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f68a5a75ba",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXST2CML2MWY3PNVUXX7FFJE3ATJMNVZ/"
             }
         ]
     }

From 0eeff68e8aa491096afdd37edaa009bd68fd7d13 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 04:00:39 +0000
Subject: [PATCH 516/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26701.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2021/26xxx/CVE-2021-26701.json b/2021/26xxx/CVE-2021-26701.json
index 5ccbee30acf..0213d9b12aa 100644
--- a/2021/26xxx/CVE-2021-26701.json
+++ b/2021/26xxx/CVE-2021-26701.json
@@ -79,6 +79,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-904d0bd496",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1b22f31541",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/"
             }
         ]
     }

From 0f8d9b4470b23679ea2227df97029159afcf2988 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 06:00:39 +0000
Subject: [PATCH 517/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27216.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index 93aedf3faf8..586c2280a1a 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -530,6 +530,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210322 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210323 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E"
             }
         ]
     }

From aca1230e5bcd2c9db3bd3581497348b7fc7caac9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 07:00:38 +0000
Subject: [PATCH 518/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29065.json | 18 ++++++++
 2021/29xxx/CVE-2021-29066.json | 18 ++++++++
 2021/29xxx/CVE-2021-29067.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29068.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29069.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29070.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29071.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29072.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29073.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29074.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29075.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29076.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29077.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29078.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29079.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29080.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29081.json | 76 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29082.json | 76 ++++++++++++++++++++++++++++++++++
 18 files changed, 1252 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29065.json
 create mode 100644 2021/29xxx/CVE-2021-29066.json
 create mode 100644 2021/29xxx/CVE-2021-29067.json
 create mode 100644 2021/29xxx/CVE-2021-29068.json
 create mode 100644 2021/29xxx/CVE-2021-29069.json
 create mode 100644 2021/29xxx/CVE-2021-29070.json
 create mode 100644 2021/29xxx/CVE-2021-29071.json
 create mode 100644 2021/29xxx/CVE-2021-29072.json
 create mode 100644 2021/29xxx/CVE-2021-29073.json
 create mode 100644 2021/29xxx/CVE-2021-29074.json
 create mode 100644 2021/29xxx/CVE-2021-29075.json
 create mode 100644 2021/29xxx/CVE-2021-29076.json
 create mode 100644 2021/29xxx/CVE-2021-29077.json
 create mode 100644 2021/29xxx/CVE-2021-29078.json
 create mode 100644 2021/29xxx/CVE-2021-29079.json
 create mode 100644 2021/29xxx/CVE-2021-29080.json
 create mode 100644 2021/29xxx/CVE-2021-29081.json
 create mode 100644 2021/29xxx/CVE-2021-29082.json

diff --git a/2021/29xxx/CVE-2021-29065.json b/2021/29xxx/CVE-2021-29065.json
new file mode 100644
index 00000000000..426e7679f0f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29065.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29065",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29066.json b/2021/29xxx/CVE-2021-29066.json
new file mode 100644
index 00000000000..b28ae396e88
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29066.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29066",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29067.json b/2021/29xxx/CVE-2021-29067.json
new file mode 100644
index 00000000000..92e7171e9b3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29067.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29067",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by authentication bypass. This affects RBW30 before 2.6.2.2, RBS40V before 2.6.2.4, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063017/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0492",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063017/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0492"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29068.json b/2021/29xxx/CVE-2021-29068.json
new file mode 100644
index 00000000000..9b66a45064a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29068.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29068",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R6700v3 before 1.0.4.98, R6400v2 before 1.0.4.98, R7000 before 1.0.11.106, R6900P before 1.3.2.124, R7000P before 1.3.2.124, R7900 before 1.0.4.26, R7850 before 1.0.5.60, R8000 before 1.0.4.58, RS400 before 1.5.0.48, R6400 before 1.0.1.62, R6700 before 1.0.2.16, R6900 before 1.0.2.16, MK60 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, CBR40 before 2.5.0.10, R8000P before 1.4.1.62, R7960P before 1.4.1.62, R7900P before 1.4.1.62, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, EX7500 before 1.0.0.68, EAX80 before 1.0.1.62, EAX20 before 1.0.0.36, RBK752 before 3.2.16.6, RBK753 before 3.2.16.6, RBK753S before 3.2.16.6, RBK754 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBK853 before 3.2.16.6, RBK854 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6850 before 1.1.0.76, R6350 before 1.1.0.76, R6330 before 1.1.0.76, D7800 before 1.0.1.58, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK40 before 2.6.1.36, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK23 before 2.6.1.36, RBR20 before 2.6.1.38, RBS20 before 2.6.1.38, RBK12 before 2.6.1.44, RBK13 before 2.6.1.44, RBK14 before 2.6.1.44, RBK15 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, R6800 before 1.2.0.72, R6900v2 before 1.2.0.72, R6700v2 before 1.2.0.72, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, R7800 before 1.0.2.74, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, XR450 before 2.3.2.66, XR500 before 2.3.2.66, XR700 before 1.0.1.34, and XR300 before 1.0.3.50."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063021/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0155",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063021/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0155"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29069.json b/2021/29xxx/CVE-2021-29069.json
new file mode 100644
index 00000000000..e6786022690
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29069.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29069",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an authenticated user. This affects XR450 before 2.3.2.114, XR500 before 2.3.2.114, and WNR2000v5 before 1.0.0.76."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063023/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2020-0595",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063023/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2020-0595"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AC:H/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:R",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29070.json b/2021/29xxx/CVE-2021-29070.json
new file mode 100644
index 00000000000..98dd00d3d30
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29070.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29070",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063019/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Routers-PSV-2020-0530",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063019/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Routers-PSV-2020-0530"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29071.json b/2021/29xxx/CVE-2021-29071.json
new file mode 100644
index 00000000000..7c4f29ca926
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29071.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29071",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBR752 before 3.2.17.12, RBR753 before 3.2.17.12, RBR753S before 3.2.17.12, RBR754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063008/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0476",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063008/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0476"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29072.json b/2021/29xxx/CVE-2021-29072.json
new file mode 100644
index 00000000000..17e8ff2b171
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29072.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29072",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063018/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0493",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063018/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0493"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29073.json b/2021/29xxx/CVE-2021-29073.json
new file mode 100644
index 00000000000..41b0c64722c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29073.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29073",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R8000P before 1.4.1.66, MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, R7960P before 1.4.1.66, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, and RAX200 before 1.0.3.106."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063013/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2020-0212",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063013/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2020-0212"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:H/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29074.json b/2021/29xxx/CVE-2021-29074.json
new file mode 100644
index 00000000000..7acc71177ed
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29074.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29074",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects RBW30 before 2.6.2.2, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063011/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Routers-PSV-2020-0467",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063011/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Routers-PSV-2020-0467"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29075.json b/2021/29xxx/CVE-2021-29075.json
new file mode 100644
index 00000000000..1ebeb2101f1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29075.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29075",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects RBW30 before 2.6.2.2, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29076.json b/2021/29xxx/CVE-2021-29076.json
new file mode 100644
index 00000000000..047e5a8e13b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29076.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29076",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063015/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0485",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063015/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0485"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29077.json b/2021/29xxx/CVE-2021-29077.json
new file mode 100644
index 00000000000..30ca9c03ac6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29077.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29077",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBW30 before 2.6.2.2, RBS40V before 2.6.2.4, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063016/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0486",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063016/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0486"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29078.json b/2021/29xxx/CVE-2021-29078.json
new file mode 100644
index 00000000000..a8c9935a6d4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29078.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29078",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063009/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0511",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063009/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0511"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29079.json b/2021/29xxx/CVE-2021-29079.json
new file mode 100644
index 00000000000..5ce0350f1bf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29079.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29079",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063020/Security-Advisory-for-Pre-Authentication-Command-Injection-Some-WiFi-Routers-PSV-2020-0470",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063020/Security-Advisory-for-Pre-Authentication-Command-Injection-Some-WiFi-Routers-PSV-2020-0470"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29080.json b/2021/29xxx/CVE-2021-29080.json
new file mode 100644
index 00000000000..2775f7365be
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29080.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29080",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by password reset by an unauthenticated attacker. This affects RBK852 before 3.2.10.11, RBK853 before 3.2.10.11, RBR854 before 3.2.10.11, RBR850 before 3.2.10.11, RBS850 before 3.2.10.11, CBR40 before 2.5.0.10, R7000 before 1.0.11.116, R6900P before 1.3.2.126, R7900 before 1.0.4.38, R7960P before 1.4.1.66, R8000 before 1.0.4.66, R7900P before 1.4.1.66, R8000P before 1.4.1.66, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, and R7000P before 1.3.2.126."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063007/Security-Advisory-for-Pre-authentication-Password-Reset-on-Some-Routers-and-WiFi-Systems-PSV-2019-0150",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063007/Security-Advisory-for-Pre-authentication-Password-Reset-on-Some-Routers-and-WiFi-Systems-PSV-2019-0150"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:N/C:H/I:H/PR:N/S:U/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29081.json b/2021/29xxx/CVE-2021-29081.json
new file mode 100644
index 00000000000..1be41cd39e2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29081.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29081",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects RBW30 before 2.6.2.2, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063012/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0465",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063012/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0465"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29082.json b/2021/29xxx/CVE-2021-29082.json
new file mode 100644
index 00000000000..a4a85e13fca
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29082.json
@@ -0,0 +1,76 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29082",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBW30 before 2.6.1.4, RBS40V before 2.6.1.4, RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBK754 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBK854 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063005/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2020-0037",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063005/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2020-0037"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "LOW",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:L/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file

From aa39b829d54c6accdc85dd83568b677b56aa5804 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 07:00:53 +0000
Subject: [PATCH 519/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29065.json | 70 +++++++++++++++++++++++++++++++---
 2021/29xxx/CVE-2021-29066.json | 70 +++++++++++++++++++++++++++++++---
 2 files changed, 128 insertions(+), 12 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29065.json b/2021/29xxx/CVE-2021-29065.json
index 426e7679f0f..1829cbb577c 100644
--- a/2021/29xxx/CVE-2021-29065.json
+++ b/2021/29xxx/CVE-2021-29065.json
@@ -1,18 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29065",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29065",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "NETGEAR RBR850 devices before 3.2.10.11 are affected by authentication bypass."
             }
         ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063006/Security-Advisory-for-Authentication-Bypass-on-RBR850-PSV-2020-0029",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063006/Security-Advisory-for-Authentication-Bypass-on-RBR850-PSV-2020-0029"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
     }
 }
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29066.json b/2021/29xxx/CVE-2021-29066.json
index b28ae396e88..c9e20c59771 100644
--- a/2021/29xxx/CVE-2021-29066.json
+++ b/2021/29xxx/CVE-2021-29066.json
@@ -1,18 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29066",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29066",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Certain NETGEAR devices are affected by authentication bypass. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12."
             }
         ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000063014/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0484",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000063014/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0484"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "ADJACENT",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N",
+            "version": "3.1"
+        }
     }
 }
\ No newline at end of file

From 38cb9b1b134b2e824a74f38bb30e547e9391ff32 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 09:00:44 +0000
Subject: [PATCH 520/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 2021/27xxx/CVE-2021-27928.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 974d58d6a09..9703cfdd85b 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -124,6 +124,11 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210322 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[santuario-dev] 20210323 [GitHub] [santuario-xml-security-java] dependabot[bot] opened a new pull request #33: Bump dependency-check-maven from 6.1.2 to 6.1.3",
+                "url": "https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4@%3Cdev.santuario.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27928.json b/2021/27xxx/CVE-2021-27928.json
index 967403ee47b..f6ab945523d 100644
--- a/2021/27xxx/CVE-2021-27928.json
+++ b/2021/27xxx/CVE-2021-27928.json
@@ -81,6 +81,11 @@
                 "refsource": "MISC",
                 "name": "https://mariadb.com/kb/en/mariadb-1059-release-notes/",
                 "url": "https://mariadb.com/kb/en/mariadb-1059-release-notes/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2605-1] mariadb-10.1 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html"
             }
         ]
     }

From d7713ecb81d2f803a28c5b637ff4f0befabecc94 Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Tue, 23 Mar 2021 11:57:52 +0200
Subject: [PATCH 521/845] Adds CVE-2020-28503

---
 2020/28xxx/CVE-2020-28503.json | 84 ++++++++++++++++++++++++++++++++--
 1 file changed, 80 insertions(+), 4 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28503.json b/2020/28xxx/CVE-2020-28503.json
index adfff07aae1..ecdbf99b46a 100644
--- a/2020/28xxx/CVE-2020-28503.json
+++ b/2020/28xxx/CVE-2020-28503.json
@@ -3,16 +3,92 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-23T09:57:49.924035Z",
         "ID": "CVE-2020-28503",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Prototype Pollution"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "copy-props",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "2.0.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Prototype Pollution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/gulpjs/copy-props/pull/7"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.\r\n\r\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O",
+            "baseScore": 7.3,
+            "baseSeverity": "HIGH",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "availabilityImpact": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "zpbrent (zhou.peng@shu)"
+        }
+    ]
 }
\ No newline at end of file

From afa520f96d779023cae3eaf1e71d36448e13235c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 10:00:41 +0000
Subject: [PATCH 522/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3461.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/3xxx/CVE-2021-3461.json

diff --git a/2021/3xxx/CVE-2021-3461.json b/2021/3xxx/CVE-2021-3461.json
new file mode 100644
index 00000000000..78ddebc293a
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3461.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3461",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 9dc8fc79d737eabec05410fbd4a6718a0cbace7e Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Tue, 23 Mar 2021 12:11:12 +0200
Subject: [PATCH 523/845] Adds CVE-2021-23361

---
 2021/23xxx/CVE-2021-23361.json | 80 ++++++++++++++++++++++++++++++++--
 1 file changed, 76 insertions(+), 4 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23361.json b/2021/23xxx/CVE-2021-23361.json
index 5c812924dc7..55d369c8581 100644
--- a/2021/23xxx/CVE-2021-23361.json
+++ b/2021/23xxx/CVE-2021-23361.json
@@ -3,16 +3,88 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-23T10:11:10.481864Z",
         "ID": "CVE-2021-23361",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Command Injection"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "fis-kernel",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-FISKERNEL-1088057"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/fex-team/fis-kernel/blob/master/lib/util.js%23L948"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "This affects all versions of package fis-kernel.\n The function util.nohup in fis3 is vulnerable to command injection in non-windows systems (e.g., Linux).\r\n\r\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:F/RL:U/RC:C",
+            "baseScore": 8.6,
+            "baseSeverity": "HIGH",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "LOW",
+            "availabilityImpact": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "zpbrent(zhou.peng@shu)"
+        }
+    ]
 }
\ No newline at end of file

From 6c6aba72ebb3aa90c6d6adc6d816f5cdd574ab76 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 11:00:41 +0000
Subject: [PATCH 524/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28503.json | 17 ++++++++++-------
 2021/23xxx/CVE-2021-23361.json | 12 +++++++-----
 2 files changed, 17 insertions(+), 12 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28503.json b/2020/28xxx/CVE-2020-28503.json
index ecdbf99b46a..f5683a6b6d2 100644
--- a/2020/28xxx/CVE-2020-28503.json
+++ b/2020/28xxx/CVE-2020-28503.json
@@ -48,16 +48,19 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870",
+                "name": "https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047",
+                "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/gulpjs/copy-props/pull/7"
+                "refsource": "MISC",
+                "url": "https://github.com/gulpjs/copy-props/pull/7",
+                "name": "https://github.com/gulpjs/copy-props/pull/7"
             }
         ]
     },
@@ -65,7 +68,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.\r\n\r\n"
+                "value": "The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality."
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23361.json b/2021/23xxx/CVE-2021-23361.json
index 55d369c8581..3e7468900b7 100644
--- a/2021/23xxx/CVE-2021-23361.json
+++ b/2021/23xxx/CVE-2021-23361.json
@@ -48,12 +48,14 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-FISKERNEL-1088057"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-FISKERNEL-1088057",
+                "name": "https://snyk.io/vuln/SNYK-JS-FISKERNEL-1088057"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/fex-team/fis-kernel/blob/master/lib/util.js%23L948"
+                "refsource": "MISC",
+                "url": "https://github.com/fex-team/fis-kernel/blob/master/lib/util.js%23L948",
+                "name": "https://github.com/fex-team/fis-kernel/blob/master/lib/util.js%23L948"
             }
         ]
     },
@@ -61,7 +63,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "This affects all versions of package fis-kernel.\n The function util.nohup in fis3 is vulnerable to command injection in non-windows systems (e.g., Linux).\r\n\r\n"
+                "value": "This affects all versions of package fis-kernel. The function util.nohup in fis3 is vulnerable to command injection in non-windows systems (e.g., Linux)."
             }
         ]
     },

From f2b831464c12fd1768be34085b3ae6acc2d6a2d2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 14:00:39 +0000
Subject: [PATCH 525/845] "-Synchronized-Data."

---
 2018/1xxx/CVE-2018-1320.json   |  5 +++
 2021/27xxx/CVE-2021-27309.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27310.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27526.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27527.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27528.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27529.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27530.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27531.json | 56 ++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27969.json | 71 +++++++++++++++++++++++++++++++---
 10 files changed, 470 insertions(+), 54 deletions(-)

diff --git a/2018/1xxx/CVE-2018-1320.json b/2018/1xxx/CVE-2018-1320.json
index 120fa7885d8..e254f447779 100644
--- a/2018/1xxx/CVE-2018-1320.json
+++ b/2018/1xxx/CVE-2018-1320.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[cassandra-commits] 20200604 [jira] [Created] (CASSANDRA-15856) Security vulnerabilities with dependency jars of Cassandra 3.11.6",
                 "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[cassandra-commits] 20210323 [jira] [Updated] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
+                "url": "https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27309.json b/2021/27xxx/CVE-2021-27309.json
index c81d4cfdf17..194fe7eee1c 100644
--- a/2021/27xxx/CVE-2021-27309.json
+++ b/2021/27xxx/CVE-2021-27309.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27309",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27309",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Clansphere CMS 2011.4 allows unauthenticated reflected XSS via \"module\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md",
+                "url": "https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27310.json b/2021/27xxx/CVE-2021-27310.json
index 1539c94d376..3ae23118f27 100644
--- a/2021/27xxx/CVE-2021-27310.json
+++ b/2021/27xxx/CVE-2021-27310.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27310",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27310",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Clansphere CMS 2011.4 allows unauthenticated reflected XSS via \"language\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md",
+                "url": "https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27526.json b/2021/27xxx/CVE-2021-27526.json
index 33f55525064..7648bb73656 100644
--- a/2021/27xxx/CVE-2021-27526.json
+++ b/2021/27xxx/CVE-2021-27526.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27526",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27526",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the \"page\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20page%20parameter",
+                "url": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20page%20parameter"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27527.json b/2021/27xxx/CVE-2021-27527.json
index 24beb0058ba..f0dfc6ce46f 100644
--- a/2021/27xxx/CVE-2021-27527.json
+++ b/2021/27xxx/CVE-2021-27527.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27527",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27527",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the \"valueID\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20valueID%20parameter",
+                "url": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20valueID%20parameter"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27528.json b/2021/27xxx/CVE-2021-27528.json
index d3bcac55029..51ff4dc2c65 100644
--- a/2021/27xxx/CVE-2021-27528.json
+++ b/2021/27xxx/CVE-2021-27528.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27528",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27528",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the \"refID\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20refID%20parameter",
+                "url": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20refID%20parameter"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27529.json b/2021/27xxx/CVE-2021-27529.json
index 2ba7907f3b0..45d893f96bf 100644
--- a/2021/27xxx/CVE-2021-27529.json
+++ b/2021/27xxx/CVE-2021-27529.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27529",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27529",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the \"limit\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20limit%20parameter",
+                "url": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20limit%20parameter"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27530.json b/2021/27xxx/CVE-2021-27530.json
index cc8e586613d..037dda1592c 100644
--- a/2021/27xxx/CVE-2021-27530.json
+++ b/2021/27xxx/CVE-2021-27530.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27530",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27530",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allow remote attacker to inject javascript via URI in /index.php."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20index.php%20URI",
+                "url": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20index.php%20URI"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27531.json b/2021/27xxx/CVE-2021-27531.json
index 2073bea675f..e4436c13501 100644
--- a/2021/27xxx/CVE-2021-27531.json
+++ b/2021/27xxx/CVE-2021-27531.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27531",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27531",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the \"query\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20query%20parameter",
+                "url": "https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20query%20parameter"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27969.json b/2021/27xxx/CVE-2021-27969.json
index 28c438a2ee6..407c3adad83 100644
--- a/2021/27xxx/CVE-2021-27969.json
+++ b/2021/27xxx/CVE-2021-27969.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27969",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27969",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Dolphin CMS 7.4.2 is vulnerable to stored XSS via the Page Builder \"width\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "http://boonex.com",
+                "refsource": "MISC",
+                "name": "http://boonex.com"
+            },
+            {
+                "url": "https://drive.google.com/file/d/1suqBvuoE-3U2QmWpCOXXV4_5rEu_XGJL/view?usp=sharing",
+                "refsource": "MISC",
+                "name": "https://drive.google.com/file/d/1suqBvuoE-3U2QmWpCOXXV4_5rEu_XGJL/view?usp=sharing"
+            },
+            {
+                "url": "https://www.softaculous.com/demos/Dolphin",
+                "refsource": "MISC",
+                "name": "https://www.softaculous.com/demos/Dolphin"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.exploit-db.com/exploits/49670",
+                "url": "https://www.exploit-db.com/exploits/49670"
             }
         ]
     }

From 488ace7bb86091038f2dc2674e3bcd6a23634e19 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 23 Mar 2021 09:22:13 -0600
Subject: [PATCH 526/845] Add CVE-2021-21376 for GHSA-gfp2-w5jm-955q

---
 2021/21xxx/CVE-2021-21376.json | 97 +++++++++++++++++++++++++++++++---
 1 file changed, 91 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21376.json b/2021/21xxx/CVE-2021-21376.json
index 0c81b24e2f9..5c8ef627605 100644
--- a/2021/21xxx/CVE-2021-21376.json
+++ b/2021/21xxx/CVE-2021-21376.json
@@ -1,18 +1,103 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21376",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Information Exposure in OMERO.web"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "omero-web",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 5.9.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "ome"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200 Information Exposure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q"
+            },
+            {
+                "name": "https://pypi.org/project/omero-web/",
+                "refsource": "MISC",
+                "url": "https://pypi.org/project/omero-web/"
+            },
+            {
+                "name": "https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021",
+                "refsource": "MISC",
+                "url": "https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021"
+            },
+            {
+                "name": "https://www.openmicroscopy.org/security/advisories/2021-SV1/",
+                "refsource": "MISC",
+                "url": "https://www.openmicroscopy.org/security/advisories/2021-SV1/"
+            },
+            {
+                "name": "https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c",
+                "refsource": "MISC",
+                "url": "https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-gfp2-w5jm-955q",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 7c4a3f05f0ff021d9f5b46d7029d0f05ef4634a0 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 23 Mar 2021 09:23:00 -0600
Subject: [PATCH 527/845] Add CVE-2021-21377 for GHSA-g4rf-pc26-6hmr

---
 2021/21xxx/CVE-2021-21377.json | 97 +++++++++++++++++++++++++++++++---
 1 file changed, 91 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21377.json b/2021/21xxx/CVE-2021-21377.json
index 6be0c2e3558..4ce6a6a9758 100644
--- a/2021/21xxx/CVE-2021-21377.json
+++ b/2021/21xxx/CVE-2021-21377.json
@@ -1,18 +1,103 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21377",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Open Redirect in OMERO.web"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "omero-web",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 5.9.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "ome"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 4.8,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-601 URL Redirection to Untrusted Site ('Open Redirect')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr"
+            },
+            {
+                "name": "https://pypi.org/project/omero-web/",
+                "refsource": "MISC",
+                "url": "https://pypi.org/project/omero-web/"
+            },
+            {
+                "name": "https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021",
+                "refsource": "MISC",
+                "url": "https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021"
+            },
+            {
+                "name": "https://www.openmicroscopy.org/security/advisories/2021-SV2/",
+                "refsource": "MISC",
+                "url": "https://www.openmicroscopy.org/security/advisories/2021-SV2/"
+            },
+            {
+                "name": "https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c",
+                "refsource": "MISC",
+                "url": "https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-g4rf-pc26-6hmr",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From bf21e25c0e531c6203d42acbfe0bcfc9dd61c184 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 16:00:44 +0000
Subject: [PATCH 528/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21377.json | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21377.json b/2021/21xxx/CVE-2021-21377.json
index 4ce6a6a9758..61ac244c2d5 100644
--- a/2021/21xxx/CVE-2021-21377.json
+++ b/2021/21xxx/CVE-2021-21377.json
@@ -69,11 +69,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr"
-            },
             {
                 "name": "https://pypi.org/project/omero-web/",
                 "refsource": "MISC",
@@ -84,15 +79,20 @@
                 "refsource": "MISC",
                 "url": "https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021"
             },
-            {
-                "name": "https://www.openmicroscopy.org/security/advisories/2021-SV2/",
-                "refsource": "MISC",
-                "url": "https://www.openmicroscopy.org/security/advisories/2021-SV2/"
-            },
             {
                 "name": "https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c",
                 "refsource": "MISC",
                 "url": "https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c"
+            },
+            {
+                "name": "https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr"
+            },
+            {
+                "name": "https://www.openmicroscopy.org/security/advisories/2021-SV2/",
+                "refsource": "MISC",
+                "url": "https://www.openmicroscopy.org/security/advisories/2021-SV2/"
             }
         ]
     },

From 970c70362efc2fbc25334062c0a7afa361f6924d Mon Sep 17 00:00:00 2001
From: lordoxley <40054947+lordoxley@users.noreply.github.com>
Date: Tue, 23 Mar 2021 16:02:16 +0000
Subject: [PATCH 529/845] Publish CVE-2020-7346

---
 2020/7xxx/CVE-2020-7346.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2020/7xxx/CVE-2020-7346.json b/2020/7xxx/CVE-2020-7346.json
index 35959ef70df..b0b8252fed3 100644
--- a/2020/7xxx/CVE-2020-7346.json
+++ b/2020/7xxx/CVE-2020-7346.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@mcafee.com",
         "ID": "CVE-2020-7346",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Privilege escalation in McAfee DLP Endpoint for Windows"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "McAfee Data Loss Prevention (DLP) Endpoint for Windows",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "Windows",
+                                            "version_affected": "<",
+                                            "version_value": "11.6.100"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "McAfee,LLC"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) for Windows prior to 11.6.100 allows a local, low privileged, attacker through the use of junctions to cause the product to load DLLs of the attacker's choosing. This requires the creation and removal of junctions by the attacker along with sending a specific IOTL command at the correct time."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-269: Privilege escalation vulnerability\t"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10344",
+                "refsource": "CONFIRM",
+                "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10344"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From 91b160823a76c3a3101c4b823500e5d0af69de13 Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Tue, 23 Mar 2021 18:17:04 +0200
Subject: [PATCH 530/845] Adds CVE-2021-23362

---
 2021/23xxx/CVE-2021-23362.json | 84 ++++++++++++++++++++++++++++++++--
 1 file changed, 80 insertions(+), 4 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23362.json b/2021/23xxx/CVE-2021-23362.json
index 0b4ec0e1708..040d4ffa378 100644
--- a/2021/23xxx/CVE-2021-23362.json
+++ b/2021/23xxx/CVE-2021-23362.json
@@ -3,16 +3,92 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-23T16:17:02.260029Z",
         "ID": "CVE-2021-23362",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Regular Expression Denial of Service (ReDoS)"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "hosted-git-info",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "3.0.8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Regular Expression Denial of Service (ReDoS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via shortcutMatch in fromUrl().\n\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "availabilityImpact": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Yeting Li"
+        }
+    ]
 }
\ No newline at end of file

From 54029b642fe109127f06966880ec0faed49f5ce4 Mon Sep 17 00:00:00 2001
From: Denny Page 
Date: Tue, 23 Mar 2021 09:46:09 -0700
Subject: [PATCH 531/845] Add TIBCO-2021-019-APIX

---
 2021/23xxx/CVE-2021-23274.json | 117 ++++++++++++++++++++++++++++-----
 1 file changed, 100 insertions(+), 17 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23274.json b/2021/23xxx/CVE-2021-23274.json
index 605959e864f..7a09f707d4f 100644
--- a/2021/23xxx/CVE-2021-23274.json
+++ b/2021/23xxx/CVE-2021-23274.json
@@ -1,18 +1,101 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-23274",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-23274",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO API Exchange Gateway Clickjack Vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO API Exchange Gateway",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "2.3.3"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "2.3.3"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker.\n\nAffected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "NETWORK",
+			"availabilityImpact": "HIGH",
+			"baseScore": 9.8,
+			"baseSeverity": "CRITICAL",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "NONE",
+			"scope": "UNCHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains full administrative access to the affected system."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO API Exchange Gateway versions 2.3.3 and below update to version 2.4.0 or higher\nTIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric versions 2.3.3 and below update to version 2.4.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "INTERNAL"
+	}
+}

From da9b0c38ba915be2daf71aae76a14be17ea70fae Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 17:00:41 +0000
Subject: [PATCH 532/845] "-Synchronized-Data."

---
 2020/12xxx/CVE-2020-12483.json |  82 +++++++++++++-
 2021/20xxx/CVE-2021-20219.json |  50 ++++++++-
 2021/20xxx/CVE-2021-20222.json |  50 ++++++++-
 2021/20xxx/CVE-2021-20227.json |  55 ++++++++-
 2021/20xxx/CVE-2021-20270.json |  50 ++++++++-
 2021/23xxx/CVE-2021-23274.json | 200 ++++++++++++++++-----------------
 2021/23xxx/CVE-2021-23362.json |  17 +--
 7 files changed, 379 insertions(+), 125 deletions(-)

diff --git a/2020/12xxx/CVE-2020-12483.json b/2020/12xxx/CVE-2020-12483.json
index 4f5271659d6..6719bd8c596 100644
--- a/2020/12xxx/CVE-2020-12483.json
+++ b/2020/12xxx/CVE-2020-12483.json
@@ -1,18 +1,88 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@vivo.com",
+        "DATE_PUBLIC": "2021-03-22T16:00:00.000Z",
         "ID": "CVE-2020-12483",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "AppStore Remote Download and Installation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "appstore",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "8.12.0.0",
+                                            "version_value": "8.12.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "vivo"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The appstore before 8.12.0.0 exposes some of its components, and the attacker can cause remote download and install apps through carefully constructed parameters."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 8.2,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-601 URL Redirection to Untrusted Site ('Open Redirect')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.vivo.com/en/support/security-advisory-detail?id=1",
+                "refsource": "CONFIRM",
+                "url": "https://www.vivo.com/en/support/security-advisory-detail?id=1"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20219.json b/2021/20xxx/CVE-2021-20219.json
index d4029334746..571e314932d 100644
--- a/2021/20xxx/CVE-2021-20219.json
+++ b/2021/20xxx/CVE-2021-20219.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20219",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "kernel",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "kernel 4.18"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-697"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1923738",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923738"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata->read_head, and a missing sanity check) and cause a threat to the system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20222.json b/2021/20xxx/CVE-2021-20222.json
index cd8a9915f65..fe894aa2851 100644
--- a/2021/20xxx/CVE-2021-20222.json
+++ b/2021/20xxx/CVE-2021-20222.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20222",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "keycloak",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "keycloak 13.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1924606",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924606"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20227.json b/2021/20xxx/CVE-2021-20227.json
index 3ccbbd4f1db..ab8835bb7b6 100644
--- a/2021/20xxx/CVE-2021-20227.json
+++ b/2021/20xxx/CVE-2021-20227.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20227",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "sqlite",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "sqlite 3.34.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-416"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1924886",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924886"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.sqlite.org/releaselog/3_34_1.html",
+                "url": "https://www.sqlite.org/releaselog/3_34_1.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20270.json b/2021/20xxx/CVE-2021-20270.json
index 236b1e77d6e..1b03f374f7b 100644
--- a/2021/20xxx/CVE-2021-20270.json
+++ b/2021/20xxx/CVE-2021-20270.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20270",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "python-pygments",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "python-pygments 2.7.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-835"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1922136",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922136"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the \"exception\" keyword."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23274.json b/2021/23xxx/CVE-2021-23274.json
index 7a09f707d4f..28024f19527 100644
--- a/2021/23xxx/CVE-2021-23274.json
+++ b/2021/23xxx/CVE-2021-23274.json
@@ -1,101 +1,101 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-23274",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO API Exchange Gateway Clickjack Vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO API Exchange Gateway",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "2.3.3"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "2.3.3"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker.\n\nAffected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "NETWORK",
-			"availabilityImpact": "HIGH",
-			"baseScore": 9.8,
-			"baseSeverity": "CRITICAL",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "NONE",
-			"scope": "UNCHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains full administrative access to the affected system."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO API Exchange Gateway versions 2.3.3 and below update to version 2.4.0 or higher\nTIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric versions 2.3.3 and below update to version 2.4.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "INTERNAL"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-23274",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO API Exchange Gateway Clickjack Vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO API Exchange Gateway",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2.3.3"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2.3.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 9.8,
+            "baseSeverity": "CRITICAL",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains full administrative access to the affected system."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO API Exchange Gateway versions 2.3.3 and below update to version 2.4.0 or higher\nTIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric versions 2.3.3 and below update to version 2.4.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "INTERNAL"
+    }
+}
\ No newline at end of file
diff --git a/2021/23xxx/CVE-2021-23362.json b/2021/23xxx/CVE-2021-23362.json
index 040d4ffa378..7f070f832ac 100644
--- a/2021/23xxx/CVE-2021-23362.json
+++ b/2021/23xxx/CVE-2021-23362.json
@@ -48,16 +48,19 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355",
+                "name": "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356",
+                "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3"
+                "refsource": "MISC",
+                "url": "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3",
+                "name": "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3"
             }
         ]
     },
@@ -65,7 +68,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via shortcutMatch in fromUrl().\n\n"
+                "value": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via shortcutMatch in fromUrl()."
             }
         ]
     },

From e329b7fefa946a65550a68e8f69d540c4c9ee4f8 Mon Sep 17 00:00:00 2001
From: Denny Page 
Date: Tue, 23 Mar 2021 10:04:42 -0700
Subject: [PATCH 533/845] Add TIBCO-2021-073-Messaging

---
 2021/28xxx/CVE-2021-28817.json | 123 +++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28818.json | 123 +++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28819.json | 134 ++++++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28820.json | 134 ++++++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28821.json | 134 ++++++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28822.json | 134 ++++++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28823.json | 134 ++++++++++++++++++++++++++++-----
 2021/28xxx/CVE-2021-28824.json | 134 ++++++++++++++++++++++++++++-----
 8 files changed, 914 insertions(+), 136 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28817.json b/2021/28xxx/CVE-2021-28817.json
index c5b4e56851c..870bcf75010 100644
--- a/2021/28xxx/CVE-2021-28817.json
+++ b/2021/28xxx/CVE-2021-28817.json
@@ -1,18 +1,107 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28817",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28817",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO Rendezvous Windows Platform Installation vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO Rendezvous",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO Rendezvous Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher\nTIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28818.json b/2021/28xxx/CVE-2021-28818.json
index 0e1271ce5c8..f10bbe90399 100644
--- a/2021/28xxx/CVE-2021-28818.json
+++ b/2021/28xxx/CVE-2021-28818.json
@@ -1,18 +1,107 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28818",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28818",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO Rendezvous Windows Platform Artifact Search vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO Rendezvous",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO Rendezvous Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache), Rendezvous Secure C API, Rendezvous Java API, and Rendezvous .Net API components of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher\nTIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28819.json b/2021/28xxx/CVE-2021-28819.json
index b167421340c..f2d498a3937 100644
--- a/2021/28xxx/CVE-2021-28819.json
+++ b/2021/28xxx/CVE-2021-28819.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28819",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28819",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO FTL Windows Platform Installation vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO FTL - Community Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO FTL - Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO FTL - Enterprise Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO FTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28820.json b/2021/28xxx/CVE-2021-28820.json
index 6ba7a300710..67d9d2af249 100644
--- a/2021/28xxx/CVE-2021-28820.json
+++ b/2021/28xxx/CVE-2021-28820.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28820",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28820",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO FTL Windows Platform Artifact Search vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO FTL - Community Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO FTL - Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO FTL - Enterprise Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The FTL Server (tibftlserver), FTL C API, FTL Golang API, FTL Java API, and FTL .Net API components of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy.\n\nAffected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO FTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28821.json b/2021/28xxx/CVE-2021-28821.json
index 21a47735ad9..15751ef7370 100644
--- a/2021/28xxx/CVE-2021-28821.json
+++ b/2021/28xxx/CVE-2021-28821.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28821",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28821",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO Enterprise Message Service Windows Platform Installation vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO Enterprise Message Service",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO Enterprise Message Service - Community Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO Enterprise Message Service - Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Enterprise Message Service versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Community Edition versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and below update to version 8.6.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28822.json b/2021/28xxx/CVE-2021-28822.json
index 85ccfee6cf5..f92f6cf9960 100644
--- a/2021/28xxx/CVE-2021-28822.json
+++ b/2021/28xxx/CVE-2021-28822.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28822",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28822",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO Enterprise Message Service Windows Platform Artifact Search vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO Enterprise Message Service",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO Enterprise Message Service - Community Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO Enterprise Message Service - Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "8.5.1"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Enterprise Message Service Server (tibemsd), Enterprise Message Service Central Administration (tibemsca), Enterprise Message Service JSON configuration generator (tibemsconf2json), and Enterprise Message Service C API components of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Enterprise Message Service versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Community Edition versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and below update to version 8.6.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28823.json b/2021/28xxx/CVE-2021-28823.json
index 6529b91d09e..eacb2bf406d 100644
--- a/2021/28xxx/CVE-2021-28823.json
+++ b/2021/28xxx/CVE-2021-28823.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28823",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28823",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO eFTL Windows Platform Installation vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO eFTL - Community Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO eFTL - Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO eFTL - Enterprise Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "6.5.0"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.5.0 and below, TIBCO eFTL - Developer Edition: versions 6.5.0 and below, and TIBCO eFTL - Enterprise Edition: versions 6.5.0 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO eFTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO eFTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO eFTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}
diff --git a/2021/28xxx/CVE-2021-28824.json b/2021/28xxx/CVE-2021-28824.json
index b924b05ffe2..b532d087d72 100644
--- a/2021/28xxx/CVE-2021-28824.json
+++ b/2021/28xxx/CVE-2021-28824.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-28824",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "security@tibco.com",
+		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
+		"ID": "CVE-2021-28824",
+		"STATE": "PUBLIC",
+		"TITLE": "TIBCO ActiveSpaces Windows Platform Installation vulnerability"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [
+				{
+					"product": {
+						"product_data": [
+							{
+								"product_name": "TIBCO ActiveSpaces - Community Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "4.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO ActiveSpaces - Developer Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "4.5.0"
+										}
+									]
+								}
+							},
+							{
+								"product_name": "TIBCO ActiveSpaces - Enterprise Edition",
+								"version": {
+									"version_data": [
+										{
+											"version_affected": "<=",
+											"version_value": "4.5.0"
+										}
+									]
+								}
+							}
+						]
+					},
+					"vendor_name": "TIBCO Software Inc."
+				}
+			]
+		}
+	},
+	"credit": [
+		{
+			"lang": "eng",
+			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+		}
+	],
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [
+			{
+				"lang": "eng",
+				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: versions 4.5.0 and below, TIBCO ActiveSpaces - Developer Edition: versions 4.5.0 and below, and TIBCO ActiveSpaces - Enterprise Edition: versions 4.5.0 and below.\n"
+			}
+		]
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 8.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "LOW",
+			"scope": "CHANGED",
+			"userInteraction": "NONE",
+			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [
+			{
+				"description": [
+					{
+						"lang": "eng",
+						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+					}
+				]
+			}
+		]
+	},
+	"references": {
+		"reference_data": [
+			{
+				"name": "http://www.tibco.com/services/support/advisories",
+				"refsource": "CONFIRM",
+				"url": "http://www.tibco.com/services/support/advisories"
+			}
+		]
+	},
+	"solution": [
+		{
+			"lang": "eng",
+			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO ActiveSpaces - Community Edition versions 4.5.0 and below update to version 4.6.0 or higher\nTIBCO ActiveSpaces - Developer Edition versions 4.5.0 and below update to version 4.6.0 or higher\nTIBCO ActiveSpaces - Enterprise Edition versions 4.5.0 and below update to version 4.6.0 or higher"
+		}
+	],
+	"source": {
+		"discovery": "Will Dormann of CERT/CC"
+	}
+}

From 7d7313d84d1300162048a45c27932acca42251b0 Mon Sep 17 00:00:00 2001
From: Steve Beattie 
Date: Tue, 23 Mar 2021 10:37:45 -0700
Subject: [PATCH 534/845] Canonical CNA: add info for CVE-2021-3444/linux
 kernel

Signed-off-by: Steve Beattie 
---
 2021/3xxx/CVE-2021-3444.json | 112 +++++++++++++++++++++++++++++++++--
 1 file changed, 106 insertions(+), 6 deletions(-)

diff --git a/2021/3xxx/CVE-2021-3444.json b/2021/3xxx/CVE-2021-3444.json
index e49965f2503..bea9eb8d62b 100644
--- a/2021/3xxx/CVE-2021-3444.json
+++ b/2021/3xxx/CVE-2021-3444.json
@@ -1,18 +1,118 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@ubuntu.com",
+        "DATE_PUBLIC": "2021-03-23T00:00:00.000Z",
         "ID": "CVE-2021-3444",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Linux kernel bpf verifier incorrect mod32 truncation"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "kernel",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "trunk",
+                                            "version_value": "5.12-rc1"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "5.11",
+                                            "version_value": "5.11.2"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "5.10",
+                                            "version_value": "5.10.19"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "5.4",
+                                            "version_value": "5.4.101"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Linux"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "De4dCr0w of 360 Alpha Lab"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101. "
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-681: Incorrect Conversion between Numeric Types"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/23/2"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "Apply or update to a kernel that contains the commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\")."
+        }
+    ],
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file

From bcafec16cdbf75614be0b1e58770ac3d643c03c8 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 23 Mar 2021 11:39:39 -0600
Subject: [PATCH 535/845] Add CVE-2021-21401 for GHSA-7mv5-5mxh-qg88

---
 2021/21xxx/CVE-2021-21401.json | 95 +++++++++++++++++++++++++++++++---
 1 file changed, 89 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21401.json b/2021/21xxx/CVE-2021-21401.json
index ef34222ec3d..8b163734929 100644
--- a/2021/21xxx/CVE-2021-21401.json
+++ b/2021/21xxx/CVE-2021-21401.json
@@ -1,18 +1,101 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21401",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Invalid free() call in Nanopb"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "nanopb",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 0.3.2, <= 0.3.9.7"
+                                        },
+                                        {
+                                            "version_value": ">= 0.4.0, <= 0.4.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "nanopb"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Nanopb is a small code-size Protocol Buffers implementation in ansi C.  In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5.  See referenced GitHub Security Advisory for more information including workarounds."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "baseScore": 7.1,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-763: Release of Invalid Pointer or Reference"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/nanopb/nanopb/security/advisories/GHSA-7mv5-5mxh-qg88",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nanopb/nanopb/security/advisories/GHSA-7mv5-5mxh-qg88"
+            },
+            {
+                "name": "https://github.com/nanopb/nanopb/issues/647",
+                "refsource": "MISC",
+                "url": "https://github.com/nanopb/nanopb/issues/647"
+            },
+            {
+                "name": "https://github.com/nanopb/nanopb/commit/e2f0ccf939d9f82931d085acb6df8e9a182a4261",
+                "refsource": "MISC",
+                "url": "https://github.com/nanopb/nanopb/commit/e2f0ccf939d9f82931d085acb6df8e9a182a4261"
+            },
+            {
+                "name": "https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1",
+                "refsource": "MISC",
+                "url": "https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-7mv5-5mxh-qg88",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From afcdb913781012366f8caa2f534842bcd2edf1b7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 18:00:42 +0000
Subject: [PATCH 536/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21401.json |  2 +-
 2021/23xxx/CVE-2021-23274.json |  5 +++++
 2021/27xxx/CVE-2021-27946.json |  5 +++++
 2021/3xxx/CVE-2021-3444.json   | 12 +++++++-----
 4 files changed, 18 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21401.json b/2021/21xxx/CVE-2021-21401.json
index 8b163734929..5c54be793dc 100644
--- a/2021/21xxx/CVE-2021-21401.json
+++ b/2021/21xxx/CVE-2021-21401.json
@@ -38,7 +38,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Nanopb is a small code-size Protocol Buffers implementation in ansi C.  In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5.  See referenced GitHub Security Advisory for more information including workarounds."
+                "value": "Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory for more information including workarounds."
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23274.json b/2021/23xxx/CVE-2021-23274.json
index 28024f19527..ee428915f50 100644
--- a/2021/23xxx/CVE-2021-23274.json
+++ b/2021/23xxx/CVE-2021-23274.json
@@ -86,6 +86,11 @@
                 "name": "http://www.tibco.com/services/support/advisories",
                 "refsource": "CONFIRM",
                 "url": "http://www.tibco.com/services/support/advisories"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-23-2021-tibco-api-exchange-gateway",
+                "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-23-2021-tibco-api-exchange-gateway"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json
index 73324fd83cd..2e2349a8bab 100644
--- a/2021/27xxx/CVE-2021-27946.json
+++ b/2021/27xxx/CVE-2021-27946.json
@@ -56,6 +56,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/mybb/mybb/security/advisories/GHSA-23m9-w75q-ph4p",
                 "url": "https://github.com/mybb/mybb/security/advisories/GHSA-23m9-w75q-ph4p"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161918/MyBB-1.8.25-SQL-Injection.html",
+                "url": "http://packetstormsecurity.com/files/161918/MyBB-1.8.25-SQL-Injection.html"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3444.json b/2021/3xxx/CVE-2021-3444.json
index bea9eb8d62b..eafd209d84a 100644
--- a/2021/3xxx/CVE-2021-3444.json
+++ b/2021/3xxx/CVE-2021-3444.json
@@ -59,7 +59,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101. "
+                "value": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101."
             }
         ]
     },
@@ -97,12 +97,14 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809"
+                "refsource": "MISC",
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://www.openwall.com/lists/oss-security/2021/03/23/2"
+                "refsource": "MISC",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/23/2",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/23/2"
             }
         ]
     },

From addccf2fa28728250b19e0c9a2a740395c2a0e06 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 19:00:39 +0000
Subject: [PATCH 537/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22652.json |  5 +++++
 2021/26xxx/CVE-2021-26855.json |  5 +++++
 2021/27xxx/CVE-2021-27065.json |  5 +++++
 2021/29xxx/CVE-2021-29083.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29084.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29085.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29086.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29087.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29088.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29089.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29090.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29091.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29092.json | 18 ++++++++++++++++++
 13 files changed, 195 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29083.json
 create mode 100644 2021/29xxx/CVE-2021-29084.json
 create mode 100644 2021/29xxx/CVE-2021-29085.json
 create mode 100644 2021/29xxx/CVE-2021-29086.json
 create mode 100644 2021/29xxx/CVE-2021-29087.json
 create mode 100644 2021/29xxx/CVE-2021-29088.json
 create mode 100644 2021/29xxx/CVE-2021-29089.json
 create mode 100644 2021/29xxx/CVE-2021-29090.json
 create mode 100644 2021/29xxx/CVE-2021-29091.json
 create mode 100644 2021/29xxx/CVE-2021-29092.json

diff --git a/2021/22xxx/CVE-2021-22652.json b/2021/22xxx/CVE-2021-22652.json
index 5467d0192e7..891f075d108 100644
--- a/2021/22xxx/CVE-2021-22652.json
+++ b/2021/22xxx/CVE-2021-22652.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-02",
                 "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-02"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161937/Advantech-iView-Unauthenticated-Remote-Code-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161937/Advantech-iView-Unauthenticated-Remote-Code-Execution.html"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26855.json b/2021/26xxx/CVE-2021-26855.json
index 269e276a469..0c92db4a2e4 100644
--- a/2021/26xxx/CVE-2021-26855.json
+++ b/2021/26xxx/CVE-2021-26855.json
@@ -161,6 +161,11 @@
                 "refsource": "MISC",
                 "name": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html",
                 "url": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27065.json b/2021/27xxx/CVE-2021-27065.json
index ed0a49be7a8..27717fa2989 100644
--- a/2021/27xxx/CVE-2021-27065.json
+++ b/2021/27xxx/CVE-2021-27065.json
@@ -156,6 +156,11 @@
                 "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065",
                 "refsource": "MISC",
                 "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29083.json b/2021/29xxx/CVE-2021-29083.json
new file mode 100644
index 00000000000..0cdca6ad59d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29083.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29083",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29084.json b/2021/29xxx/CVE-2021-29084.json
new file mode 100644
index 00000000000..ca06557374f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29084.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29084",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29085.json b/2021/29xxx/CVE-2021-29085.json
new file mode 100644
index 00000000000..6c9f18bd8f2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29085.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29085",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29086.json b/2021/29xxx/CVE-2021-29086.json
new file mode 100644
index 00000000000..ac6c38a893b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29086.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29086",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29087.json b/2021/29xxx/CVE-2021-29087.json
new file mode 100644
index 00000000000..8d618728d52
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29087.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29087",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29088.json b/2021/29xxx/CVE-2021-29088.json
new file mode 100644
index 00000000000..aa483625aaa
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29088.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29088",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29089.json b/2021/29xxx/CVE-2021-29089.json
new file mode 100644
index 00000000000..c44c5a04b1c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29089.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29089",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29090.json b/2021/29xxx/CVE-2021-29090.json
new file mode 100644
index 00000000000..1f788dedd5f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29090.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29090",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29091.json b/2021/29xxx/CVE-2021-29091.json
new file mode 100644
index 00000000000..d5c6f0510a4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29091.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29091",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29092.json b/2021/29xxx/CVE-2021-29092.json
new file mode 100644
index 00000000000..a081bea8276
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29092.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29092",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 73b5a22af91af5dec5feb02f9b00faf5ffa294e5 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 23 Mar 2021 13:30:01 -0600
Subject: [PATCH 538/845] Add CVE-2021-21402 for GHSA-wg4c-c9g9-rxhx

---
 2021/21xxx/CVE-2021-21402.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21402.json b/2021/21xxx/CVE-2021-21402.json
index 4f17fe84fd3..8aa866dea66 100644
--- a/2021/21xxx/CVE-2021-21402.json
+++ b/2021/21xxx/CVE-2021-21402.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21402",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Unauthenticated Arbitrary File Access in Jellyfin"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "jellyfin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 10.7.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "jellyfin"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 7.7,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-wg4c-c9g9-rxhx",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-wg4c-c9g9-rxhx"
+            },
+            {
+                "name": "https://github.com/jellyfin/jellyfin/commit/0183ef8e89195f420c48d2600bc0b72f6d3a7fd7",
+                "refsource": "MISC",
+                "url": "https://github.com/jellyfin/jellyfin/commit/0183ef8e89195f420c48d2600bc0b72f6d3a7fd7"
+            },
+            {
+                "name": "https://github.com/jellyfin/jellyfin/releases/tag/v10.7.1",
+                "refsource": "MISC",
+                "url": "https://github.com/jellyfin/jellyfin/releases/tag/v10.7.1"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-wg4c-c9g9-rxhx",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 501c367e0374e64dfb455d29eb44af21c8f9a58b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 20:00:42 +0000
Subject: [PATCH 539/845] "-Synchronized-Data."

---
 2020/24xxx/CVE-2020-24994.json | 61 ++++++++++++++++++++++---
 2021/23xxx/CVE-2021-23361.json | 82 ++--------------------------------
 2021/27xxx/CVE-2021-27908.json |  7 +--
 2021/3xxx/CVE-2021-3392.json   | 55 +++++++++++++++++++++--
 4 files changed, 115 insertions(+), 90 deletions(-)

diff --git a/2020/24xxx/CVE-2020-24994.json b/2020/24xxx/CVE-2020-24994.json
index 15902c13bdc..12121a52f6b 100644
--- a/2020/24xxx/CVE-2020-24994.json
+++ b/2020/24xxx/CVE-2020-24994.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-24994",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-24994",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.14.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/libass/libass/issues/422",
+                "refsource": "MISC",
+                "name": "https://github.com/libass/libass/issues/422"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/libass/libass/issues/423",
+                "url": "https://github.com/libass/libass/issues/423"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23361.json b/2021/23xxx/CVE-2021-23361.json
index 3e7468900b7..ee2cb5ade92 100644
--- a/2021/23xxx/CVE-2021-23361.json
+++ b/2021/23xxx/CVE-2021-23361.json
@@ -3,90 +3,16 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
-        "ASSIGNER": "report@snyk.io",
-        "DATE_PUBLIC": "2021-03-23T10:11:10.481864Z",
         "ID": "CVE-2021-23361",
-        "STATE": "PUBLIC",
-        "TITLE": "Command Injection"
-    },
-    "affects": {
-        "vendor": {
-            "vendor_data": [
-                {
-                    "product": {
-                        "product_data": [
-                            {
-                                "product_name": "fis-kernel",
-                                "version": {
-                                    "version_data": [
-                                        {
-                                            "version_affected": ">=",
-                                            "version_value": "0"
-                                        }
-                                    ]
-                                }
-                            }
-                        ]
-                    },
-                    "vendor_name": "n/a"
-                }
-            ]
-        }
-    },
-    "problemtype": {
-        "problemtype_data": [
-            {
-                "description": [
-                    {
-                        "lang": "eng",
-                        "value": "Command Injection"
-                    }
-                ]
-            }
-        ]
-    },
-    "references": {
-        "reference_data": [
-            {
-                "refsource": "MISC",
-                "url": "https://snyk.io/vuln/SNYK-JS-FISKERNEL-1088057",
-                "name": "https://snyk.io/vuln/SNYK-JS-FISKERNEL-1088057"
-            },
-            {
-                "refsource": "MISC",
-                "url": "https://github.com/fex-team/fis-kernel/blob/master/lib/util.js%23L948",
-                "name": "https://github.com/fex-team/fis-kernel/blob/master/lib/util.js%23L948"
-            }
-        ]
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "This affects all versions of package fis-kernel. The function util.nohup in fis3 is vulnerable to command injection in non-windows systems (e.g., Linux)."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
             }
         ]
-    },
-    "impact": {
-        "cvss": {
-            "version": "3.1",
-            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:F/RL:U/RC:C",
-            "baseScore": 8.6,
-            "baseSeverity": "HIGH",
-            "attackVector": "NETWORK",
-            "attackComplexity": "LOW",
-            "privilegesRequired": "NONE",
-            "userInteraction": "NONE",
-            "scope": "UNCHANGED",
-            "confidentialityImpact": "HIGH",
-            "integrityImpact": "LOW",
-            "availabilityImpact": "LOW"
-        }
-    },
-    "credit": [
-        {
-            "lang": "eng",
-            "value": "zpbrent(zhou.peng@shu)"
-        }
-    ]
+    }
 }
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27908.json b/2021/27xxx/CVE-2021-27908.json
index 8962aca76e2..68dc6c1d3ac 100644
--- a/2021/27xxx/CVE-2021-27908.json
+++ b/2021/27xxx/CVE-2021-27908.json
@@ -46,7 +46,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application."
+                "value": "In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic\u2019s configuration that are used in publicly facing parts of the application."
             }
         ]
     },
@@ -84,8 +84,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx"
+                "refsource": "MISC",
+                "url": "https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx",
+                "name": "https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3392.json b/2021/3xxx/CVE-2021-3392.json
index 85886a8444c..f086b99dcb0 100644
--- a/2021/3xxx/CVE-2021-3392.json
+++ b/2021/3xxx/CVE-2021-3392.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3392",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "QEMU",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "between 2.10.0 and 5.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-416"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1924042",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924042"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.launchpad.net/qemu/+bug/1914236",
+                "url": "https://bugs.launchpad.net/qemu/+bug/1914236"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected."
             }
         ]
     }

From 358228812d1118ffea24c0135ff6c42fc466ad5b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 21:00:43 +0000
Subject: [PATCH 540/845] "-Synchronized-Data."

---
 2018/3xxx/CVE-2018-3635.json   |   5 +
 2019/19xxx/CVE-2019-19343.json |  55 +++++++-
 2021/28xxx/CVE-2021-28099.json |  50 ++++++-
 2021/28xxx/CVE-2021-28100.json |  50 ++++++-
 2021/28xxx/CVE-2021-28817.json | 212 ++++++++++++++---------------
 2021/28xxx/CVE-2021-28818.json | 212 ++++++++++++++---------------
 2021/28xxx/CVE-2021-28819.json | 234 ++++++++++++++++-----------------
 2021/28xxx/CVE-2021-28820.json | 234 ++++++++++++++++-----------------
 2021/28xxx/CVE-2021-28821.json | 234 ++++++++++++++++-----------------
 2021/28xxx/CVE-2021-28822.json | 234 ++++++++++++++++-----------------
 2021/28xxx/CVE-2021-28823.json | 234 ++++++++++++++++-----------------
 2021/28xxx/CVE-2021-28824.json | 234 ++++++++++++++++-----------------
 2021/29xxx/CVE-2021-29093.json |  18 +++
 2021/29xxx/CVE-2021-29094.json |  18 +++
 2021/29xxx/CVE-2021-29095.json |  18 +++
 2021/29xxx/CVE-2021-29096.json |  18 +++
 2021/29xxx/CVE-2021-29097.json |  18 +++
 2021/29xxx/CVE-2021-29098.json |  18 +++
 2021/29xxx/CVE-2021-29099.json |  18 +++
 2021/29xxx/CVE-2021-29100.json |  18 +++
 2021/29xxx/CVE-2021-29101.json |  18 +++
 2021/29xxx/CVE-2021-29102.json |  18 +++
 2021/29xxx/CVE-2021-29103.json |  18 +++
 2021/29xxx/CVE-2021-29104.json |  18 +++
 2021/29xxx/CVE-2021-29105.json |  18 +++
 2021/29xxx/CVE-2021-29106.json |  18 +++
 2021/29xxx/CVE-2021-29107.json |  18 +++
 2021/29xxx/CVE-2021-29108.json |  18 +++
 2021/29xxx/CVE-2021-29109.json |  18 +++
 2021/29xxx/CVE-2021-29110.json |  18 +++
 2021/29xxx/CVE-2021-29111.json |  18 +++
 2021/29xxx/CVE-2021-29112.json |  18 +++
 2021/29xxx/CVE-2021-29113.json |  18 +++
 2021/29xxx/CVE-2021-29114.json |  18 +++
 2021/29xxx/CVE-2021-29115.json |  18 +++
 2021/29xxx/CVE-2021-29116.json |  18 +++
 2021/29xxx/CVE-2021-29117.json |  18 +++
 2021/29xxx/CVE-2021-29118.json |  18 +++
 2021/29xxx/CVE-2021-29119.json |  18 +++
 2021/29xxx/CVE-2021-29120.json |  18 +++
 2021/29xxx/CVE-2021-29121.json |  18 +++
 2021/29xxx/CVE-2021-29122.json |  18 +++
 2021/29xxx/CVE-2021-29123.json |  18 +++
 2021/29xxx/CVE-2021-29124.json |  18 +++
 2021/29xxx/CVE-2021-29125.json |  18 +++
 2021/29xxx/CVE-2021-29126.json |  18 +++
 2021/29xxx/CVE-2021-29127.json |  18 +++
 2021/29xxx/CVE-2021-29128.json |  18 +++
 2021/29xxx/CVE-2021-29129.json |  18 +++
 2021/29xxx/CVE-2021-29130.json |  18 +++
 2021/29xxx/CVE-2021-29131.json |  18 +++
 2021/29xxx/CVE-2021-29132.json |  18 +++
 2021/3xxx/CVE-2021-3409.json   |  55 +++++++-
 2021/3xxx/CVE-2021-3444.json   |   5 +
 2021/3xxx/CVE-2021-3462.json   |  18 +++
 55 files changed, 1860 insertions(+), 926 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29093.json
 create mode 100644 2021/29xxx/CVE-2021-29094.json
 create mode 100644 2021/29xxx/CVE-2021-29095.json
 create mode 100644 2021/29xxx/CVE-2021-29096.json
 create mode 100644 2021/29xxx/CVE-2021-29097.json
 create mode 100644 2021/29xxx/CVE-2021-29098.json
 create mode 100644 2021/29xxx/CVE-2021-29099.json
 create mode 100644 2021/29xxx/CVE-2021-29100.json
 create mode 100644 2021/29xxx/CVE-2021-29101.json
 create mode 100644 2021/29xxx/CVE-2021-29102.json
 create mode 100644 2021/29xxx/CVE-2021-29103.json
 create mode 100644 2021/29xxx/CVE-2021-29104.json
 create mode 100644 2021/29xxx/CVE-2021-29105.json
 create mode 100644 2021/29xxx/CVE-2021-29106.json
 create mode 100644 2021/29xxx/CVE-2021-29107.json
 create mode 100644 2021/29xxx/CVE-2021-29108.json
 create mode 100644 2021/29xxx/CVE-2021-29109.json
 create mode 100644 2021/29xxx/CVE-2021-29110.json
 create mode 100644 2021/29xxx/CVE-2021-29111.json
 create mode 100644 2021/29xxx/CVE-2021-29112.json
 create mode 100644 2021/29xxx/CVE-2021-29113.json
 create mode 100644 2021/29xxx/CVE-2021-29114.json
 create mode 100644 2021/29xxx/CVE-2021-29115.json
 create mode 100644 2021/29xxx/CVE-2021-29116.json
 create mode 100644 2021/29xxx/CVE-2021-29117.json
 create mode 100644 2021/29xxx/CVE-2021-29118.json
 create mode 100644 2021/29xxx/CVE-2021-29119.json
 create mode 100644 2021/29xxx/CVE-2021-29120.json
 create mode 100644 2021/29xxx/CVE-2021-29121.json
 create mode 100644 2021/29xxx/CVE-2021-29122.json
 create mode 100644 2021/29xxx/CVE-2021-29123.json
 create mode 100644 2021/29xxx/CVE-2021-29124.json
 create mode 100644 2021/29xxx/CVE-2021-29125.json
 create mode 100644 2021/29xxx/CVE-2021-29126.json
 create mode 100644 2021/29xxx/CVE-2021-29127.json
 create mode 100644 2021/29xxx/CVE-2021-29128.json
 create mode 100644 2021/29xxx/CVE-2021-29129.json
 create mode 100644 2021/29xxx/CVE-2021-29130.json
 create mode 100644 2021/29xxx/CVE-2021-29131.json
 create mode 100644 2021/29xxx/CVE-2021-29132.json
 create mode 100644 2021/3xxx/CVE-2021-3462.json

diff --git a/2018/3xxx/CVE-2018-3635.json b/2018/3xxx/CVE-2018-3635.json
index 749807d4492..f2f7fb4b467 100644
--- a/2018/3xxx/CVE-2018-3635.json
+++ b/2018/3xxx/CVE-2018-3635.json
@@ -61,6 +61,11 @@
                 "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00153.html",
                 "refsource": "CONFIRM",
                 "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00153.html"
+            },
+            {
+                "refsource": "FULLDISC",
+                "name": "20210323 CVE-2018-3635 revisited: executable installers are vulnerable^WEVIL (case 60): again arbitrary code execution WITH escalation of privilege via Intel Rapid Storage Technology User Interface and Driver",
+                "url": "http://seclists.org/fulldisclosure/2021/Mar/55"
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19343.json b/2019/19xxx/CVE-2019-19343.json
index 5eccabc7128..cf62559a7bb 100644
--- a/2019/19xxx/CVE-2019-19343.json
+++ b/2019/19xxx/CVE-2019-19343.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-19343",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Undertow",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "undertow 2.0.25.SP1, jboss-remoting 5.0.14.SP1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://issues.redhat.com/browse/JBEAP-16695",
+                "url": "https://issues.redhat.com/browse/JBEAP-16695"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4. A memory leak in HttpOpenListener due to holding remote connections indefinitely may lead to denial of service. Versions before undertow 2.0.25.SP1 and jboss-remoting 5.0.14.SP1 are believed to be vulnerable."
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28099.json b/2021/28xxx/CVE-2021-28099.json
index d4e35ada7a6..8bc99e85e59 100644
--- a/2021/28xxx/CVE-2021-28099.json
+++ b/2021/28xxx/CVE-2021-28099.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-28099",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-report@netflix.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Netflix OSS Hollow",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Local Information Disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md",
+                "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated."
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28100.json b/2021/28xxx/CVE-2021-28100.json
index eaf9da69129..4ae2119d3d5 100644
--- a/2021/28xxx/CVE-2021-28100.json
+++ b/2021/28xxx/CVE-2021-28100.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-28100",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-report@netflix.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Netflix OSS Priam",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Local Information Disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-002.md",
+                "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-002.md"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Priam uses File.createTempFile, which gives the permissions on that file -rw-r--r--. An attacker with read access to the local filesystem can read anything written there by the Priam process."
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28817.json b/2021/28xxx/CVE-2021-28817.json
index 870bcf75010..1d871a6da07 100644
--- a/2021/28xxx/CVE-2021-28817.json
+++ b/2021/28xxx/CVE-2021-28817.json
@@ -1,107 +1,107 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28817",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO Rendezvous Windows Platform Installation vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO Rendezvous",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO Rendezvous Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher\nTIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28817",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO Rendezvous Windows Platform Installation vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO Rendezvous",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO Rendezvous Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher\nTIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28818.json b/2021/28xxx/CVE-2021-28818.json
index f10bbe90399..691f34d73db 100644
--- a/2021/28xxx/CVE-2021-28818.json
+++ b/2021/28xxx/CVE-2021-28818.json
@@ -1,107 +1,107 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28818",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO Rendezvous Windows Platform Artifact Search vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO Rendezvous",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO Rendezvous Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache), Rendezvous Secure C API, Rendezvous Java API, and Rendezvous .Net API components of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher\nTIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28818",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO Rendezvous Windows Platform Artifact Search vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO Rendezvous",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO Rendezvous Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache), Rendezvous Secure C API, Rendezvous Java API, and Rendezvous .Net API components of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy. Affected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher\nTIBCO Rendezvous Developer Edition versions 8.5.1 and below update to version 8.5.2 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28819.json b/2021/28xxx/CVE-2021-28819.json
index f2d498a3937..c1e9ac47ef4 100644
--- a/2021/28xxx/CVE-2021-28819.json
+++ b/2021/28xxx/CVE-2021-28819.json
@@ -1,118 +1,118 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28819",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO FTL Windows Platform Installation vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO FTL - Community Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO FTL - Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO FTL - Enterprise Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO FTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28819",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO FTL Windows Platform Installation vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO FTL - Community Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO FTL - Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO FTL - Enterprise Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO FTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28820.json b/2021/28xxx/CVE-2021-28820.json
index 67d9d2af249..d6186e71721 100644
--- a/2021/28xxx/CVE-2021-28820.json
+++ b/2021/28xxx/CVE-2021-28820.json
@@ -1,118 +1,118 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28820",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO FTL Windows Platform Artifact Search vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO FTL - Community Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO FTL - Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO FTL - Enterprise Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The FTL Server (tibftlserver), FTL C API, FTL Golang API, FTL Java API, and FTL .Net API components of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy.\n\nAffected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO FTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28820",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO FTL Windows Platform Artifact Search vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO FTL - Community Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO FTL - Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO FTL - Enterprise Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The FTL Server (tibftlserver), FTL C API, FTL Golang API, FTL Java API, and FTL .Net API components of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.5.0 and below, TIBCO FTL - Developer Edition: versions 6.5.0 and below, and TIBCO FTL - Enterprise Edition: versions 6.5.0 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO FTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO FTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28821.json b/2021/28xxx/CVE-2021-28821.json
index 15751ef7370..de2d61f324d 100644
--- a/2021/28xxx/CVE-2021-28821.json
+++ b/2021/28xxx/CVE-2021-28821.json
@@ -1,118 +1,118 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28821",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO Enterprise Message Service Windows Platform Installation vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO Enterprise Message Service",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO Enterprise Message Service - Community Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO Enterprise Message Service - Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Enterprise Message Service versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Community Edition versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and below update to version 8.6.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28821",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO Enterprise Message Service Windows Platform Installation vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO Enterprise Message Service",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO Enterprise Message Service - Community Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO Enterprise Message Service - Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Enterprise Message Service versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Community Edition versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and below update to version 8.6.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28822.json b/2021/28xxx/CVE-2021-28822.json
index f92f6cf9960..e54b9e3c277 100644
--- a/2021/28xxx/CVE-2021-28822.json
+++ b/2021/28xxx/CVE-2021-28822.json
@@ -1,118 +1,118 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28822",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO Enterprise Message Service Windows Platform Artifact Search vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO Enterprise Message Service",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO Enterprise Message Service - Community Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO Enterprise Message Service - Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "8.5.1"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Enterprise Message Service Server (tibemsd), Enterprise Message Service Central Administration (tibemsca), Enterprise Message Service JSON configuration generator (tibemsconf2json), and Enterprise Message Service C API components of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Enterprise Message Service versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Community Edition versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and below update to version 8.6.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28822",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO Enterprise Message Service Windows Platform Artifact Search vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO Enterprise Message Service",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO Enterprise Message Service - Community Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO Enterprise Message Service - Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "8.5.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Enterprise Message Service Server (tibemsd), Enterprise Message Service Central Administration (tibemsca), Enterprise Message Service JSON configuration generator (tibemsconf2json), and Enterprise Message Service C API components of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy. Affected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Enterprise Message Service versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Community Edition versions 8.5.1 and below update to version 8.6.0 or higher\nTIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and below update to version 8.6.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28823.json b/2021/28xxx/CVE-2021-28823.json
index eacb2bf406d..53a8020c19b 100644
--- a/2021/28xxx/CVE-2021-28823.json
+++ b/2021/28xxx/CVE-2021-28823.json
@@ -1,118 +1,118 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28823",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO eFTL Windows Platform Installation vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO eFTL - Community Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO eFTL - Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO eFTL - Enterprise Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "6.5.0"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.5.0 and below, TIBCO eFTL - Developer Edition: versions 6.5.0 and below, and TIBCO eFTL - Enterprise Edition: versions 6.5.0 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO eFTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO eFTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO eFTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28823",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO eFTL Windows Platform Installation vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO eFTL - Community Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO eFTL - Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO eFTL - Enterprise Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "6.5.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.5.0 and below, TIBCO eFTL - Developer Edition: versions 6.5.0 and below, and TIBCO eFTL - Enterprise Edition: versions 6.5.0 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO eFTL - Community Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO eFTL - Developer Edition versions 6.5.0 and below update to version 6.6.0 or higher\nTIBCO eFTL - Enterprise Edition versions 6.5.0 and below update to version 6.6.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28824.json b/2021/28xxx/CVE-2021-28824.json
index b532d087d72..6c4cb1416cf 100644
--- a/2021/28xxx/CVE-2021-28824.json
+++ b/2021/28xxx/CVE-2021-28824.json
@@ -1,118 +1,118 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "security@tibco.com",
-		"DATE_PUBLIC": "2021-03-23T17:00:00Z",
-		"ID": "CVE-2021-28824",
-		"STATE": "PUBLIC",
-		"TITLE": "TIBCO ActiveSpaces Windows Platform Installation vulnerability"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [
-				{
-					"product": {
-						"product_data": [
-							{
-								"product_name": "TIBCO ActiveSpaces - Community Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "4.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO ActiveSpaces - Developer Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "4.5.0"
-										}
-									]
-								}
-							},
-							{
-								"product_name": "TIBCO ActiveSpaces - Enterprise Edition",
-								"version": {
-									"version_data": [
-										{
-											"version_affected": "<=",
-											"version_value": "4.5.0"
-										}
-									]
-								}
-							}
-						]
-					},
-					"vendor_name": "TIBCO Software Inc."
-				}
-			]
-		}
-	},
-	"credit": [
-		{
-			"lang": "eng",
-			"value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
-		}
-	],
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [
-			{
-				"lang": "eng",
-				"value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation.\n\nAffected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: versions 4.5.0 and below, TIBCO ActiveSpaces - Developer Edition: versions 4.5.0 and below, and TIBCO ActiveSpaces - Enterprise Edition: versions 4.5.0 and below.\n"
-			}
-		]
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 8.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "LOW",
-			"scope": "CHANGED",
-			"userInteraction": "NONE",
-			"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [
-			{
-				"description": [
-					{
-						"lang": "eng",
-						"value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
-					}
-				]
-			}
-		]
-	},
-	"references": {
-		"reference_data": [
-			{
-				"name": "http://www.tibco.com/services/support/advisories",
-				"refsource": "CONFIRM",
-				"url": "http://www.tibco.com/services/support/advisories"
-			}
-		]
-	},
-	"solution": [
-		{
-			"lang": "eng",
-			"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO ActiveSpaces - Community Edition versions 4.5.0 and below update to version 4.6.0 or higher\nTIBCO ActiveSpaces - Developer Edition versions 4.5.0 and below update to version 4.6.0 or higher\nTIBCO ActiveSpaces - Enterprise Edition versions 4.5.0 and below update to version 4.6.0 or higher"
-		}
-	],
-	"source": {
-		"discovery": "Will Dormann of CERT/CC"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "security@tibco.com",
+        "DATE_PUBLIC": "2021-03-23T17:00:00Z",
+        "ID": "CVE-2021-28824",
+        "STATE": "PUBLIC",
+        "TITLE": "TIBCO ActiveSpaces Windows Platform Installation vulnerability"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "TIBCO ActiveSpaces - Community Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "4.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO ActiveSpaces - Developer Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "4.5.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "TIBCO ActiveSpaces - Enterprise Edition",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "4.5.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TIBCO Software Inc."
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Windows Installation component of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: versions 4.5.0 and below, TIBCO ActiveSpaces - Developer Edition: versions 4.5.0 and below, and TIBCO ActiveSpaces - Enterprise Edition: versions 4.5.0 and below."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "The impact of this vulnerability includes the possibility of an attacker gaining full access to the Windows operating system at the privilege level of the affected component."
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "http://www.tibco.com/services/support/advisories",
+                "refsource": "CONFIRM",
+                "url": "http://www.tibco.com/services/support/advisories"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO ActiveSpaces - Community Edition versions 4.5.0 and below update to version 4.6.0 or higher\nTIBCO ActiveSpaces - Developer Edition versions 4.5.0 and below update to version 4.6.0 or higher\nTIBCO ActiveSpaces - Enterprise Edition versions 4.5.0 and below update to version 4.6.0 or higher"
+        }
+    ],
+    "source": {
+        "discovery": "Will Dormann of CERT/CC"
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29093.json b/2021/29xxx/CVE-2021-29093.json
new file mode 100644
index 00000000000..90418589f45
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29093.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29093",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29094.json b/2021/29xxx/CVE-2021-29094.json
new file mode 100644
index 00000000000..87042f23f6c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29094.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29094",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29095.json b/2021/29xxx/CVE-2021-29095.json
new file mode 100644
index 00000000000..5d44a4ea4ec
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29095.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29095",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
new file mode 100644
index 00000000000..15c01febe2e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29096",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
new file mode 100644
index 00000000000..4fb8e116381
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29097",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
new file mode 100644
index 00000000000..6dbf308033e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29098",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29099.json b/2021/29xxx/CVE-2021-29099.json
new file mode 100644
index 00000000000..64500709e50
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29099.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29099",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29100.json b/2021/29xxx/CVE-2021-29100.json
new file mode 100644
index 00000000000..5f61fc9748d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29100.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29100",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29101.json b/2021/29xxx/CVE-2021-29101.json
new file mode 100644
index 00000000000..78bc5de40e4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29101.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29101",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29102.json b/2021/29xxx/CVE-2021-29102.json
new file mode 100644
index 00000000000..29f54836afc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29102.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29102",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29103.json b/2021/29xxx/CVE-2021-29103.json
new file mode 100644
index 00000000000..c25c5dda1eb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29103.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29103",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29104.json b/2021/29xxx/CVE-2021-29104.json
new file mode 100644
index 00000000000..ef187d808ba
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29104.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29104",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29105.json b/2021/29xxx/CVE-2021-29105.json
new file mode 100644
index 00000000000..fdec45e17f8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29105.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29105",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29106.json b/2021/29xxx/CVE-2021-29106.json
new file mode 100644
index 00000000000..d3561222cf6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29106.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29106",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29107.json b/2021/29xxx/CVE-2021-29107.json
new file mode 100644
index 00000000000..9966211384c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29107.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29107",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29108.json b/2021/29xxx/CVE-2021-29108.json
new file mode 100644
index 00000000000..a4937b5ca8c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29108.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29108",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29109.json b/2021/29xxx/CVE-2021-29109.json
new file mode 100644
index 00000000000..92b5ee88f13
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29109.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29109",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29110.json b/2021/29xxx/CVE-2021-29110.json
new file mode 100644
index 00000000000..2072ea661f9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29110.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29110",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29111.json b/2021/29xxx/CVE-2021-29111.json
new file mode 100644
index 00000000000..b7b437f9ad2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29111.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29111",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29112.json b/2021/29xxx/CVE-2021-29112.json
new file mode 100644
index 00000000000..4c92b945b3e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29112.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29112",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29113.json b/2021/29xxx/CVE-2021-29113.json
new file mode 100644
index 00000000000..b232d0419dc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29113.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29113",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29114.json b/2021/29xxx/CVE-2021-29114.json
new file mode 100644
index 00000000000..22206c513c1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29114.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29114",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29115.json b/2021/29xxx/CVE-2021-29115.json
new file mode 100644
index 00000000000..70015f6186f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29115.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29115",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29116.json b/2021/29xxx/CVE-2021-29116.json
new file mode 100644
index 00000000000..8e0015d1282
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29116.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29116",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29117.json b/2021/29xxx/CVE-2021-29117.json
new file mode 100644
index 00000000000..1663e924a56
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29117.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29117",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29118.json b/2021/29xxx/CVE-2021-29118.json
new file mode 100644
index 00000000000..9d96d30e938
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29118.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29118",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29119.json b/2021/29xxx/CVE-2021-29119.json
new file mode 100644
index 00000000000..d4246522d0c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29119.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29119",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29120.json b/2021/29xxx/CVE-2021-29120.json
new file mode 100644
index 00000000000..c02592f57ae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29120.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29120",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29121.json b/2021/29xxx/CVE-2021-29121.json
new file mode 100644
index 00000000000..dceb170d011
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29121.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29121",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29122.json b/2021/29xxx/CVE-2021-29122.json
new file mode 100644
index 00000000000..c492954755b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29122.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29122",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29123.json b/2021/29xxx/CVE-2021-29123.json
new file mode 100644
index 00000000000..31d7795b1ba
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29123.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29123",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29124.json b/2021/29xxx/CVE-2021-29124.json
new file mode 100644
index 00000000000..4bfda5a0802
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29124.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29124",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29125.json b/2021/29xxx/CVE-2021-29125.json
new file mode 100644
index 00000000000..0cb8f06823b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29125.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29125",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29126.json b/2021/29xxx/CVE-2021-29126.json
new file mode 100644
index 00000000000..8608f361916
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29126.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29126",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29127.json b/2021/29xxx/CVE-2021-29127.json
new file mode 100644
index 00000000000..8da662a5335
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29127.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29127",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29128.json b/2021/29xxx/CVE-2021-29128.json
new file mode 100644
index 00000000000..e19450015b1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29128.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29128",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29129.json b/2021/29xxx/CVE-2021-29129.json
new file mode 100644
index 00000000000..e24a05d4f5a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29129.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29129",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29130.json b/2021/29xxx/CVE-2021-29130.json
new file mode 100644
index 00000000000..abb00cd7725
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29130.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29130",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29131.json b/2021/29xxx/CVE-2021-29131.json
new file mode 100644
index 00000000000..2b0c96c874b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29131.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29131",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29132.json b/2021/29xxx/CVE-2021-29132.json
new file mode 100644
index 00000000000..f653b2baaf7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29132.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29132",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3409.json b/2021/3xxx/CVE-2021-3409.json
index 83769b810a5..849a5c71218 100644
--- a/2021/3xxx/CVE-2021-3409.json
+++ b/2021/3xxx/CVE-2021-3409.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3409",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "QEMU",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "up to (including) 5.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928146",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928146"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/09/1",
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/09/1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3444.json b/2021/3xxx/CVE-2021-3444.json
index eafd209d84a..6906523b8b0 100644
--- a/2021/3xxx/CVE-2021-3444.json
+++ b/2021/3xxx/CVE-2021-3444.json
@@ -105,6 +105,11 @@
                 "refsource": "MISC",
                 "url": "https://www.openwall.com/lists/oss-security/2021/03/23/2",
                 "name": "https://www.openwall.com/lists/oss-security/2021/03/23/2"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210323 [CVE-2021-3444] Linux kernel bpf verifier incorrect mod32 truncation",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/23/2"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3462.json b/2021/3xxx/CVE-2021-3462.json
new file mode 100644
index 00000000000..d80bd4bf812
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3462.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3462",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 5f329408345cdb59ca23b0d1317efecb1abd2914 Mon Sep 17 00:00:00 2001
From: Brent Johnson 
Date: Tue, 23 Mar 2021 14:25:43 -0700
Subject: [PATCH 541/845] CVE-2021-22864

---
 2021/22xxx/CVE-2021-22864.json | 103 ++++++++++++++++++++++++++++-----
 1 file changed, 88 insertions(+), 15 deletions(-)

diff --git a/2021/22xxx/CVE-2021-22864.json b/2021/22xxx/CVE-2021-22864.json
index 6b674951890..5b66beab6a4 100644
--- a/2021/22xxx/CVE-2021-22864.json
+++ b/2021/22xxx/CVE-2021-22864.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-22864",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "product-cna@github.com",
+    "ID": "CVE-2021-22864",
+    "STATE": "PUBLIC",
+    "TITLE": "Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "GitHub Enterprise Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_affected": "<",
+                      "version_name": "2.21",
+                      "version_value": "2.21.17"
+                    },
+                    {
+                      "version_affected": "<",
+                      "version_name": "2.22",
+                      "version_value": "2.22.9"
+                    },
+                    {
+                      "version_affected": "<",
+                      "version_name": "3.0",
+                      "version_value": "3.0.3"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "GitHub"
+        }
+      ]
     }
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "yvvdwf"
+    }
+  ],
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to code execution on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.3 and was fixed in 3.0.3, 2.22.9, and 2.21.17. This vulnerability was reported via the GitHub Bug Bounty program."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-77: Command Injection - Generic"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "refsource": "CONFIRM",
+        "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.17"
+      },
+      {
+        "refsource": "CONFIRM",
+        "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.9"
+      },
+      {
+        "refsource": "CONFIRM",
+        "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.3"
+      }
+    ]
+  },
+  "source": {
+    "discovery": "EXTERNAL"
+  }
 }
\ No newline at end of file

From c8e6dfa279ee44b29a2cb5f6405a1ab6866c4090 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 22:00:43 +0000
Subject: [PATCH 542/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22864.json | 169 +++++++++++++++++----------------
 2021/3xxx/CVE-2021-3463.json   |  18 ++++
 2021/3xxx/CVE-2021-3464.json   |  18 ++++
 3 files changed, 122 insertions(+), 83 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3463.json
 create mode 100644 2021/3xxx/CVE-2021-3464.json

diff --git a/2021/22xxx/CVE-2021-22864.json b/2021/22xxx/CVE-2021-22864.json
index 5b66beab6a4..b660f97a8f8 100644
--- a/2021/22xxx/CVE-2021-22864.json
+++ b/2021/22xxx/CVE-2021-22864.json
@@ -1,91 +1,94 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "product-cna@github.com",
-    "ID": "CVE-2021-22864",
-    "STATE": "PUBLIC",
-    "TITLE": "Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "GitHub Enterprise Server",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_affected": "<",
-                      "version_name": "2.21",
-                      "version_value": "2.21.17"
+    "CVE_data_meta": {
+        "ASSIGNER": "product-cna@github.com",
+        "ID": "CVE-2021-22864",
+        "STATE": "PUBLIC",
+        "TITLE": "Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitHub Enterprise Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "2.21",
+                                            "version_value": "2.21.17"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "2.22",
+                                            "version_value": "2.22.9"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "3.0",
+                                            "version_value": "3.0.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
                     },
-                    {
-                      "version_affected": "<",
-                      "version_name": "2.22",
-                      "version_value": "2.22.9"
-                    },
-                    {
-                      "version_affected": "<",
-                      "version_name": "3.0",
-                      "version_value": "3.0.3"
-                    }
-                  ]
+                    "vendor_name": "GitHub"
                 }
-              }
             ]
-          },
-          "vendor_name": "GitHub"
         }
-      ]
-    }
-  },
-  "credit": [
-    {
-      "lang": "eng",
-      "value": "yvvdwf"
-    }
-  ],
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to code execution on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.3 and was fixed in 3.0.3, 2.22.9, and 2.21.17. This vulnerability was reported via the GitHub Bug Bounty program."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
+    },
+    "credit": [
+        {
             "lang": "eng",
-            "value": "CWE-77: Command Injection - Generic"
-          }
+            "value": "yvvdwf"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to code execution on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.3 and was fixed in 3.0.3, 2.22.9, and 2.21.17. This vulnerability was reported via the GitHub Bug Bounty program."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "refsource": "CONFIRM",
-        "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.17"
-      },
-      {
-        "refsource": "CONFIRM",
-        "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.9"
-      },
-      {
-        "refsource": "CONFIRM",
-        "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.3"
-      }
-    ]
-  },
-  "source": {
-    "discovery": "EXTERNAL"
-  }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-77: Command Injection - Generic"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.17",
+                "name": "https://docs.github.com/en/enterprise-server@2.21/admin/release-notes#2.21.17"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.9",
+                "name": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.9"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.3",
+                "name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.3"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
+    }
 }
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3463.json b/2021/3xxx/CVE-2021-3463.json
new file mode 100644
index 00000000000..49706d6a5b3
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3463.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3463",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3464.json b/2021/3xxx/CVE-2021-3464.json
new file mode 100644
index 00000000000..d340d63d445
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3464.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3464",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 439e158dc3f760637f43c9f2102799c350924531 Mon Sep 17 00:00:00 2001
From: David Brown 
Date: Tue, 23 Mar 2021 16:27:23 -0600
Subject: [PATCH 543/845] Return unused 2020 reservation from Zephyr

CVE-2020-13604 - CVE2020-13612 -> REJECT
---
 2020/13xxx/CVE-2020-13604.json | 6 +++---
 2020/13xxx/CVE-2020-13605.json | 6 +++---
 2020/13xxx/CVE-2020-13606.json | 6 +++---
 2020/13xxx/CVE-2020-13607.json | 6 +++---
 2020/13xxx/CVE-2020-13608.json | 6 +++---
 2020/13xxx/CVE-2020-13609.json | 6 +++---
 2020/13xxx/CVE-2020-13610.json | 6 +++---
 2020/13xxx/CVE-2020-13611.json | 6 +++---
 2020/13xxx/CVE-2020-13612.json | 6 +++---
 9 files changed, 27 insertions(+), 27 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13604.json b/2020/13xxx/CVE-2020-13604.json
index 375a3a3dea9..69b9d3fa2fa 100644
--- a/2020/13xxx/CVE-2020-13604.json
+++ b/2020/13xxx/CVE-2020-13604.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13604",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13605.json b/2020/13xxx/CVE-2020-13605.json
index a8935b32c6f..bb2131b7446 100644
--- a/2020/13xxx/CVE-2020-13605.json
+++ b/2020/13xxx/CVE-2020-13605.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13605",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13606.json b/2020/13xxx/CVE-2020-13606.json
index b90919c320b..d5c3722a846 100644
--- a/2020/13xxx/CVE-2020-13606.json
+++ b/2020/13xxx/CVE-2020-13606.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13606",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13607.json b/2020/13xxx/CVE-2020-13607.json
index dfffb6944ae..f60a0aecdd8 100644
--- a/2020/13xxx/CVE-2020-13607.json
+++ b/2020/13xxx/CVE-2020-13607.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13607",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13608.json b/2020/13xxx/CVE-2020-13608.json
index 7d1e09e511f..0961dc3ee95 100644
--- a/2020/13xxx/CVE-2020-13608.json
+++ b/2020/13xxx/CVE-2020-13608.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13608",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13609.json b/2020/13xxx/CVE-2020-13609.json
index 9d4bd9f8740..8bbf7c620f2 100644
--- a/2020/13xxx/CVE-2020-13609.json
+++ b/2020/13xxx/CVE-2020-13609.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13609",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13610.json b/2020/13xxx/CVE-2020-13610.json
index 7cff8b48c4f..8315a406ae4 100644
--- a/2020/13xxx/CVE-2020-13610.json
+++ b/2020/13xxx/CVE-2020-13610.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13610",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13611.json b/2020/13xxx/CVE-2020-13611.json
index ebac1f19db6..791c7e0bc05 100644
--- a/2020/13xxx/CVE-2020-13611.json
+++ b/2020/13xxx/CVE-2020-13611.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13611",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2020/13xxx/CVE-2020-13612.json b/2020/13xxx/CVE-2020-13612.json
index 7a56ac047e0..e83669ad76a 100644
--- a/2020/13xxx/CVE-2020-13612.json
+++ b/2020/13xxx/CVE-2020-13612.json
@@ -5,14 +5,14 @@
     "CVE_data_meta": {
         "ID": "CVE-2020-13612",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "REJECT"
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
             }
         ]
     }
-}
\ No newline at end of file
+}

From 269fb0362c9c7fd5900530f76c46589b1c0da54e Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 23 Mar 2021 16:42:18 -0600
Subject: [PATCH 544/845] Add CVE-2021-21380 for GHSA-79rg-7mv3-jrr5

---
 2021/21xxx/CVE-2021-21380.json | 82 +++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21380.json b/2021/21xxx/CVE-2021-21380.json
index 53fdae25f51..dc9e2c028d6 100644
--- a/2021/21xxx/CVE-2021-21380.json
+++ b/2021/21xxx/CVE-2021-21380.json
@@ -1,18 +1,88 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21380",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Rating Script Service expose XWiki to SQL injection"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "xwiki-platform",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 12.9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "xwiki"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of XWiki Platform (and only those with the Ratings API installed), the Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments. \nThis might lead to an SQL script injection quite easily for any user having Script rights on XWiki. The problem has been patched in XWiki 12.9RC1. The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 7.7,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-89 SQL Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-79rg-7mv3-jrr5",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-79rg-7mv3-jrr5"
+            },
+            {
+                "name": "https://jira.xwiki.org/browse/XWIKI-17662",
+                "refsource": "MISC",
+                "url": "https://jira.xwiki.org/browse/XWIKI-17662"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-79rg-7mv3-jrr5",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 69e594e6f571b14f18ce32c448d9f1b16a3d5c44 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 23 Mar 2021 23:00:44 +0000
Subject: [PATCH 545/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21380.json | 2 +-
 2021/26xxx/CVE-2021-26117.json | 5 +++++
 2 files changed, 6 insertions(+), 1 deletion(-)

diff --git a/2021/21xxx/CVE-2021-21380.json b/2021/21xxx/CVE-2021-21380.json
index dc9e2c028d6..ce7d2ccd8a4 100644
--- a/2021/21xxx/CVE-2021-21380.json
+++ b/2021/21xxx/CVE-2021-21380.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of XWiki Platform (and only those with the Ratings API installed), the Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments. \nThis might lead to an SQL script injection quite easily for any user having Script rights on XWiki. The problem has been patched in XWiki 12.9RC1. The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager."
+                "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of XWiki Platform (and only those with the Ratings API installed), the Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments. This might lead to an SQL script injection quite easily for any user having Script rights on XWiki. The problem has been patched in XWiki 12.9RC1. The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager."
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26117.json b/2021/26xxx/CVE-2021-26117.json
index 51cd5c308f8..e33a0c66e4d 100644
--- a/2021/26xxx/CVE-2021-26117.json
+++ b/2021/26xxx/CVE-2021-26117.json
@@ -104,6 +104,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[activemq-gitbox] 20210323 [GitHub] [activemq-artemis] trevorlinton opened a new pull request #3515: Update activmq5 version to fix CVE-2021-26117",
+                "url": "https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E"
             }
         ]
     },

From da79777b9f8bc872f3c8f82b1d24f7baf7e01c33 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 01:00:41 +0000
Subject: [PATCH 546/845] "-Synchronized-Data."

---
 2020/25xxx/CVE-2020-25666.json | 5 +++++
 2020/25xxx/CVE-2020-25675.json | 5 +++++
 2020/25xxx/CVE-2020-25676.json | 5 +++++
 2020/27xxx/CVE-2020-27754.json | 5 +++++
 2020/27xxx/CVE-2020-27757.json | 5 +++++
 2020/27xxx/CVE-2020-27758.json | 5 +++++
 2020/27xxx/CVE-2020-27759.json | 5 +++++
 2020/27xxx/CVE-2020-27761.json | 5 +++++
 2020/27xxx/CVE-2020-27762.json | 5 +++++
 2020/27xxx/CVE-2020-27764.json | 5 +++++
 2020/27xxx/CVE-2020-27766.json | 5 +++++
 2020/27xxx/CVE-2020-27767.json | 5 +++++
 2020/27xxx/CVE-2020-27768.json | 5 +++++
 2020/27xxx/CVE-2020-27770.json | 5 +++++
 2020/27xxx/CVE-2020-27771.json | 5 +++++
 2020/27xxx/CVE-2020-27772.json | 5 +++++
 2020/27xxx/CVE-2020-27774.json | 5 +++++
 2020/27xxx/CVE-2020-27775.json | 5 +++++
 2021/20xxx/CVE-2021-20176.json | 5 +++++
 2021/20xxx/CVE-2021-20241.json | 5 +++++
 2021/20xxx/CVE-2021-20244.json | 5 +++++
 2021/20xxx/CVE-2021-20246.json | 5 +++++
 22 files changed, 110 insertions(+)

diff --git a/2020/25xxx/CVE-2020-25666.json b/2020/25xxx/CVE-2020-25666.json
index 3180c3e144a..c8582a96c48 100644
--- a/2020/25xxx/CVE-2020-25666.json
+++ b/2020/25xxx/CVE-2020-25666.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1891612",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891612"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25675.json b/2020/25xxx/CVE-2020-25675.json
index 1bfec57c8ba..151d71eba73 100644
--- a/2020/25xxx/CVE-2020-25675.json
+++ b/2020/25xxx/CVE-2020-25675.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1891933",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891933"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25676.json b/2020/25xxx/CVE-2020-25676.json
index 639aa1f4bc1..abe3d1d08a1 100644
--- a/2020/25xxx/CVE-2020-25676.json
+++ b/2020/25xxx/CVE-2020-25676.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1891934",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891934"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27754.json b/2020/27xxx/CVE-2020-27754.json
index 8e57823e8fa..3fa4abfb56a 100644
--- a/2020/27xxx/CVE-2020-27754.json
+++ b/2020/27xxx/CVE-2020-27754.json
@@ -51,6 +51,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894231",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894231"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27757.json b/2020/27xxx/CVE-2020-27757.json
index 36c82f384c1..f006f888b59 100644
--- a/2020/27xxx/CVE-2020-27757.json
+++ b/2020/27xxx/CVE-2020-27757.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894234",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894234"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27758.json b/2020/27xxx/CVE-2020-27758.json
index 4e13a7fda3c..8edc79da6d1 100644
--- a/2020/27xxx/CVE-2020-27758.json
+++ b/2020/27xxx/CVE-2020-27758.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894236",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894236"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27759.json b/2020/27xxx/CVE-2020-27759.json
index 2b4eb26cd4c..8fa8c21b806 100644
--- a/2020/27xxx/CVE-2020-27759.json
+++ b/2020/27xxx/CVE-2020-27759.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894238",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894238"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27761.json b/2020/27xxx/CVE-2020-27761.json
index 4c79a2e0353..5dafb9b4d30 100644
--- a/2020/27xxx/CVE-2020-27761.json
+++ b/2020/27xxx/CVE-2020-27761.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894679",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894679"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27762.json b/2020/27xxx/CVE-2020-27762.json
index 94aa411dd30..cda15b56540 100644
--- a/2020/27xxx/CVE-2020-27762.json
+++ b/2020/27xxx/CVE-2020-27762.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894680",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894680"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27764.json b/2020/27xxx/CVE-2020-27764.json
index 35b37ea331c..5e99342c7b0 100644
--- a/2020/27xxx/CVE-2020-27764.json
+++ b/2020/27xxx/CVE-2020-27764.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5",
                 "url": "https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27766.json b/2020/27xxx/CVE-2020-27766.json
index 4d3e182d216..eec8a7a0aa8 100644
--- a/2020/27xxx/CVE-2020-27766.json
+++ b/2020/27xxx/CVE-2020-27766.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894686",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894686"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27767.json b/2020/27xxx/CVE-2020-27767.json
index ec278a608bd..e4634729f40 100644
--- a/2020/27xxx/CVE-2020-27767.json
+++ b/2020/27xxx/CVE-2020-27767.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894687",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894687"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27768.json b/2020/27xxx/CVE-2020-27768.json
index 159dc8c4987..65ebe4609a3 100644
--- a/2020/27xxx/CVE-2020-27768.json
+++ b/2020/27xxx/CVE-2020-27768.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894689",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894689"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27770.json b/2020/27xxx/CVE-2020-27770.json
index e7cb4dce350..d2af47dd46f 100644
--- a/2020/27xxx/CVE-2020-27770.json
+++ b/2020/27xxx/CVE-2020-27770.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894691",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894691"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27771.json b/2020/27xxx/CVE-2020-27771.json
index 89ea8bf4e7b..19b067c5a24 100644
--- a/2020/27xxx/CVE-2020-27771.json
+++ b/2020/27xxx/CVE-2020-27771.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1898290",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898290"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27772.json b/2020/27xxx/CVE-2020-27772.json
index c2c50082288..a0dab29e53f 100644
--- a/2020/27xxx/CVE-2020-27772.json
+++ b/2020/27xxx/CVE-2020-27772.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1898291",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898291"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27774.json b/2020/27xxx/CVE-2020-27774.json
index c537245390e..f7568033d06 100644
--- a/2020/27xxx/CVE-2020-27774.json
+++ b/2020/27xxx/CVE-2020-27774.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1898296",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898296"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27775.json b/2020/27xxx/CVE-2020-27775.json
index 40951fdd954..11dca7e8c09 100644
--- a/2020/27xxx/CVE-2020-27775.json
+++ b/2020/27xxx/CVE-2020-27775.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1898300",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898300"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20176.json b/2021/20xxx/CVE-2021-20176.json
index ee1d2b345e9..1976027711a 100644
--- a/2021/20xxx/CVE-2021-20176.json
+++ b/2021/20xxx/CVE-2021-20176.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1916610",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916610"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20241.json b/2021/20xxx/CVE-2021-20241.json
index 40c6f6c4205..5336a7a963a 100644
--- a/2021/20xxx/CVE-2021-20241.json
+++ b/2021/20xxx/CVE-2021-20241.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/ImageMagick/ImageMagick/pull/3177",
                 "url": "https://github.com/ImageMagick/ImageMagick/pull/3177"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20244.json b/2021/20xxx/CVE-2021-20244.json
index a5a69c0dbbc..2fab9b44a8b 100644
--- a/2021/20xxx/CVE-2021-20244.json
+++ b/2021/20xxx/CVE-2021-20244.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/ImageMagick/ImageMagick/pull/3194",
                 "url": "https://github.com/ImageMagick/ImageMagick/pull/3194"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20246.json b/2021/20xxx/CVE-2021-20246.json
index 5043e06f11c..1849287cad1 100644
--- a/2021/20xxx/CVE-2021-20246.json
+++ b/2021/20xxx/CVE-2021-20246.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928941",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928941"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
             }
         ]
     },

From 349e18beea78d57e79341bf1751077080f0037fe Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 04:00:40 +0000
Subject: [PATCH 547/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27170.json | 5 +++++
 2020/27xxx/CVE-2020-27171.json | 5 +++++
 2021/20xxx/CVE-2021-20231.json | 5 +++++
 2021/20xxx/CVE-2021-20232.json | 5 +++++
 2021/28xxx/CVE-2021-28950.json | 5 +++++
 5 files changed, 25 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json
index 3a995360954..e6af90327ef 100644
--- a/2020/27xxx/CVE-2020-27170.json
+++ b/2020/27xxx/CVE-2020-27170.json
@@ -66,6 +66,11 @@
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76",
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f0181b8085",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json
index dc13be36d8a..ba90b8e7454 100644
--- a/2020/27xxx/CVE-2020-27171.json
+++ b/2020/27xxx/CVE-2020-27171.json
@@ -66,6 +66,11 @@
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899",
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f0181b8085",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20231.json b/2021/20xxx/CVE-2021-20231.json
index db617395269..12763a46064 100644
--- a/2021/20xxx/CVE-2021-20231.json
+++ b/2021/20xxx/CVE-2021-20231.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10",
                 "url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-18bef34f05",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20232.json b/2021/20xxx/CVE-2021-20232.json
index 45b7333aa95..af057c0b0cd 100644
--- a/2021/20xxx/CVE-2021-20232.json
+++ b/2021/20xxx/CVE-2021-20232.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-18bef34f05",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28950.json b/2021/28xxx/CVE-2021-28950.json
index 683a48bb41f..69617074845 100644
--- a/2021/28xxx/CVE-2021-28950.json
+++ b/2021/28xxx/CVE-2021-28950.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8",
                 "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-f0181b8085",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"
             }
         ]
     }

From 8c081a8114aa880c8c0fa25cbe109841d1020a38 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 05:00:38 +0000
Subject: [PATCH 548/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27170.json | 5 +++++
 2020/27xxx/CVE-2020-27171.json | 5 +++++
 2021/28xxx/CVE-2021-28089.json | 5 +++++
 2021/28xxx/CVE-2021-28090.json | 5 +++++
 2021/28xxx/CVE-2021-28950.json | 5 +++++
 5 files changed, 25 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json
index e6af90327ef..3d880c51ef2 100644
--- a/2020/27xxx/CVE-2020-27170.json
+++ b/2020/27xxx/CVE-2020-27170.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-f0181b8085",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e49da8a226",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json
index ba90b8e7454..b6a4dfca8da 100644
--- a/2020/27xxx/CVE-2020-27171.json
+++ b/2020/27xxx/CVE-2020-27171.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-f0181b8085",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e49da8a226",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28089.json b/2021/28xxx/CVE-2021-28089.json
index a94b94cfcbc..ab80c3461f3 100644
--- a/2021/28xxx/CVE-2021-28089.json
+++ b/2021/28xxx/CVE-2021-28089.json
@@ -61,6 +61,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://blog.torproject.org/node/2009",
                 "url": "https://blog.torproject.org/node/2009"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e68317166d",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28090.json b/2021/28xxx/CVE-2021-28090.json
index 2377848cb23..a684843acf2 100644
--- a/2021/28xxx/CVE-2021-28090.json
+++ b/2021/28xxx/CVE-2021-28090.json
@@ -66,6 +66,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://bugs.torproject.org/tpo/core/tor/40316",
                 "url": "https://bugs.torproject.org/tpo/core/tor/40316"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e68317166d",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28950.json b/2021/28xxx/CVE-2021-28950.json
index 69617074845..4649bab0a76 100644
--- a/2021/28xxx/CVE-2021-28950.json
+++ b/2021/28xxx/CVE-2021-28950.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-f0181b8085",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e49da8a226",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/"
             }
         ]
     }

From a4e3f2e02f76c76db0cfe906e370a73e19def710 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 06:00:39 +0000
Subject: [PATCH 549/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27216.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index 586c2280a1a..5088513bf6f 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -535,6 +535,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210323 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210324 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E"
             }
         ]
     }

From 1d72dc0ffd38b906f3af0f664f744ad11a0154ee Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 07:00:39 +0000
Subject: [PATCH 550/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28967.json | 71 ++++++++++++++++++++++++++++---
 2021/29xxx/CVE-2021-29133.json | 77 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29134.json | 18 ++++++++
 3 files changed, 160 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29133.json
 create mode 100644 2021/29xxx/CVE-2021-29134.json

diff --git a/2021/28xxx/CVE-2021-28967.json b/2021/28xxx/CVE-2021-28967.json
index 35a86864776..9eb0db29f55 100644
--- a/2021/28xxx/CVE-2021-28967.json
+++ b/2021/28xxx/CVE-2021-28967.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28967",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28967",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The unofficial MATLAB extension before 2.0.1 for Visual Studio Code allows attackers to execute arbitrary code via a crafted workspace because of lint configuration settings."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/Gimly/vscode-matlab/releases",
+                "refsource": "MISC",
+                "name": "https://github.com/Gimly/vscode-matlab/releases"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/Gimly/vscode-matlab/commit/fc5dc53397677464099e80629e785a25718bf5ec",
+                "url": "https://github.com/Gimly/vscode-matlab/commit/fc5dc53397677464099e80629e785a25718bf5ec"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/2.txt",
+                "url": "https://vuln.ryotak.me/advisories/2.txt"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://marketplace.visualstudio.com/items/Gimly81.matlab/changelog",
+                "url": "https://marketplace.visualstudio.com/items/Gimly81.matlab/changelog"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29133.json b/2021/29xxx/CVE-2021-29133.json
new file mode 100644
index 00000000000..62bf66f86b6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29133.json
@@ -0,0 +1,77 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29133",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Lack of verification in haserl, a component of Alpine Linux Configuration Framework, before 0.9.36 allows local users to read the contents of any file on the filesystem."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/rapid7/metasploit-framework/pull/14833",
+                "refsource": "MISC",
+                "name": "https://github.com/rapid7/metasploit-framework/pull/14833"
+            },
+            {
+                "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/12539",
+                "refsource": "MISC",
+                "name": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/12539"
+            },
+            {
+                "url": "https://twitter.com/steaIth/status/1364940271054712842",
+                "refsource": "MISC",
+                "name": "https://twitter.com/steaIth/status/1364940271054712842"
+            },
+            {
+                "url": "https://github.com/rapid7/metasploit-framework/pull/14833/commits/5bf6b2d094deb22fa8183ce161b90cbe4fd40a70",
+                "refsource": "MISC",
+                "name": "https://github.com/rapid7/metasploit-framework/pull/14833/commits/5bf6b2d094deb22fa8183ce161b90cbe4fd40a70"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29134.json b/2021/29xxx/CVE-2021-29134.json
new file mode 100644
index 00000000000..fb1050729a5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29134.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29134",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From c68f46dfa0fba88e15df1e909ac6e55dfb336cfa Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 09:00:39 +0000
Subject: [PATCH 551/845] "-Synchronized-Data."

---
 2020/25xxx/CVE-2020-25649.json | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json
index f78846383e1..e3b43000cc5 100644
--- a/2020/25xxx/CVE-2020-25649.json
+++ b/2020/25xxx/CVE-2020-25649.json
@@ -283,6 +283,16 @@
                 "refsource": "MLIST",
                 "name": "[turbine-commits] 20210316 svn commit: r1887732 - in /turbine/fulcrum/trunk/json: ./ jackson/ jackson/src/test/org/apache/fulcrum/json/jackson/ jackson2/ jackson2/src/test/org/apache/fulcrum/json/jackson/ jackson2/src/test/org/apache/fulcrum/json/jackson/mixins/",
                 "url": "https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-notifications] 20210324 [jira] [Created] (IOTDB-1256) Jackson have loopholes CVE-2020-25649",
+                "url": "https://lists.apache.org/thread.html/r765283e145049df9b8998f14dcd444345555aae02b1610cfb3188bf8@%3Cnotifications.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210324 [GitHub] [iotdb] wangchao316 opened a new pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
+                "url": "https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E"
             }
         ]
     },

From aa5443ec7017d629cd7f19cdb15f8cf9ddb409cb Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 13:00:41 +0000
Subject: [PATCH 552/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json |  5 +++
 2021/26xxx/CVE-2021-26295.json |  5 +++
 2021/29xxx/CVE-2021-29025.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29026.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29027.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29028.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29029.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29030.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29031.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29032.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29033.json | 56 ++++++++++++++++++++++++++++++----
 11 files changed, 460 insertions(+), 54 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index b2cb8f0cb48..02965c1f242 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -263,6 +263,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210320 RE: [jira] [Work started] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index fcf8eae56ee..ec3091bcf6c 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -69,6 +69,11 @@
                 "refsource": "MISC",
                 "url": "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E",
                 "name": "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210324 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
+                "url": "https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29025.json b/2021/29xxx/CVE-2021-29025.json
index 51298dabb47..c128c589a63 100644
--- a/2021/29xxx/CVE-2021-29025.json
+++ b/2021/29xxx/CVE-2021-29025.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29025",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29025",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/my_images.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29026.json b/2021/29xxx/CVE-2021-29026.json
index d0b428ccebb..e6911956e9a 100644
--- a/2021/29xxx/CVE-2021-29026.json
+++ b/2021/29xxx/CVE-2021-29026.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29026",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29026",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/permissions.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29027.json b/2021/29xxx/CVE-2021-29027.json
index 6195e7d98f3..dde2cd7d192 100644
--- a/2021/29xxx/CVE-2021-29027.json
+++ b/2021/29xxx/CVE-2021-29027.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29027",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29027",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/index.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29028.json b/2021/29xxx/CVE-2021-29028.json
index 6de68dcbb2e..3a6dc3ac482 100644
--- a/2021/29xxx/CVE-2021-29028.json
+++ b/2021/29xxx/CVE-2021-29028.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29028",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29028",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/user_activity.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29029.json b/2021/29xxx/CVE-2021-29029.json
index beacfd49dfc..ee3f9f21a18 100644
--- a/2021/29xxx/CVE-2021-29029.json
+++ b/2021/29xxx/CVE-2021-29029.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29029",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29029",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/edit_personal_page.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29030.json b/2021/29xxx/CVE-2021-29030.json
index c9a2c06ea86..c33fc796c7a 100644
--- a/2021/29xxx/CVE-2021-29030.json
+++ b/2021/29xxx/CVE-2021-29030.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29030",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29030",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/index.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29031.json b/2021/29xxx/CVE-2021-29031.json
index 62e6c0b2244..f4ff4899e5a 100644
--- a/2021/29xxx/CVE-2021-29031.json
+++ b/2021/29xxx/CVE-2021-29031.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29031",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29031",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/users_import.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29032.json b/2021/29xxx/CVE-2021-29032.json
index 8cfc8f69cfa..9153d46eafc 100644
--- a/2021/29xxx/CVE-2021-29032.json
+++ b/2021/29xxx/CVE-2021-29032.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29032",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29032",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/preferences.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29033.json b/2021/29xxx/CVE-2021-29033.json
index 7ff623b959b..fe57f15240b 100644
--- a/2021/29xxx/CVE-2021-29033.json
+++ b/2021/29xxx/CVE-2021-29033.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29033",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29033",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/edit_group.php URI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md",
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md"
             }
         ]
     }

From 06256bf931005e2e7d52900ae60dc582b1769293 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 14:00:41 +0000
Subject: [PATCH 553/845] "-Synchronized-Data."

---
 2019/17xxx/CVE-2019-17640.json |  5 +++
 2020/13xxx/CVE-2020-13949.json |  5 +++
 2020/25xxx/CVE-2020-25649.json |  5 +++
 2021/27xxx/CVE-2021-27315.json | 56 +++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27316.json | 56 +++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27319.json | 56 +++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27320.json | 61 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28362.json | 61 ++++++++++++++++++++++++++++++----
 8 files changed, 275 insertions(+), 30 deletions(-)

diff --git a/2019/17xxx/CVE-2019-17640.json b/2019/17xxx/CVE-2019-17640.json
index 06479685708..5cfd2290525 100644
--- a/2019/17xxx/CVE-2019-17640.json
+++ b/2019/17xxx/CVE-2019-17640.json
@@ -61,6 +61,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
                 "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E",
+                "url": "https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E"
             }
         ]
     }
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 02965c1f242..fbc4a6a78cf 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -268,6 +268,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210324 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json
index e3b43000cc5..f25e7f8ff08 100644
--- a/2020/25xxx/CVE-2020-25649.json
+++ b/2020/25xxx/CVE-2020-25649.json
@@ -293,6 +293,11 @@
                 "refsource": "MLIST",
                 "name": "[iotdb-reviews] 20210324 [GitHub] [iotdb] wangchao316 opened a new pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
                 "url": "https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210324 [GitHub] [iotdb] wangchao316 closed pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
+                "url": "https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27315.json b/2021/27xxx/CVE-2021-27315.json
index f4fcee9e190..b0ba009599d 100644
--- a/2021/27xxx/CVE-2021-27315.json
+++ b/2021/27xxx/CVE-2021-27315.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27315",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27315",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html",
+                "url": "http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27316.json b/2021/27xxx/CVE-2021-27316.json
index e5befdc8508..908c1355f0b 100644
--- a/2021/27xxx/CVE-2021-27316.json
+++ b/2021/27xxx/CVE-2021-27316.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27316",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27316",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Blind SQL injection in contactus.php in doctor appointment system 1.0 allows an unauthenticated attacker to insert malicious SQL queries via lastname parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html",
+                "url": "http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27319.json b/2021/27xxx/CVE-2021-27319.json
index b7d56822660..ee90d010020 100644
--- a/2021/27xxx/CVE-2021-27319.json
+++ b/2021/27xxx/CVE-2021-27319.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27319",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27319",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via email parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html",
+                "url": "http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27320.json b/2021/27xxx/CVE-2021-27320.json
index 1248bcce919..db13f4f9870 100644
--- a/2021/27xxx/CVE-2021-27320.json
+++ b/2021/27xxx/CVE-2021-27320.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27320",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27320",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via firstname parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html",
+                "refsource": "MISC",
+                "name": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html",
+                "url": "http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28362.json b/2021/28xxx/CVE-2021-28362.json
index 50a2085b810..cab33fa83f1 100644
--- a/2021/28xxx/CVE-2021-28362.json
+++ b/2021/28xxx/CVE-2021-28362.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28362",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28362",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with respect to the available data) at this stage, and these variables are susceptible to integer underflow, it is possible to construct an invalid extension header that will cause memory corruption issues and lead to a Denial-of-Service condition. This is related to rpl-ext-header.c."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.kb.cert.org/vuls/id/815128",
+                "url": "https://www.kb.cert.org/vuls/id/815128"
+            },
+            {
+                "url": "https://github.com/contiki-os/contiki/releases",
+                "refsource": "MISC",
+                "name": "https://github.com/contiki-os/contiki/releases"
             }
         ]
     }

From 835cc7c425484cadbf8939c6faeacc36d6e12555 Mon Sep 17 00:00:00 2001
From: Scott Moore - IBM 
Date: Wed, 24 Mar 2021 10:17:53 -0400
Subject: [PATCH 554/845] IBM20210324-101753

Added CVE-2020-5015
---
 2020/5xxx/CVE-2020-5015.json | 117 ++++++++++++++++++++++++++++++-----
 1 file changed, 102 insertions(+), 15 deletions(-)

diff --git a/2020/5xxx/CVE-2020-5015.json b/2020/5xxx/CVE-2020-5015.json
index a8ff2166fae..7e1f3ad69f6 100644
--- a/2020/5xxx/CVE-2020-5015.json
+++ b/2020/5xxx/CVE-2020-5015.json
@@ -1,18 +1,105 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-5015",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Elastic Storage System 6.0.0 through 6.0.1.2 and IBM Elastic Storage Server 5.3.0 through 5.3.6.2 could allow a remote attacker to cause a denial of service by sending malformed UDP requests.  IBM X-Force ID:  193486.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "vendor_name" : "IBM",
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "5.3.0"
+                              },
+                              {
+                                 "version_value" : "6.0.0"
+                              },
+                              {
+                                 "version_value" : "6.0.1.2"
+                              },
+                              {
+                                 "version_value" : "5.3.6.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Elastic Storage Server"
+                     }
+                  ]
+               }
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "CVE_data_meta" : {
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-23T00:00:00",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2020-5015"
+   },
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Denial of Service"
+               }
+            ]
+         }
+      ]
+   },
+   "data_type" : "CVE",
+   "references" : {
+      "reference_data" : [
+         {
+            "refsource" : "CONFIRM",
+            "url" : "https://www.ibm.com/support/pages/node/6434155",
+            "name" : "https://www.ibm.com/support/pages/node/6434155",
+            "title" : "IBM Security Bulletin 6434155 (Elastic Storage Server)"
+         },
+         {
+            "title" : "IBM Security Bulletin 6434737 (Elastic Storage Server)",
+            "name" : "https://www.ibm.com/support/pages/node/6434737",
+            "url" : "https://www.ibm.com/support/pages/node/6434737",
+            "refsource" : "CONFIRM"
+         },
+         {
+            "refsource" : "XF",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193486",
+            "title" : "X-Force Vulnerability Report",
+            "name" : "ibm-elastic-cve20205015-dos (193486)"
+         }
+      ]
+   },
+   "data_version" : "4.0",
+   "impact" : {
+      "cvssv3" : {
+         "TM" : {
+            "RL" : "O",
+            "E" : "U",
+            "RC" : "C"
+         },
+         "BM" : {
+            "AV" : "N",
+            "S" : "U",
+            "AC" : "L",
+            "C" : "N",
+            "A" : "H",
+            "UI" : "N",
+            "I" : "N",
+            "PR" : "N",
+            "SCORE" : "7.500"
+         }
+      }
+   }
+}

From a62a4430e3cb0b6f50dea118928c06b784812126 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 15:00:42 +0000
Subject: [PATCH 555/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json |   5 +
 2020/5xxx/CVE-2020-5015.json   | 202 ++++++++++++++++-----------------
 2021/29xxx/CVE-2021-29002.json |  56 ++++++++-
 3 files changed, 156 insertions(+), 107 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index fbc4a6a78cf..0741a77d23b 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -273,6 +273,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
+                "url": "https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/5xxx/CVE-2020-5015.json b/2020/5xxx/CVE-2020-5015.json
index 7e1f3ad69f6..94762f94681 100644
--- a/2020/5xxx/CVE-2020-5015.json
+++ b/2020/5xxx/CVE-2020-5015.json
@@ -1,105 +1,105 @@
 {
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Elastic Storage System 6.0.0 through 6.0.1.2 and IBM Elastic Storage Server 5.3.0 through 5.3.6.2 could allow a remote attacker to cause a denial of service by sending malformed UDP requests.  IBM X-Force ID:  193486.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "data_format" : "MITRE",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
+    "description": {
+        "description_data": [
             {
-               "vendor_name" : "IBM",
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "5.3.0"
-                              },
-                              {
-                                 "version_value" : "6.0.0"
-                              },
-                              {
-                                 "version_value" : "6.0.1.2"
-                              },
-                              {
-                                 "version_value" : "5.3.6.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Elastic Storage Server"
-                     }
-                  ]
-               }
+                "value": "IBM Elastic Storage System 6.0.0 through 6.0.1.2 and IBM Elastic Storage Server 5.3.0 through 5.3.6.2 could allow a remote attacker to cause a denial of service by sending malformed UDP requests. IBM X-Force ID: 193486.",
+                "lang": "eng"
             }
-         ]
-      }
-   },
-   "CVE_data_meta" : {
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-23T00:00:00",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2020-5015"
-   },
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Denial of Service"
-               }
+        ]
+    },
+    "data_format": "MITRE",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "IBM",
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.3.0"
+                                        },
+                                        {
+                                            "version_value": "6.0.0"
+                                        },
+                                        {
+                                            "version_value": "6.0.1.2"
+                                        },
+                                        {
+                                            "version_value": "5.3.6.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Elastic Storage Server"
+                            }
+                        ]
+                    }
+                }
             ]
-         }
-      ]
-   },
-   "data_type" : "CVE",
-   "references" : {
-      "reference_data" : [
-         {
-            "refsource" : "CONFIRM",
-            "url" : "https://www.ibm.com/support/pages/node/6434155",
-            "name" : "https://www.ibm.com/support/pages/node/6434155",
-            "title" : "IBM Security Bulletin 6434155 (Elastic Storage Server)"
-         },
-         {
-            "title" : "IBM Security Bulletin 6434737 (Elastic Storage Server)",
-            "name" : "https://www.ibm.com/support/pages/node/6434737",
-            "url" : "https://www.ibm.com/support/pages/node/6434737",
-            "refsource" : "CONFIRM"
-         },
-         {
-            "refsource" : "XF",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193486",
-            "title" : "X-Force Vulnerability Report",
-            "name" : "ibm-elastic-cve20205015-dos (193486)"
-         }
-      ]
-   },
-   "data_version" : "4.0",
-   "impact" : {
-      "cvssv3" : {
-         "TM" : {
-            "RL" : "O",
-            "E" : "U",
-            "RC" : "C"
-         },
-         "BM" : {
-            "AV" : "N",
-            "S" : "U",
-            "AC" : "L",
-            "C" : "N",
-            "A" : "H",
-            "UI" : "N",
-            "I" : "N",
-            "PR" : "N",
-            "SCORE" : "7.500"
-         }
-      }
-   }
-}
+        }
+    },
+    "CVE_data_meta": {
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-23T00:00:00",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2020-5015"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial of Service"
+                    }
+                ]
+            }
+        ]
+    },
+    "data_type": "CVE",
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://www.ibm.com/support/pages/node/6434155",
+                "name": "https://www.ibm.com/support/pages/node/6434155",
+                "title": "IBM Security Bulletin 6434155 (Elastic Storage Server)"
+            },
+            {
+                "title": "IBM Security Bulletin 6434737 (Elastic Storage Server)",
+                "name": "https://www.ibm.com/support/pages/node/6434737",
+                "url": "https://www.ibm.com/support/pages/node/6434737",
+                "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "XF",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193486",
+                "title": "X-Force Vulnerability Report",
+                "name": "ibm-elastic-cve20205015-dos (193486)"
+            }
+        ]
+    },
+    "data_version": "4.0",
+    "impact": {
+        "cvssv3": {
+            "TM": {
+                "RL": "O",
+                "E": "U",
+                "RC": "C"
+            },
+            "BM": {
+                "AV": "N",
+                "S": "U",
+                "AC": "L",
+                "C": "N",
+                "A": "H",
+                "UI": "N",
+                "I": "N",
+                "PR": "N",
+                "SCORE": "7.500"
+            }
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29002.json b/2021/29xxx/CVE-2021-29002.json
index 49db5b23898..0ac8cb6272c 100644
--- a/2021/29xxx/CVE-2021-29002.json
+++ b/2021/29xxx/CVE-2021-29002.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29002",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29002",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the \"form.widgets.site_title\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.exploit-db.com/exploits/49668",
+                "refsource": "MISC",
+                "name": "https://www.exploit-db.com/exploits/49668"
             }
         ]
     }

From 73137431cbb69bc0c507272bd109584c1c222b73 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 16:00:40 +0000
Subject: [PATCH 556/845] "-Synchronized-Data."

---
 2018/14xxx/CVE-2018-14009.json |  5 +++
 2019/19xxx/CVE-2019-19349.json | 55 +++++++++++++++++++++--
 2019/19xxx/CVE-2019-19350.json | 55 +++++++++++++++++++++--
 2020/13xxx/CVE-2020-13949.json | 20 +++++++++
 2020/35xxx/CVE-2020-35337.json | 61 ++++++++++++++++++++++---
 2020/36xxx/CVE-2020-36283.json | 81 ++++++++++++++++++++++++++++++++++
 2021/27xxx/CVE-2021-27208.json |  2 +-
 2021/29xxx/CVE-2021-29135.json | 18 ++++++++
 2021/29xxx/CVE-2021-29136.json | 18 ++++++++
 9 files changed, 302 insertions(+), 13 deletions(-)
 create mode 100644 2020/36xxx/CVE-2020-36283.json
 create mode 100644 2021/29xxx/CVE-2021-29135.json
 create mode 100644 2021/29xxx/CVE-2021-29136.json

diff --git a/2018/14xxx/CVE-2018-14009.json b/2018/14xxx/CVE-2018-14009.json
index d745d0aa4a5..da751d0bb80 100644
--- a/2018/14xxx/CVE-2018-14009.json
+++ b/2018/14xxx/CVE-2018-14009.json
@@ -61,6 +61,11 @@
                 "name": "https://github.com/Codiad/Codiad/issues/1078",
                 "refsource": "MISC",
                 "url": "https://github.com/Codiad/Codiad/issues/1078"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html"
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19349.json b/2019/19xxx/CVE-2019-19349.json
index d5b2fc8634c..81759decb9c 100644
--- a/2019/19xxx/CVE-2019-19349.json
+++ b/2019/19xxx/CVE-2019-19349.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-19349",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "operator-framework/operator-metering",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "as shipped in Red Hat Openshift 4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-266"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793284",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793284"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An insecure modification vulnerability in the /etc/passwd file was found in the container operator-framework/operator-metering as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19350.json b/2019/19xxx/CVE-2019-19350.json
index 8dfa1f385cd..be7fda55b07 100644
--- a/2019/19xxx/CVE-2019-19350.json
+++ b/2019/19xxx/CVE-2019-19350.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-19350",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "openshift/ansible-service-broker",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "as shipped in Red Hat Openshift 4 and 3.11"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-266"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793283",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793283"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ansible-service-broker as shipped in Red Hat Openshift 4 and 3.11. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
             }
         ]
     }
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 0741a77d23b..304c2525fec 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -278,6 +278,26 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
                 "url": "https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
+                "url": "https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
+                "url": "https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
+                "url": "https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
+                "url": "https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/35xxx/CVE-2020-35337.json b/2020/35xxx/CVE-2020-35337.json
index 29466df2ed0..4880118f994 100644
--- a/2020/35xxx/CVE-2020-35337.json
+++ b/2020/35xxx/CVE-2020-35337.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-35337",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-35337",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "ThinkSAAS before 3.38 contains a SQL injection vulnerability through app/topic/action/admin/topic.php via the title parameter, which allows remote attackers to execute arbitrary SQL commands."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/thinksaas/ThinkSAAS/issues/24",
+                "refsource": "MISC",
+                "name": "https://github.com/thinksaas/ThinkSAAS/issues/24"
+            },
+            {
+                "url": "https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html",
+                "refsource": "MISC",
+                "name": "https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36283.json b/2020/36xxx/CVE-2020-36283.json
new file mode 100644
index 00000000000..1c617b1811d
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36283.json
@@ -0,0 +1,81 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2020-36283",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198443",
+                "refsource": "MISC",
+                "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198443"
+            },
+            {
+                "url": "https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf",
+                "refsource": "MISC",
+                "name": "https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:R",
+            "version": "3.1"
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27208.json b/2021/27xxx/CVE-2021-27208.json
index f36b7c96d92..4dd12e7bc74 100644
--- a/2021/27xxx/CVE-2021-27208.json
+++ b/2021/27xxx/CVE-2021-27208.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand\u2019s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification to the Zynq-7000 device is needed to replace the original nand flash memory with a nand flash emulator for this attack to be successful."
+                "value": "When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand\u2019s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification of the board assembly on which the Zynq-7000 SoC device mounted is needed to replace the original NAND flash memory with a NAND flash emulation device for this attack to be successful."
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29135.json b/2021/29xxx/CVE-2021-29135.json
new file mode 100644
index 00000000000..8f40cadfd3c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29135.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29135",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29136.json b/2021/29xxx/CVE-2021-29136.json
new file mode 100644
index 00000000000..e3129549e28
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29136.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29136",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From bdb90878ed6c4690e4e1d61e91135b277575fa62 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 17:00:39 +0000
Subject: [PATCH 557/845] "-Synchronized-Data."

---
 2019/19xxx/CVE-2019-19352.json | 55 ++++++++++++++++++--
 2019/19xxx/CVE-2019-19353.json | 60 ++++++++++++++++++++--
 2019/19xxx/CVE-2019-19354.json | 60 ++++++++++++++++++++--
 2020/13xxx/CVE-2020-13949.json |  5 ++
 2020/15xxx/CVE-2020-15809.json | 61 +++++++++++++++++++---
 2020/7xxx/CVE-2020-7839.json   | 92 +++++++++++++++++++++++++++++++---
 2021/22xxx/CVE-2021-22176.json | 90 +++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22178.json | 90 +++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22179.json | 90 +++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22185.json | 87 ++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22186.json | 85 +++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22192.json | 90 +++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22193.json | 90 +++++++++++++++++++++++++++++++--
 13 files changed, 906 insertions(+), 49 deletions(-)

diff --git a/2019/19xxx/CVE-2019-19352.json b/2019/19xxx/CVE-2019-19352.json
index cd808385471..9a3d736beb0 100644
--- a/2019/19xxx/CVE-2019-19352.json
+++ b/2019/19xxx/CVE-2019-19352.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-19352",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "operator-framework/presto",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "as shipped in Red Hat Openshift 4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-266"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793281",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793281"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/presto as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19353.json b/2019/19xxx/CVE-2019-19353.json
index 556d44d9561..ff17ea0964b 100644
--- a/2019/19xxx/CVE-2019-19353.json
+++ b/2019/19xxx/CVE-2019-19353.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-19353",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "operator-framework/hive",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "as shipped in Red Hat Openshift 4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-266"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793279",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793279"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://access.redhat.com/articles/4859371",
+                "url": "https://access.redhat.com/articles/4859371"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/hive as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19354.json b/2019/19xxx/CVE-2019-19354.json
index 3171c75a696..ae7fdd861ff 100644
--- a/2019/19xxx/CVE-2019-19354.json
+++ b/2019/19xxx/CVE-2019-19354.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2019-19354",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "operator-framework/hadoop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "as shipped in Red Hat Openshift 4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-266"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791534"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://access.redhat.com/articles/4859371",
+                "url": "https://access.redhat.com/articles/4859371"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793278",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793278"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/hadoop as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
             }
         ]
     }
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 304c2525fec..bce896fff96 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -298,6 +298,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
                 "url": "https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
+                "url": "https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/15xxx/CVE-2020-15809.json b/2020/15xxx/CVE-2020-15809.json
index ec07cf8abdd..a7a41176740 100644
--- a/2020/15xxx/CVE-2020-15809.json
+++ b/2020/15xxx/CVE-2020-15809.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-15809",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-15809",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "spxmanage on certain SpinetiX devices allows requests that access unintended resources because of SSRF and Path Traversal. This affects HMP350, HMP300, and DiVA through 4.5.2-1.0.36229; HMP400 and HMP400W through 4.5.2-1.0.2-1eb2ffbd; and DSOS through 4.5.2-1.0.2-1eb2ffbd."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.spinetix.com/wiki/SpinetiX-SA-20:01",
+                "url": "https://support.spinetix.com/wiki/SpinetiX-SA-20:01"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://support.spinetix.com/wiki/DSOS_release_notes",
+                "url": "https://support.spinetix.com/wiki/DSOS_release_notes"
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7839.json b/2020/7xxx/CVE-2020-7839.json
index e2593d4ba04..4c05b7a433c 100644
--- a/2020/7xxx/CVE-2020-7839.json
+++ b/2020/7xxx/CVE-2020-7839.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "vuln@krcert.or.kr",
         "ID": "CVE-2020-7839",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "MarkAny MaEPSBroker Command Injection Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "MaEPSBroker",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "2.5.0.31",
+                                            "version_value": "2.5.0.32"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "MarkAny"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks to Jongsub Park for reporting this vulnerability"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In MaEPSBroker 2.5.0.31 and prior, a command injection vulnerability caused by improper input validation checks when parsing brokerCommand parameter."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20 Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://www.markany.com/",
+                "name": "https://www.markany.com/"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35946",
+                "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35946"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22176.json b/2021/22xxx/CVE-2021-22176.json
index 3194cebcec8..e5647021032 100644
--- a/2021/22xxx/CVE-2021-22176.json
+++ b/2021/22xxx/CVE-2021-22176.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22176",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.8.0, <13.8.4"
+                                        },
+                                        {
+                                            "version_value": ">=13.7.0, <13.7.7"
+                                        },
+                                        {
+                                            "version_value": ">=3.0.1, <13.6.7"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper access control in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/243491",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/243491",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/962604",
+                "url": "https://hackerone.com/reports/962604",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22176.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22176.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue has been discovered in GitLab affecting all versions starting with 3.0.1. Improper access control allows demoted project members to access details on authored merge requests"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.2,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks muthu_prakash for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22178.json b/2021/22xxx/CVE-2021-22178.json
index 229a7eb44ce..9de107fe93f 100644
--- a/2021/22xxx/CVE-2021-22178.json
+++ b/2021/22xxx/CVE-2021-22178.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22178",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.2, <13.6.7"
+                                        },
+                                        {
+                                            "version_value": ">=13.7, <13.7.7"
+                                        },
+                                        {
+                                            "version_value": ">=13.8, <13.8.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Server-side request forgery (ssrf) in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/284819",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/284819",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/1037411",
+                "url": "https://hackerone.com/reports/1037411",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22178.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22178.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue has been discovered in GitLab affecting all versions starting from 13.2. Gitlab was vulnerable to SRRF attack through the Prometheus integration."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.9,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks [@yvvdwf](https://hackerone.com/yvvdwf?type=user) for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22179.json b/2021/22xxx/CVE-2021-22179.json
index 339180595ec..e07e0fcf650 100644
--- a/2021/22xxx/CVE-2021-22179.json
+++ b/2021/22xxx/CVE-2021-22179.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22179",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.8, <13.8.2"
+                                        },
+                                        {
+                                            "version_value": ">=13.7, <13.7.6"
+                                        },
+                                        {
+                                            "version_value": ">=12.2, <13.6.6"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Server-side request forgery (ssrf) in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/293733",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/293733",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/1055816",
+                "url": "https://hackerone.com/reports/1055816",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22179.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22179.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability was discovered in GitLab versions before 12.2. GitLab was vulnerable to a SSRF attack through the Outbound Requests feature."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 5.3,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22185.json b/2021/22xxx/CVE-2021-22185.json
index 12113221ab3..c78b953c917 100644
--- a/2021/22xxx/CVE-2021-22185.json
+++ b/2021/22xxx/CVE-2021-22185.json
@@ -4,15 +4,94 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22185",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.8, <13.8.5"
+                                        },
+                                        {
+                                            "version_value": ">=13.9, <13.9.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/299143",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/299143",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/1087061",
+                "url": "https://hackerone.com/reports/1087061",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22185.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22185.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Insufficient input sanitization in wikis in GitLab version 13.8 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted commit to a wiki"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "version": "3.1",
+            "baseScore": 5.4,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks @yvvdwf for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22186.json b/2021/22xxx/CVE-2021-22186.json
index 2bb365b5f6c..4cf57bae6ed 100644
--- a/2021/22xxx/CVE-2021-22186.json
+++ b/2021/22xxx/CVE-2021-22186.json
@@ -4,15 +4,92 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22186",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=9.4, <13.7.8"
+                                        },
+                                        {
+                                            "version_value": ">=13.8, <13.8.5"
+                                        },
+                                        {
+                                            "version_value": ">=13.9, <13.9.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper authorization in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/321653",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/321653",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22186.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22186.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An authorization issue in GitLab CE/EE version 9.4 and up allowed a group maintainer to modify group CI/CD variables which should be restricted to group owners"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.8,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks to a customer for reporting this vulnerability to the GitLab team"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22192.json b/2021/22xxx/CVE-2021-22192.json
index faeb527d35a..bc6fb1deb43 100644
--- a/2021/22xxx/CVE-2021-22192.json
+++ b/2021/22xxx/CVE-2021-22192.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22192",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.2, <13.7.9"
+                                        },
+                                        {
+                                            "version_value": ">=13.8, <13.8.6"
+                                        },
+                                        {
+                                            "version_value": ">=13.9, <13.9.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper control of generation of code ('code injection') in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/324452",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/324452",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/1125425",
+                "url": "https://hackerone.com/reports/1125425",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22192.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22192.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 9.9,
+            "baseSeverity": "CRITICAL"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks @vakzz for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22193.json b/2021/22xxx/CVE-2021-22193.json
index 0cde03e8639..0ea64bab8fa 100644
--- a/2021/22xxx/CVE-2021-22193.json
+++ b/2021/22xxx/CVE-2021-22193.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22193",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.8, <13.8.2"
+                                        },
+                                        {
+                                            "version_value": ">=13.7, <13.7.6"
+                                        },
+                                        {
+                                            "version_value": ">=7.1, <13.6.6"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information exposure through an error message in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/12560",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/12560",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/605608",
+                "url": "https://hackerone.com/reports/605608",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22193.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22193.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue has been discovered in GitLab affecting all versions starting with 7.1. A member of a private group was able to validate the use of a specific name for private project."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "version": "3.1",
+            "baseScore": 3.5,
+            "baseSeverity": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks [milindpurswani](https://hackerone.com/milindpurswani) for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file

From 8c393d4cd07edb5a1270c684f6b80b33dd28b7f5 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 18:00:39 +0000
Subject: [PATCH 558/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22169.json | 85 ++++++++++++++++++++++++++++++++--
 2021/29xxx/CVE-2021-29137.json | 18 +++++++
 2021/29xxx/CVE-2021-29138.json | 18 +++++++
 2021/29xxx/CVE-2021-29139.json | 18 +++++++
 2021/29xxx/CVE-2021-29140.json | 18 +++++++
 2021/29xxx/CVE-2021-29141.json | 18 +++++++
 2021/29xxx/CVE-2021-29142.json | 18 +++++++
 2021/29xxx/CVE-2021-29143.json | 18 +++++++
 2021/29xxx/CVE-2021-29144.json | 18 +++++++
 2021/29xxx/CVE-2021-29145.json | 18 +++++++
 2021/29xxx/CVE-2021-29146.json | 18 +++++++
 2021/29xxx/CVE-2021-29147.json | 18 +++++++
 2021/29xxx/CVE-2021-29148.json | 18 +++++++
 2021/29xxx/CVE-2021-29149.json | 18 +++++++
 2021/29xxx/CVE-2021-29150.json | 18 +++++++
 2021/29xxx/CVE-2021-29151.json | 18 +++++++
 2021/29xxx/CVE-2021-29152.json | 18 +++++++
 17 files changed, 369 insertions(+), 4 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29137.json
 create mode 100644 2021/29xxx/CVE-2021-29138.json
 create mode 100644 2021/29xxx/CVE-2021-29139.json
 create mode 100644 2021/29xxx/CVE-2021-29140.json
 create mode 100644 2021/29xxx/CVE-2021-29141.json
 create mode 100644 2021/29xxx/CVE-2021-29142.json
 create mode 100644 2021/29xxx/CVE-2021-29143.json
 create mode 100644 2021/29xxx/CVE-2021-29144.json
 create mode 100644 2021/29xxx/CVE-2021-29145.json
 create mode 100644 2021/29xxx/CVE-2021-29146.json
 create mode 100644 2021/29xxx/CVE-2021-29147.json
 create mode 100644 2021/29xxx/CVE-2021-29148.json
 create mode 100644 2021/29xxx/CVE-2021-29149.json
 create mode 100644 2021/29xxx/CVE-2021-29150.json
 create mode 100644 2021/29xxx/CVE-2021-29151.json
 create mode 100644 2021/29xxx/CVE-2021-29152.json

diff --git a/2021/22xxx/CVE-2021-22169.json b/2021/22xxx/CVE-2021-22169.json
index de9b99d3f2c..36eaf92a13c 100644
--- a/2021/22xxx/CVE-2021-22169.json
+++ b/2021/22xxx/CVE-2021-22169.json
@@ -4,15 +4,92 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22169",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.4, <13.5.6"
+                                        },
+                                        {
+                                            "version_value": ">=13.6.0, <13.6.4"
+                                        },
+                                        {
+                                            "version_value": ">=13.7.0, <13.7.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information exposure through an error message in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/289930",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/289930",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22169.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22169.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was identified in GitLab EE 13.4 or later which leaked internal IP address via error messages."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.2,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "This vulnerability has been discovered internally by the GitLab team"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29137.json b/2021/29xxx/CVE-2021-29137.json
new file mode 100644
index 00000000000..5da93299152
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29137.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29137",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29138.json b/2021/29xxx/CVE-2021-29138.json
new file mode 100644
index 00000000000..3f4c356b346
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29138.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29138",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29139.json b/2021/29xxx/CVE-2021-29139.json
new file mode 100644
index 00000000000..3cb067c1c28
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29139.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29139",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29140.json b/2021/29xxx/CVE-2021-29140.json
new file mode 100644
index 00000000000..29ada3340e7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29140.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29140",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29141.json b/2021/29xxx/CVE-2021-29141.json
new file mode 100644
index 00000000000..b4658e6009b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29141.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29141",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29142.json b/2021/29xxx/CVE-2021-29142.json
new file mode 100644
index 00000000000..f2f5fd83731
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29142.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29142",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29143.json b/2021/29xxx/CVE-2021-29143.json
new file mode 100644
index 00000000000..82d83985ea2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29143.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29143",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29144.json b/2021/29xxx/CVE-2021-29144.json
new file mode 100644
index 00000000000..c3532b426fd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29144.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29144",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29145.json b/2021/29xxx/CVE-2021-29145.json
new file mode 100644
index 00000000000..b8d29316406
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29145.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29145",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29146.json b/2021/29xxx/CVE-2021-29146.json
new file mode 100644
index 00000000000..cf0eddeb340
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29146.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29146",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29147.json b/2021/29xxx/CVE-2021-29147.json
new file mode 100644
index 00000000000..b4214eec894
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29147.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29147",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29148.json b/2021/29xxx/CVE-2021-29148.json
new file mode 100644
index 00000000000..1f5b3e01380
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29148.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29148",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29149.json b/2021/29xxx/CVE-2021-29149.json
new file mode 100644
index 00000000000..4c6ce4815a7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29149.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29149",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29150.json b/2021/29xxx/CVE-2021-29150.json
new file mode 100644
index 00000000000..c0e1ded24e6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29150.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29150",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29151.json b/2021/29xxx/CVE-2021-29151.json
new file mode 100644
index 00000000000..bf60bdab52d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29151.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29151",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29152.json b/2021/29xxx/CVE-2021-29152.json
new file mode 100644
index 00000000000..3a1820c74e3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29152.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29152",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 9d8080793158807d8e7b31977e2131b4b91379ff Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 19:00:40 +0000
Subject: [PATCH 559/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29153.json | 18 ++++++++++++++++++
 2021/3xxx/CVE-2021-3465.json   | 18 ++++++++++++++++++
 2021/3xxx/CVE-2021-3466.json   | 18 ++++++++++++++++++
 2021/3xxx/CVE-2021-3467.json   | 18 ++++++++++++++++++
 4 files changed, 72 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29153.json
 create mode 100644 2021/3xxx/CVE-2021-3465.json
 create mode 100644 2021/3xxx/CVE-2021-3466.json
 create mode 100644 2021/3xxx/CVE-2021-3467.json

diff --git a/2021/29xxx/CVE-2021-29153.json b/2021/29xxx/CVE-2021-29153.json
new file mode 100644
index 00000000000..b39bdb45515
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29153.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29153",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3465.json b/2021/3xxx/CVE-2021-3465.json
new file mode 100644
index 00000000000..fa1db563bbd
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3465.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3465",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3466.json b/2021/3xxx/CVE-2021-3466.json
new file mode 100644
index 00000000000..3c0b7c51287
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3466.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3466",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3467.json b/2021/3xxx/CVE-2021-3467.json
new file mode 100644
index 00000000000..96aea2c5d88
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3467.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3467",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 4ead11dc5473dd29533fd2566eb092b92554e6ae Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:43:49 +0000
Subject: [PATCH 560/845] Adding Cisco CVE-2021-1220

---
 2021/1xxx/CVE-2021-1220.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1220.json b/2021/1xxx/CVE-2021-1220.json
index 47fb32cdcb2..1540f39d318 100644
--- a/2021/1xxx/CVE-2021-1220.json
+++ b/2021/1xxx/CVE-2021-1220.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1220",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Web UI Denial of Service Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition.\r These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality.\r Note: These vulnerabilities do not affect the console connection.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "4.3",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Web UI Denial of Service Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-webui-dos-z9yqYQAn"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-xe-webui-dos-z9yqYQAn",
+        "defect": [
+            [
+                "CSCvu94117",
+                "CSCvu99729"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 25caa179937c13e0bb30a6fea36d17a973a47b5e Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:03 +0000
Subject: [PATCH 561/845] Adding Cisco CVE-2021-1281

---
 2021/1xxx/CVE-2021-1281.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1281.json b/2021/1xxx/CVE-2021-1281.json
index ee5c4f4050f..c2dd4e71963 100644
--- a/2021/1xxx/CVE-2021-1281.json
+++ b/2021/1xxx/CVE-2021-1281.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1281",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Privilege Escalation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in CLI management in Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system as the root user.\r This vulnerability is due to the way the software handles concurrent CLI sessions. An attacker could exploit this vulnerability by authenticating to the device as an administrative user and executing a sequence of commands. A successful exploit could allow the attacker to obtain access to the underlying operating system as the root user.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-399"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Privilege Escalation Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-clipriv-9TO2QGVp"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-sdwan-clipriv-9TO2QGVp",
+        "defect": [
+            [
+                "CSCvv65659"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 2e4e44aee9f8bfecac93301870f1eab00c852562 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:13 +0000
Subject: [PATCH 562/845] Adding Cisco CVE-2021-1352

---
 2021/1xxx/CVE-2021-1352.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1352.json b/2021/1xxx/CVE-2021-1352.json
index 65e7976ec46..23b67a6179a 100644
--- a/2021/1xxx/CVE-2021-1352.json
+++ b/2021/1xxx/CVE-2021-1352.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1352",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software DECnet Phase IV/OSI Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the DECnet Phase IV and DECnet/OSI protocol processing of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r The vulnerability is due to insufficient input validation of DECnet traffic that is received by an affected device. An attacker could exploit this vulnerability by sending DECnet traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.4",
+            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-823"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software DECnet Phase IV/OSI Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-decnet-dos-cuPWDkyL"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-decnet-dos-cuPWDkyL",
+        "defect": [
+            [
+                "CSCvv51476"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 264d2e28377e40c5834d377ac8d2c2af65baa7e1 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:22 +0000
Subject: [PATCH 563/845] Adding Cisco CVE-2021-1356

---
 2021/1xxx/CVE-2021-1356.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1356.json b/2021/1xxx/CVE-2021-1356.json
index 31cd4af85eb..9dee39eae4c 100644
--- a/2021/1xxx/CVE-2021-1356.json
+++ b/2021/1xxx/CVE-2021-1356.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1356",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Web UI Denial of Service Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition.\r These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality.\r Note: These vulnerabilities do not affect the console connection.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "4.3",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Web UI Denial of Service Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-webui-dos-z9yqYQAn"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-xe-webui-dos-z9yqYQAn",
+        "defect": [
+            [
+                "CSCvu94117",
+                "CSCvu99729"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From fdc740831310fe0e49e8ccf751f9ca943b7f3efe Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:31 +0000
Subject: [PATCH 564/845] Adding Cisco CVE-2021-1371

---
 2021/1xxx/CVE-2021-1371.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1371.json b/2021/1xxx/CVE-2021-1371.json
index d837b35f563..82879c8748b 100644
--- a/2021/1xxx/CVE-2021-1371.json
+++ b/2021/1xxx/CVE-2021-1371.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1371",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Console Privilege Escalation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration.\r This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.6",
+            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-269"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Console Privilege Escalation Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-esc-rSNVvTf9"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-sdwan-esc-rSNVvTf9",
+        "defect": [
+            [
+                "CSCvv43400"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 005f1138fae4f78023ae3378b1186c5291a462e1 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:40 +0000
Subject: [PATCH 565/845] Adding Cisco CVE-2021-1373

---
 2021/1xxx/CVE-2021-1373.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1373.json b/2021/1xxx/CVE-2021-1373.json
index 767d8439be1..a4a7e89dfef 100644
--- a/2021/1xxx/CVE-2021-1373.json
+++ b/2021/1xxx/CVE-2021-1373.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1373",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "8.6",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-126"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-2OA3JgKS"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ewlc-capwap-dos-2OA3JgKS",
+        "defect": [
+            [
+                "CSCvv41608"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From a3d24ab1c35c7234ee2e8a41d198055a09dc784a Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:49 +0000
Subject: [PATCH 566/845] Adding Cisco CVE-2021-1374

---
 2021/1xxx/CVE-2021-1374.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1374.json b/2021/1xxx/CVE-2021-1374.json
index fd125b0f751..c87d3b28d10 100644
--- a/2021/1xxx/CVE-2021-1374.json
+++ b/2021/1xxx/CVE-2021-1374.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1374",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Stored Cross-Site Scripting Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the web-based management interface of Cisco IOS XE Wireless Controller software for the Catalyst 9000 Family of switches could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the web-based management interface of an affected device.\r The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by authenticating to the device as a high-privileged user, adding certain configurations with malicious code in one of its fields, and persuading another user to click on it. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "4.8",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Stored Cross-Site Scripting Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-xss-cAfMtCzv"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ewlc-xss-cAfMtCzv",
+        "defect": [
+            [
+                "CSCvv02020"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From ebf7cc527d51ea3d23160fd6bfca500f26de8893 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:44:58 +0000
Subject: [PATCH 567/845] Adding Cisco CVE-2021-1375

---
 2021/1xxx/CVE-2021-1375.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1375.json b/2021/1xxx/CVE-2021-1375.json
index 46717164797..f00c732a089 100644
--- a/2021/1xxx/CVE-2021-1375.json
+++ b/2021/1xxx/CVE-2021-1375.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1375",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Fast Reload Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device.\r These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.7",
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-347"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-fast-Zqr6DD5",
+        "defect": [
+            [
+                "CSCvr71885",
+                "CSCvu85472"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From e1f397e34fb1d0106728e808c5c763a40847e156 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:45:07 +0000
Subject: [PATCH 568/845] Adding Cisco CVE-2021-1376

---
 2021/1xxx/CVE-2021-1376.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1376.json b/2021/1xxx/CVE-2021-1376.json
index cc473808a56..868bad8f1a4 100644
--- a/2021/1xxx/CVE-2021-1376.json
+++ b/2021/1xxx/CVE-2021-1376.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1376",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Fast Reload Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device.\r These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.7",
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-347"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-fast-Zqr6DD5",
+        "defect": [
+            [
+                "CSCvr71885",
+                "CSCvu85472"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 1e8c5494e227afc58a923fe648afb20ca4580838 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:45:16 +0000
Subject: [PATCH 569/845] Adding Cisco CVE-2021-1377

---
 2021/1xxx/CVE-2021-1377.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1377.json b/2021/1xxx/CVE-2021-1377.json
index d1863c819b7..65787727577 100644
--- a/2021/1xxx/CVE-2021-1377.json
+++ b/2021/1xxx/CVE-2021-1377.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1377",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets.\r This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.8",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-399"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arp-mtfhBfjE"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-arp-mtfhBfjE",
+        "defect": [
+            [
+                "CSCvv75175"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 8b87ba51d77ccda8d133a4f1a22273d0aef72009 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:45:25 +0000
Subject: [PATCH 570/845] Adding Cisco CVE-2021-1381

---
 2021/1xxx/CVE-2021-1381.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1381.json b/2021/1xxx/CVE-2021-1381.json
index f451722d67f..a4fa60af01f 100644
--- a/2021/1xxx/CVE-2021-1381.json
+++ b/2021/1xxx/CVE-2021-1381.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1381",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Active Debug Code Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with high privileges or an unauthenticated attacker with physical access to the device to open a debugging console.\r The vulnerability is due to insufficient command authorization restrictions. An attacker could exploit this vulnerability by running commands on the hardware platform to open a debugging console. A successful exploit could allow the attacker to access a debugging console.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.1",
+            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-489"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Active Debug Code Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-BLKH-Ouvrnf2s"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-XE-BLKH-Ouvrnf2s",
+        "defect": [
+            [
+                "CSCvu78908"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 872bfb39d4ca5198ff8d6e9bd329a1f23f3795bd Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:45:34 +0000
Subject: [PATCH 571/845] Adding Cisco CVE-2021-1382

---
 2021/1xxx/CVE-2021-1382.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1382.json b/2021/1xxx/CVE-2021-1382.json
index 97806f1ea26..5ff5d117aa1 100644
--- a/2021/1xxx/CVE-2021-1382.json
+++ b/2021/1xxx/CVE-2021-1382.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1382",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Command Injection Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system.\r This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.0",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-77"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Command Injection Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-t68PPW7m"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-xesdwcinj-t68PPW7m",
+        "defect": [
+            [
+                "CSCvw64828"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From e989003cb86047ffd5874c78a6d06bd158d25744 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:45:43 +0000
Subject: [PATCH 572/845] Adding Cisco CVE-2021-1383

---
 2021/1xxx/CVE-2021-1383.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1383.json b/2021/1xxx/CVE-2021-1383.json
index 3a594e0ef13..e4266b64fb3 100644
--- a/2021/1xxx/CVE-2021-1383.json
+++ b/2021/1xxx/CVE-2021-1383.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1383",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges.\r These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.0",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwpinj-V4weeqzU"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-xesdwpinj-V4weeqzU",
+        "defect": [
+            [
+                "CSCvk59304",
+                "CSCvw64834"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 5876afe73697d45f0b8da9b2e4e1ccd817553cc5 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:45:52 +0000
Subject: [PATCH 573/845] Adding Cisco CVE-2021-1384

---
 2021/1xxx/CVE-2021-1384.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1384.json b/2021/1xxx/CVE-2021-1384.json
index 90562c0f8bb..e57e1903b4f 100644
--- a/2021/1xxx/CVE-2021-1384.json
+++ b/2021/1xxx/CVE-2021-1384.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1384",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOx for IOS XE Software Command Injection Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user.\r This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.5",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-77"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOx for IOS XE Software Command Injection Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-cmdinj-RkSURGHG"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iox-cmdinj-RkSURGHG",
+        "defect": [
+            [
+                "CSCvw64798"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From ee6a327af813a34ae54847bb1423557ac0e481ae Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:01 +0000
Subject: [PATCH 574/845] Adding Cisco CVE-2021-1385

---
 2021/1xxx/CVE-2021-1385.json | 84 +++++++++++++++++++++++++++++++++---
 1 file changed, 77 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1385.json b/2021/1xxx/CVE-2021-1385.json
index 81eafca512c..766060499f0 100644
--- a/2021/1xxx/CVE-2021-1385.json
+++ b/2021/1xxx/CVE-2021-1385.json
@@ -1,18 +1,88 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1385",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOx Application Environment Path Traversal Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system.\r This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.5",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOx Application Environment Path Traversal Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-pt-hWGcPf7g"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iox-pt-hWGcPf7g",
+        "defect": [
+            [
+                "CSCvw64810",
+                "CSCvx21776",
+                "CSCvx21783"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 0b88c267e55959a8c266008c5c2547443dd6294a Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:11 +0000
Subject: [PATCH 575/845] Adding Cisco CVE-2021-1390

---
 2021/1xxx/CVE-2021-1390.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1390.json b/2021/1xxx/CVE-2021-1390.json
index 18dd2d01e14..699a9e73e76 100644
--- a/2021/1xxx/CVE-2021-1390.json
+++ b/2021/1xxx/CVE-2021-1390.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1390",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Local Privilege Escalation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in one of the diagnostic test CLI commands of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker would need to have valid user credentials at privilege level 15.\r This vulnerability exists because the affected software permits modification of the run-time memory of an affected device under specific circumstances. An attacker could exploit this vulnerability by authenticating to the affected device and issuing a specific diagnostic test command at the CLI. A successful exploit could trigger a logic error in the code that was designed to restrict run-time memory modifications. The attacker could take advantage of this logic error to overwrite system memory locations and execute arbitrary code on the underlying Linux operating system (OS) of the affected device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-123"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Local Privilege Escalation Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-OFP-6Nezgn7b"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-XE-OFP-6Nezgn7b",
+        "defect": [
+            [
+                "CSCvu78930"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 4affbe562363dad321abe9fe66e7ca610a5ceae9 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:20 +0000
Subject: [PATCH 576/845] Adding Cisco CVE-2021-1391

---
 2021/1xxx/CVE-2021-1391.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1391.json b/2021/1xxx/CVE-2021-1391.json
index 9795c61c864..1f62a99bb21 100644
--- a/2021/1xxx/CVE-2021-1391.json
+++ b/2021/1xxx/CVE-2021-1391.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1391",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS and IOS XE Software Privilege Escalation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege.\r The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-489"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS and IOS XE Software Privilege Escalation Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-FSM-Yj8qJbJc"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-XE-FSM-Yj8qJbJc",
+        "defect": [
+            [
+                "CSCvu58308"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From a4f82afe328923cbf43056836a7e3d5a6f553115 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:29 +0000
Subject: [PATCH 577/845] Adding Cisco CVE-2021-1392

---
 2021/1xxx/CVE-2021-1392.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1392.json b/2021/1xxx/CVE-2021-1392.json
index 925f8b43961..8189d193346 100644
--- a/2021/1xxx/CVE-2021-1392.json
+++ b/2021/1xxx/CVE-2021-1392.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1392",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user.\r This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.8",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-522"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-XE-SAP-OPLbze68",
+        "defect": [
+            [
+                "CSCvu58224"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 0044de166a5ed284789d62189e4958d91efccbc3 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:38 +0000
Subject: [PATCH 578/845] Adding Cisco CVE-2021-1394

---
 2021/1xxx/CVE-2021-1394.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1394.json b/2021/1xxx/CVE-2021-1394.json
index 86859352310..856209309bc 100644
--- a/2021/1xxx/CVE-2021-1394.json
+++ b/2021/1xxx/CVE-2021-1394.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1394",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software for Network Convergence System 520 Routers Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the ingress traffic manager of Cisco IOS XE Software for Cisco Network Convergence System (NCS) 520 Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the web management interface of an affected device.\r This vulnerability is due to incorrect processing of certain IPv4 TCP traffic that is destined to an affected device. An attacker could exploit this vulnerability by sending a large number of crafted TCP packets to the affected device. A successful exploit could allow the attacker to cause the web management interface to become unavailable, resulting in a DoS condition.\r Note: This vulnerability does not impact traffic that is going through the device or going to the Management Ethernet interface of the device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.3",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-399"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software for Network Convergence System 520 Routers Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs520-tcp-ZpzzOxB"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ncs520-tcp-ZpzzOxB",
+        "defect": [
+            [
+                "CSCvm96192"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From ad1171282480aef0fd6d18aea69bf329aebe9e7a Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:47 +0000
Subject: [PATCH 579/845] Adding Cisco CVE-2021-1398

---
 2021/1xxx/CVE-2021-1398.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1398.json b/2021/1xxx/CVE-2021-1398.json
index ec1c9b70d04..27210f76567 100644
--- a/2021/1xxx/CVE-2021-1398.json
+++ b/2021/1xxx/CVE-2021-1398.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1398",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Arbitrary Code Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device.\r This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.8",
+            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-489"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Arbitrary Code Execution Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-ACE-75K3bRWe"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-XE-ACE-75K3bRWe",
+        "defect": [
+            [
+                "CSCvu61463"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From d88f5fbd479fa24aa906c0317d8969a9c0bd1160 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:46:56 +0000
Subject: [PATCH 580/845] Adding Cisco CVE-2021-1403

---
 2021/1xxx/CVE-2021-1403.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1403.json b/2021/1xxx/CVE-2021-1403.json
index 1ca73d84c5b..e6a790f83fa 100644
--- a/2021/1xxx/CVE-2021-1403.json
+++ b/2021/1xxx/CVE-2021-1403.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1403",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Web UI Cross-Site WebSocket Hijacking Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site WebSocket hijacking (CSWSH) attack and cause a denial of service (DoS) condition on an affected device.\r This vulnerability is due to insufficient HTTP protections in the web UI on an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the web UI to follow a crafted link. A successful exploit could allow the attacker to corrupt memory on the affected device, forcing it to reload and causing a DoS condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.4",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-345"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Web UI Cross-Site WebSocket Hijacking Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cswsh-FKk9AzT5"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-cswsh-FKk9AzT5",
+        "defect": [
+            [
+                "CSCvu98441"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From d5cd2fea15699b583a2ca17ab3ea0f93ba7e1cb3 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:05 +0000
Subject: [PATCH 581/845] Adding Cisco CVE-2021-1411

---
 2021/1xxx/CVE-2021-1411.json | 86 +++++++++++++++++++++++++++++++++---
 1 file changed, 79 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1411.json b/2021/1xxx/CVE-2021-1411.json
index d505aec2013..0fa68689ccb 100644
--- a/2021/1xxx/CVE-2021-1411.json
+++ b/2021/1xxx/CVE-2021-1411.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1411",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Jabber Desktop and Mobile Client Software Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Jabber ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "9.9",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-170"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Jabber Desktop and Mobile Client Software Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-cisco-jabber-PWrTATTC",
+        "defect": [
+            [
+                "CSCvw96073",
+                "CSCvw96075",
+                "CSCvw96079",
+                "CSCvx36433",
+                "CSCvx43270"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From e4007d57f9b4404446a88eac4b37f619798d3d17 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:14 +0000
Subject: [PATCH 582/845] Adding Cisco CVE-2021-1417

---
 2021/1xxx/CVE-2021-1417.json | 86 +++++++++++++++++++++++++++++++++---
 1 file changed, 79 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1417.json b/2021/1xxx/CVE-2021-1417.json
index 5257d30409e..6c5e40bd9f4 100644
--- a/2021/1xxx/CVE-2021-1417.json
+++ b/2021/1xxx/CVE-2021-1417.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1417",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Jabber Desktop and Mobile Client Software Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Jabber ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "9.9",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-170"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Jabber Desktop and Mobile Client Software Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-cisco-jabber-PWrTATTC",
+        "defect": [
+            [
+                "CSCvw96073",
+                "CSCvw96075",
+                "CSCvw96079",
+                "CSCvx36433",
+                "CSCvx43270"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 5160490c866e1f50a9f9a0c2647cf2fe9c66d3e1 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:23 +0000
Subject: [PATCH 583/845] Adding Cisco CVE-2021-1418

---
 2021/1xxx/CVE-2021-1418.json | 86 +++++++++++++++++++++++++++++++++---
 1 file changed, 79 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1418.json b/2021/1xxx/CVE-2021-1418.json
index 9475499012f..27658d75c64 100644
--- a/2021/1xxx/CVE-2021-1418.json
+++ b/2021/1xxx/CVE-2021-1418.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1418",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Jabber Desktop and Mobile Client Software Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Jabber ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "9.9",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-170"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Jabber Desktop and Mobile Client Software Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-cisco-jabber-PWrTATTC",
+        "defect": [
+            [
+                "CSCvw96073",
+                "CSCvw96075",
+                "CSCvw96079",
+                "CSCvx36433",
+                "CSCvx43270"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From b06dc66cb546a0c59d031a417ef804043e02e781 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:32 +0000
Subject: [PATCH 584/845] Adding Cisco CVE-2021-1423

---
 2021/1xxx/CVE-2021-1423.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1423.json b/2021/1xxx/CVE-2021-1423.json
index 01c9e119696..09fb5f3ed4c 100644
--- a/2021/1xxx/CVE-2021-1423.json
+++ b/2021/1xxx/CVE-2021-1423.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1423",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Aironet Access Points Arbitrary File Overwrite Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Aironet Access Point Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device.\r This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "4.4",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-668"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Aironet Access Points Arbitrary File Overwrite Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-foverwrt-HyVXvrtb"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ap-foverwrt-HyVXvrtb",
+        "defect": [
+            [
+                "CSCvu98274"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 0ce3f2e68779e90d79dd3aabe23e886e5db8d4be Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:41 +0000
Subject: [PATCH 585/845] Adding Cisco CVE-2021-1431

---
 2021/1xxx/CVE-2021-1431.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1431.json b/2021/1xxx/CVE-2021-1431.json
index d169620dea9..250b84cd50c 100644
--- a/2021/1xxx/CVE-2021-1431.json
+++ b/2021/1xxx/CVE-2021-1431.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1431",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software vDaemon Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition.\r This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.5",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software vDaemon Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwdos-4zeEeC9w"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-sdwdos-4zeEeC9w",
+        "defect": [
+            [
+                "CSCvu95283"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From aa7f75297f1567ec18105754a2c85d4f3958ccc3 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:50 +0000
Subject: [PATCH 586/845] Adding Cisco CVE-2021-1432

---
 2021/1xxx/CVE-2021-1432.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1432.json b/2021/1xxx/CVE-2021-1432.json
index db20197fc00..aa6603dc0be 100644
--- a/2021/1xxx/CVE-2021-1432.json
+++ b/2021/1xxx/CVE-2021-1432.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1432",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Arbitrary Command Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability.\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.3",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Arbitrary Command Execution Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3",
+        "defect": [
+            [
+                "CSCvu50633"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From b4dab63326e6bba5306d850707176b93f44b507e Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:47:59 +0000
Subject: [PATCH 587/845] Adding Cisco CVE-2021-1433

---
 2021/1xxx/CVE-2021-1433.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1433.json b/2021/1xxx/CVE-2021-1433.json
index a26809e2a6a..4b6f37d8b24 100644
--- a/2021/1xxx/CVE-2021-1433.json
+++ b/2021/1xxx/CVE-2021-1433.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1433",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software vDaemon Buffer Overflow Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device.\r This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "8.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software vDaemon Buffer Overflow Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-buffover-CqdRWLc"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-buffover-CqdRWLc",
+        "defect": [
+            [
+                "CSCvu42778"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 81b32c25273d257b7a1bacb43ec444d480715f17 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:48:08 +0000
Subject: [PATCH 588/845] Adding Cisco CVE-2021-1434

---
 2021/1xxx/CVE-2021-1434.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1434.json b/2021/1xxx/CVE-2021-1434.json
index aca0e624a76..940989bc54e 100644
--- a/2021/1xxx/CVE-2021-1434.json
+++ b/2021/1xxx/CVE-2021-1434.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1434",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Arbitrary File Corruption Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying file system.\r This vulnerability is due to insufficient validation of the parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of any arbitrary file that resides on the underlying host file system.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "4.4",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-552"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Arbitrary File Corruption Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arbfile-FUxskKDE"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-arbfile-FUxskKDE",
+        "defect": [
+            [
+                "CSCvu39228"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 6b2858052508303116ea60ef6dfd465a17fdee42 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:48:17 +0000
Subject: [PATCH 589/845] Adding Cisco CVE-2021-1435

---
 2021/1xxx/CVE-2021-1435.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1435.json b/2021/1xxx/CVE-2021-1435.json
index aa0b70a91f3..fe821c666d4 100644
--- a/2021/1xxx/CVE-2021-1435.json
+++ b/2021/1xxx/CVE-2021-1435.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1435",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Web UI Command Injection Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject arbitrary commands that can be executed as the root user.\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web UI of an affected device with arbitrary commands injected into a portion of the request. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.6",
+            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Web UI Command Injection Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webcmdinjsh-UFJxTgZD"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-webcmdinjsh-UFJxTgZD",
+        "defect": [
+            [
+                "CSCvq32553"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From b22a20a50069d1d23bf44dab7c0fc5b218efa34a Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:48:26 +0000
Subject: [PATCH 590/845] Adding Cisco CVE-2021-1436

---
 2021/1xxx/CVE-2021-1436.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1436.json b/2021/1xxx/CVE-2021-1436.json
index e1f7f64557b..2f96e475894 100644
--- a/2021/1xxx/CVE-2021-1436.json
+++ b/2021/1xxx/CVE-2021-1436.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1436",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Path Traversal Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system.\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "4.4",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Path Traversal Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwpathtrav-nsrue2Mt"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-sdwpathtrav-nsrue2Mt",
+        "defect": [
+            [
+                "CSCvu28373"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 82fc5cde04ca009834394b8caecbf1ffb38b50d3 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:48:35 +0000
Subject: [PATCH 591/845] Adding Cisco CVE-2021-1437

---
 2021/1xxx/CVE-2021-1437.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1437.json b/2021/1xxx/CVE-2021-1437.json
index 255fcc04ace..d611614e469 100644
--- a/2021/1xxx/CVE-2021-1437.json
+++ b/2021/1xxx/CVE-2021-1437.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1437",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Aironet Access Points FlexConnect Upgrade Information Disclosure Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Aironet Access Point Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP). "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.5",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-275"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Aironet Access Points FlexConnect Upgrade Information Disclosure Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-info-disc-BfWqghj"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-aironet-info-disc-BfWqghj",
+        "defect": [
+            [
+                "CSCvv91666"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From a6e7c1336c156f5184a47fa5a2c7a998e2aafa94 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:48:44 +0000
Subject: [PATCH 592/845] Adding Cisco CVE-2021-1439

---
 2021/1xxx/CVE-2021-1439.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1439.json b/2021/1xxx/CVE-2021-1439.json
index 8169b3fbab5..1e5012dce83 100644
--- a/2021/1xxx/CVE-2021-1439.json
+++ b/2021/1xxx/CVE-2021-1439.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1439",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Aironet Access Points FlexConnect Multicast DNS Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Aironet Access Point Software (IOS XE Controller) ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.4",
+            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-120"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Aironet Access Points FlexConnect Multicast DNS Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-aironet-mdns-dos-E6KwYuMx",
+        "defect": [
+            [
+                "CSCvw63560"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 847efaaa0bc9c5edebed451a0808fc22dac5bd76 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:48:53 +0000
Subject: [PATCH 593/845] Adding Cisco CVE-2021-1441

---
 2021/1xxx/CVE-2021-1441.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1441.json b/2021/1xxx/CVE-2021-1441.json
index 2c237a2b646..e57c8ed94d7 100644
--- a/2021/1xxx/CVE-2021-1441.json
+++ b/2021/1xxx/CVE-2021-1441.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1441",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Hardware Initialization Routines Arbitrary Code Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the hardware initialization routines of Cisco IOS XE Software for Cisco 1100 Series Industrial Integrated Services Routers and Cisco ESR6300 Embedded Series Routers could allow an authenticated, local attacker to execute unsigned code at system boot time.\r This vulnerability is due to incorrect validations of parameters passed to a diagnostic script that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with an executable file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device.\r To exploit this vulnerability, the attacker would need administrative level credentials (level 15) on the device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.7",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-78"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Hardware Initialization Routines Arbitrary Code Execution Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-iot-codexec-k46EFF6q"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ios-xe-iot-codexec-k46EFF6q",
+        "defect": [
+            [
+                "CSCvu61471"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 83de6861a37cfec3a1405915bb2f6446559580a8 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:02 +0000
Subject: [PATCH 594/845] Adding Cisco CVE-2021-1442

---
 2021/1xxx/CVE-2021-1442.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1442.json b/2021/1xxx/CVE-2021-1442.json
index 887a262d18a..082a1e0647e 100644
--- a/2021/1xxx/CVE-2021-1442.json
+++ b/2021/1xxx/CVE-2021-1442.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1442",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Plug-and-Play Privilege Escalation Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " A vulnerability in a diagnostic command for the Plug-and-Play (PnP) subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to the level of an Administrator user (level 15) on an affected device. The vulnerability is due to insufficient protection of sensitive information. An attacker with low privileges could exploit this vulnerability by issuing the diagnostic CLI show pnp profile when a specific PnP listener is enabled on the device. A successful exploit could allow the attacker to obtain a privileged authentication token. This token can be used to send crafted PnP messages and execute privileged commands on the targeted system. "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "7.0",
+            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-532"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Plug-and-Play Privilege Escalation Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL",
+        "defect": [
+            [
+                "CSCvt41030"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 965f9346aa8e8349e0b08af18961b1aa0a6b43a7 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:12 +0000
Subject: [PATCH 595/845] Adding Cisco CVE-2021-1443

---
 2021/1xxx/CVE-2021-1443.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1443.json b/2021/1xxx/CVE-2021-1443.json
index a111f5524a8..5ce6a8ceff9 100644
--- a/2021/1xxx/CVE-2021-1443.json
+++ b/2021/1xxx/CVE-2021-1443.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1443",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Web UI OS Command Injection Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying operating system of an affected device.\r The vulnerability exists because the affected software improperly sanitizes values that are parsed from a specific configuration file. An attacker could exploit this vulnerability by tampering with a specific configuration file and then sending an API call. A successful exploit could allow the attacker to inject arbitrary code that would be executed on the underlying operating system of the affected device. To exploit this vulnerability, the attacker would need to have a privileged set of credentials to the device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.5",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-77"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Web UI OS Command Injection Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-os-cmd-inj-Ef6TV5e9"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ios-xe-os-cmd-inj-Ef6TV5e9",
+        "defect": [
+            [
+                "CSCvu60249"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From c9f79f7aa371c91a12eed1f9515a9a6128937b07 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:21 +0000
Subject: [PATCH 596/845] Adding Cisco CVE-2021-1446

---
 2021/1xxx/CVE-2021-1446.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1446.json b/2021/1xxx/CVE-2021-1446.json
index 367f0782467..3ec0c839d04 100644
--- a/2021/1xxx/CVE-2021-1446.json
+++ b/2021/1xxx/CVE-2021-1446.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1446",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device.\r The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "8.6",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-754"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-hbBS7SZE"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-alg-dos-hbBS7SZE",
+        "defect": [
+            [
+                "CSCvv65113"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 15688944e852969cffb44eb91e4e849d2f29f950 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:29 +0000
Subject: [PATCH 597/845] Adding Cisco CVE-2021-1449

---
 2021/1xxx/CVE-2021-1449.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1449.json b/2021/1xxx/CVE-2021-1449.json
index eeae65146e4..852b0f4dab6 100644
--- a/2021/1xxx/CVE-2021-1449.json
+++ b/2021/1xxx/CVE-2021-1449.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1449",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Access Point Software Arbitrary Code Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Aironet Access Point Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": " A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device. "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.7",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-284"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Access Point Software Arbitrary Code Execution Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-privesc-wEVfp8Ud"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ap-privesc-wEVfp8Ud",
+        "defect": [
+            [
+                "CSCvw45507"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 8147f8ae6fc63b7d476a45d57fb963a1e54b05c4 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:39 +0000
Subject: [PATCH 598/845] Adding Cisco CVE-2021-1451

---
 2021/1xxx/CVE-2021-1451.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1451.json b/2021/1xxx/CVE-2021-1451.json
index 0a8d0d1b1a7..79eb22de172 100644
--- a/2021/1xxx/CVE-2021-1451.json
+++ b/2021/1xxx/CVE-2021-1451.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1451",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software Easy Virtual Switching System Arbitrary Code Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device.\r The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "8.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software Easy Virtual Switching System Arbitrary Code Execution Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ios-xe-evss-code-exe-8cw5VSvw",
+        "defect": [
+            [
+                "CSCvv66062"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 68e90c58748bf6e994bc4374f6d38e942851cfa2 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:48 +0000
Subject: [PATCH 599/845] Adding Cisco CVE-2021-1452

---
 2021/1xxx/CVE-2021-1452.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1452.json b/2021/1xxx/CVE-2021-1452.json
index 38e607f1e2c..77e258ffb98 100644
--- a/2021/1xxx/CVE-2021-1452.json
+++ b/2021/1xxx/CVE-2021-1452.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1452",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE ROM Monitor Software for Cisco Industrial Switches OS Command Injection Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE ROMMON Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the ROM Monitor (ROMMON) of Cisco IOS XE Software for Cisco Catalyst IE3200, IE3300, and IE3400 Rugged Series Switches, Cisco Catalyst IE3400 Heavy Duty Series Switches, and Cisco Embedded Services 3300 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time.\r This vulnerability is due to incorrect validations of specific function arguments passed to a boot script when specific ROMMON variables are set. An attacker could exploit this vulnerability by setting malicious values for a specific ROMMON variable. A successful exploit could allow the attacker to execute unsigned code and bypass the image verification check during the secure boot process of an affected device. To exploit this vulnerability, the attacker would need to have unauthenticated, physical access to the device or obtain privileged access to the root shell on the device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.8",
+            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-78"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE ROM Monitor Software for Cisco Industrial Switches OS Command Injection Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-romvar-cmd-inj-N56fYbrw"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iosxe-romvar-cmd-inj-N56fYbrw",
+        "defect": [
+            [
+                "CSCvu65039"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From c8f25b09bfdbcfceae74ded1c1397cd62f045a85 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:49:57 +0000
Subject: [PATCH 600/845] Adding Cisco CVE-2021-1453

---
 2021/1xxx/CVE-2021-1453.json | 82 +++++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1453.json b/2021/1xxx/CVE-2021-1453.json
index 87c889892dc..a3db79d3a55 100644
--- a/2021/1xxx/CVE-2021-1453.json
+++ b/2021/1xxx/CVE-2021-1453.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1453",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE Software for the Catalyst 9000 Family Arbitrary Code Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the software image verification functionality of Cisco IOS XE Software for the Cisco Catalyst 9000 Family of switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time.\r The vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the secure boot process of an affected device.\r To exploit this vulnerability, the attacker would need to have unauthenticated physical access to the device or obtain privileged access to the root shell on the device.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.8",
+            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-347"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE Software for the Catalyst 9000 Family Arbitrary Code Execution Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cat-verify-BQ5hrXgH"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-ios-xe-cat-verify-BQ5hrXgH",
+        "defect": [
+            [
+                "CSCvw36680"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 2510f1f03868cb435b2f3bb10b8c764f2e1f7609 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:50:06 +0000
Subject: [PATCH 601/845] Adding Cisco CVE-2021-1454

---
 2021/1xxx/CVE-2021-1454.json | 83 +++++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1454.json b/2021/1xxx/CVE-2021-1454.json
index da4db65e550..fad7c083b03 100644
--- a/2021/1xxx/CVE-2021-1454.json
+++ b/2021/1xxx/CVE-2021-1454.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1454",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS XE Software ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges.\r These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "6.0",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwpinj-V4weeqzU"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-xesdwpinj-V4weeqzU",
+        "defect": [
+            [
+                "CSCvk59304",
+                "CSCvw64834"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 5efda5f467ab5fe8adb620b2c061663eae332159 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:50:15 +0000
Subject: [PATCH 602/845] Adding Cisco CVE-2021-1460

---
 2021/1xxx/CVE-2021-1460.json | 85 +++++++++++++++++++++++++++++++++---
 1 file changed, 78 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1460.json b/2021/1xxx/CVE-2021-1460.json
index 3d1518c3281..8e81ffcf11d 100644
--- a/2021/1xxx/CVE-2021-1460.json
+++ b/2021/1xxx/CVE-2021-1460.json
@@ -1,18 +1,89 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1460",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco IOx Application Framework  Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco IOS ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "\r A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "5.3",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco IOx Application Framework  Denial of Service Vulnerability",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-dos-4Fgcjh6"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-iox-dos-4Fgcjh6",
+        "defect": [
+            [
+                "CSCvt74967",
+                "CSCvu19405",
+                "CSCvv02734",
+                "CSCvv02834"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 90aa5c5001fea9cae8141f07149dfc60d2c4b2e7 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:50:24 +0000
Subject: [PATCH 603/845] Adding Cisco CVE-2021-1469

---
 2021/1xxx/CVE-2021-1469.json | 86 +++++++++++++++++++++++++++++++++---
 1 file changed, 79 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1469.json b/2021/1xxx/CVE-2021-1469.json
index 206c4692410..8f16c69a0c1 100644
--- a/2021/1xxx/CVE-2021-1469.json
+++ b/2021/1xxx/CVE-2021-1469.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1469",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Jabber Desktop and Mobile Client Software Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Jabber ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "9.9",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-170"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Jabber Desktop and Mobile Client Software Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-cisco-jabber-PWrTATTC",
+        "defect": [
+            [
+                "CSCvw96073",
+                "CSCvw96075",
+                "CSCvw96079",
+                "CSCvx36433",
+                "CSCvx43270"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 33d5d199b18d0f74cd716326875b1a46522f1d28 Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Wed, 24 Mar 2021 19:50:33 +0000
Subject: [PATCH 604/845] Adding Cisco CVE-2021-1471

---
 2021/1xxx/CVE-2021-1471.json | 86 +++++++++++++++++++++++++++++++++---
 1 file changed, 79 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1471.json b/2021/1xxx/CVE-2021-1471.json
index 340aec9af1d..b6dd87652d7 100644
--- a/2021/1xxx/CVE-2021-1471.json
+++ b/2021/1xxx/CVE-2021-1471.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-24T16:00:00",
         "ID": "CVE-2021-1471",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cisco Jabber Desktop and Mobile Client Software Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cisco Jabber ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
             }
         ]
+    },
+    "exploit": [
+        {
+            "lang": "eng",
+            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
+        }
+    ],
+    "impact": {
+        "cvss": {
+            "baseScore": "9.9",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H ",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-170"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "20210324 Cisco Jabber Desktop and Mobile Client Software Vulnerabilities",
+                "refsource": "CISCO",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "cisco-sa-cisco-jabber-PWrTATTC",
+        "defect": [
+            [
+                "CSCvw96073",
+                "CSCvw96075",
+                "CSCvw96079",
+                "CSCvx36433",
+                "CSCvx43270"
+            ]
+        ],
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 6564de58167b31c49815a5b1aaa3c627810cfca9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 20:00:42 +0000
Subject: [PATCH 605/845] "-Synchronized-Data."

---
 2014/9xxx/CVE-2014-9515.json   | 15 +++++++++++++++
 2020/13xxx/CVE-2020-13949.json |  5 +++++
 2 files changed, 20 insertions(+)

diff --git a/2014/9xxx/CVE-2014-9515.json b/2014/9xxx/CVE-2014-9515.json
index e628382ec10..d395014335a 100644
--- a/2014/9xxx/CVE-2014-9515.json
+++ b/2014/9xxx/CVE-2014-9515.json
@@ -71,6 +71,21 @@
                 "refsource": "BID",
                 "name": "107970",
                 "url": "http://www.securityfocus.com/bid/107970"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/DozerMapper/dozer/issues/410",
+                "url": "https://github.com/DozerMapper/dozer/issues/410"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/DozerMapper/dozer/issues/786",
+                "url": "https://github.com/DozerMapper/dozer/issues/786"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c",
+                "url": "https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c"
             }
         ]
     }
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index bce896fff96..f2371371aea 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -303,6 +303,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
                 "url": "https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
+                "url": "https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },

From c992fd0b2bafacfcbf14f63c5b743b3c2b8b400c Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Wed, 24 Mar 2021 14:19:34 -0600
Subject: [PATCH 606/845] Add CVE-2020-26279 for GHSA-27pv-q55r-222g

---
 2020/26xxx/CVE-2020-26279.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2020/26xxx/CVE-2020-26279.json b/2020/26xxx/CVE-2020-26279.json
index 2ec16fe9560..588ac7191b4 100644
--- a/2020/26xxx/CVE-2020-26279.json
+++ b/2020/26xxx/CVE-2020-26279.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2020-26279",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Path traversal"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "go-ipfs",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 0.8.0-rc1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "ipfs"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem.  In go-ipfs before version 0.8.0-rc1, it is possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when a get is done on an affected DAG.  This is fixed in version 0.8.0-rc1. "
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 7.7,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g"
+            },
+            {
+                "name": "https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2",
+                "refsource": "MISC",
+                "url": "https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2"
+            },
+            {
+                "name": "https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227",
+                "refsource": "MISC",
+                "url": "https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-27pv-q55r-222g",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 22bf783adfdb03c8e3c3a25e7dd318175603bf70 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Wed, 24 Mar 2021 14:27:32 -0600
Subject: [PATCH 607/845] Add CVE-2020-26283 for GHSA-r4gv-vj59-cccm

---
 2020/26xxx/CVE-2020-26283.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2020/26xxx/CVE-2020-26283.json b/2020/26xxx/CVE-2020-26283.json
index 48554640125..98bf1ffa2dc 100644
--- a/2020/26xxx/CVE-2020-26283.json
+++ b/2020/26xxx/CVE-2020-26283.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2020-26283",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Control character injection in console output"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "go-ipfs",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 0.8.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "ipfs"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem.  In go-ipfs before version 0.8.0, control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. This is fixed in version 0.8.0."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.8,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-116 Improper Encoding or Escaping of Output"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm"
+            },
+            {
+                "name": "https://github.com/ipfs/go-ipfs/pull/7831",
+                "refsource": "MISC",
+                "url": "https://github.com/ipfs/go-ipfs/pull/7831"
+            },
+            {
+                "name": "https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a",
+                "refsource": "MISC",
+                "url": "https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-r4gv-vj59-cccm",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From d4bf04979711a66cbc5db6928d9444614c8c5d0b Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Wed, 24 Mar 2021 14:41:54 -0600
Subject: [PATCH 608/845] Add CVE-2021-21385 for GHSA-9657-33wf-rmvx

---
 2021/21xxx/CVE-2021-21385.json | 95 +++++++++++++++++++++++++++++++---
 1 file changed, 89 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21385.json b/2021/21xxx/CVE-2021-21385.json
index 36b42800809..38c72607a50 100644
--- a/2021/21xxx/CVE-2021-21385.json
+++ b/2021/21xxx/CVE-2021-21385.json
@@ -1,18 +1,101 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21385",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Disabled hostname verification and accepting self-signed certificates"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "mifos-mobile",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "<= 7ed4f22"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "openMF"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Mifos-Mobile Android Application for MifosX is an Android Application built on top of the MifosX Self-Service platform. Mifos-Mobile before commit e505f62 disables HTTPS hostname verification of its HTTP client. Additionally it accepted any self-signed certificate as valid. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. Accepting any certificate, even self-signed ones allows man-in-the-middle attacks.\nThis problem is fixed in mifos-mobile commit e505f62."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-295: Improper Certificate Validation"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-297: Improper Validation of Certificate with Host Mismatch"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/openMF/mifos-mobile/security/advisories/GHSA-9657-33wf-rmvx",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/openMF/mifos-mobile/security/advisories/GHSA-9657-33wf-rmvx"
+            },
+            {
+                "name": "https://openmf.github.io/mobileapps.github.io/",
+                "refsource": "MISC",
+                "url": "https://openmf.github.io/mobileapps.github.io/"
+            },
+            {
+                "name": "https://github.com/openMF/mifos-mobile/commit/e505f62b92b19292bfdabd6e996ab76abfeaa90d",
+                "refsource": "MISC",
+                "url": "https://github.com/openMF/mifos-mobile/commit/e505f62b92b19292bfdabd6e996ab76abfeaa90d"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-9657-33wf-rmvx",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From c6e6be06044b931c231968a23420fe5a434b1555 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Wed, 24 Mar 2021 14:51:32 -0600
Subject: [PATCH 609/845] Add CVE-2021-21386 GHSA-8434-v7xw-8m9x

---
 2021/21xxx/CVE-2021-21386.json | 90 +++++++++++++++++++++++++++++++---
 1 file changed, 84 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21386.json b/2021/21xxx/CVE-2021-21386.json
index 006c6217b89..828e5758f56 100644
--- a/2021/21xxx/CVE-2021-21386.json
+++ b/2021/21xxx/CVE-2021-21386.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21386",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Improper Neutralization of Argument Delimiters in a Decompiling Package Process"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "apkleaks",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 2.0.6-dev"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "dwisiswant0"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "APKLeaks is an open-source project for scanning APK file for URIs, endpoints & secrets. APKLeaks prior to v2.0.3 allows remote attackers to execute arbitrary OS commands via package name inside application manifest. An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name. The problem is fixed in version v2.0.6-dev and above."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 9.3,
+            "baseSeverity": "CRITICAL",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-78 OS Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x"
+            },
+            {
+                "name": "https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382",
+                "refsource": "MISC",
+                "url": "https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-8434-v7xw-8m9x",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 28a169e9e9375f9fa5e42700e3f8e089ced43d52 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 21:00:45 +0000
Subject: [PATCH 610/845] "-Synchronized-Data."

---
 2020/26xxx/CVE-2020-26279.json |  2 +-
 2020/26xxx/CVE-2020-26283.json |  2 +-
 2020/7xxx/CVE-2020-7853.json   | 89 +++++++++++++++++++++++++++++++---
 2021/1xxx/CVE-2021-1220.json   |  4 +-
 2021/1xxx/CVE-2021-1281.json   |  4 +-
 2021/1xxx/CVE-2021-1352.json   |  4 +-
 2021/1xxx/CVE-2021-1356.json   |  4 +-
 2021/1xxx/CVE-2021-1371.json   |  4 +-
 2021/1xxx/CVE-2021-1373.json   |  4 +-
 2021/1xxx/CVE-2021-1374.json   |  4 +-
 2021/1xxx/CVE-2021-1375.json   |  4 +-
 2021/1xxx/CVE-2021-1376.json   |  4 +-
 2021/1xxx/CVE-2021-1377.json   |  4 +-
 2021/1xxx/CVE-2021-1381.json   |  4 +-
 2021/1xxx/CVE-2021-1382.json   |  4 +-
 2021/1xxx/CVE-2021-1383.json   |  4 +-
 2021/1xxx/CVE-2021-1384.json   |  4 +-
 2021/1xxx/CVE-2021-1385.json   |  4 +-
 2021/1xxx/CVE-2021-1390.json   |  4 +-
 2021/1xxx/CVE-2021-1391.json   |  4 +-
 2021/1xxx/CVE-2021-1392.json   |  4 +-
 2021/1xxx/CVE-2021-1394.json   |  4 +-
 2021/1xxx/CVE-2021-1398.json   |  4 +-
 2021/1xxx/CVE-2021-1403.json   |  4 +-
 2021/1xxx/CVE-2021-1411.json   |  4 +-
 2021/1xxx/CVE-2021-1417.json   |  4 +-
 2021/1xxx/CVE-2021-1418.json   |  4 +-
 2021/1xxx/CVE-2021-1423.json   |  4 +-
 2021/1xxx/CVE-2021-1431.json   |  4 +-
 2021/1xxx/CVE-2021-1432.json   |  4 +-
 2021/1xxx/CVE-2021-1433.json   |  4 +-
 2021/1xxx/CVE-2021-1434.json   |  4 +-
 2021/1xxx/CVE-2021-1435.json   |  4 +-
 2021/1xxx/CVE-2021-1436.json   |  4 +-
 2021/1xxx/CVE-2021-1437.json   |  4 +-
 2021/1xxx/CVE-2021-1439.json   |  4 +-
 2021/1xxx/CVE-2021-1441.json   |  4 +-
 2021/1xxx/CVE-2021-1442.json   |  4 +-
 2021/1xxx/CVE-2021-1443.json   |  4 +-
 2021/1xxx/CVE-2021-1446.json   |  4 +-
 2021/1xxx/CVE-2021-1449.json   |  4 +-
 2021/1xxx/CVE-2021-1451.json   |  4 +-
 2021/1xxx/CVE-2021-1452.json   |  4 +-
 2021/1xxx/CVE-2021-1453.json   |  4 +-
 2021/1xxx/CVE-2021-1454.json   |  4 +-
 2021/1xxx/CVE-2021-1460.json   |  4 +-
 2021/1xxx/CVE-2021-1469.json   |  4 +-
 2021/1xxx/CVE-2021-1471.json   |  4 +-
 2021/21xxx/CVE-2021-21385.json |  2 +-
 2021/28xxx/CVE-2021-28957.json |  5 ++
 50 files changed, 181 insertions(+), 99 deletions(-)

diff --git a/2020/26xxx/CVE-2020-26279.json b/2020/26xxx/CVE-2020-26279.json
index 588ac7191b4..512ba0677a3 100644
--- a/2020/26xxx/CVE-2020-26279.json
+++ b/2020/26xxx/CVE-2020-26279.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem.  In go-ipfs before version 0.8.0-rc1, it is possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when a get is done on an affected DAG.  This is fixed in version 0.8.0-rc1. "
+                "value": "go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0-rc1, it is possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when a get is done on an affected DAG. This is fixed in version 0.8.0-rc1."
             }
         ]
     },
diff --git a/2020/26xxx/CVE-2020-26283.json b/2020/26xxx/CVE-2020-26283.json
index 98bf1ffa2dc..9ea7890fad7 100644
--- a/2020/26xxx/CVE-2020-26283.json
+++ b/2020/26xxx/CVE-2020-26283.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem.  In go-ipfs before version 0.8.0, control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. This is fixed in version 0.8.0."
+                "value": "go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0, control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. This is fixed in version 0.8.0."
             }
         ]
     },
diff --git a/2020/7xxx/CVE-2020-7853.json b/2020/7xxx/CVE-2020-7853.json
index 24f02bf95e6..116c813dea0 100644
--- a/2020/7xxx/CVE-2020-7853.json
+++ b/2020/7xxx/CVE-2020-7853.json
@@ -1,18 +1,95 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "vuln@krcert.or.kr",
+        "DATE_PUBLIC": "2021-03-23T07:27:00.000Z",
         "ID": "CVE-2020-7853",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "TOBESOFT XPLATFORM Out-of-Bounds Read/Write Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Xplatform",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "9.2.2.250"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Tobesoft"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An outbound read/write vulnerability exists in XPLATFORM that does not check offset input ranges, allowing out-of-range data to be read. An attacker can exploit arbitrary code execution."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 5.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-787 Out-of-bounds Write"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125 Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35943",
+                "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35943"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1220.json b/2021/1xxx/CVE-2021-1220.json
index 1540f39d318..27abb211ace 100644
--- a/2021/1xxx/CVE-2021-1220.json
+++ b/2021/1xxx/CVE-2021-1220.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition.\r These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality.\r Note: These vulnerabilities do not affect the console connection.\r "
+                "value": "Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality. Note: These vulnerabilities do not affect the console connection."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1281.json b/2021/1xxx/CVE-2021-1281.json
index c2dd4e71963..a56add075bf 100644
--- a/2021/1xxx/CVE-2021-1281.json
+++ b/2021/1xxx/CVE-2021-1281.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in CLI management in Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system as the root user.\r This vulnerability is due to the way the software handles concurrent CLI sessions. An attacker could exploit this vulnerability by authenticating to the device as an administrative user and executing a sequence of commands. A successful exploit could allow the attacker to obtain access to the underlying operating system as the root user.\r "
+                "value": "A vulnerability in CLI management in Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system as the root user. This vulnerability is due to the way the software handles concurrent CLI sessions. An attacker could exploit this vulnerability by authenticating to the device as an administrative user and executing a sequence of commands. A successful exploit could allow the attacker to obtain access to the underlying operating system as the root user."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1352.json b/2021/1xxx/CVE-2021-1352.json
index 23b67a6179a..32915337746 100644
--- a/2021/1xxx/CVE-2021-1352.json
+++ b/2021/1xxx/CVE-2021-1352.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the DECnet Phase IV and DECnet/OSI protocol processing of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r The vulnerability is due to insufficient input validation of DECnet traffic that is received by an affected device. An attacker could exploit this vulnerability by sending DECnet traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r "
+                "value": "A vulnerability in the DECnet Phase IV and DECnet/OSI protocol processing of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of DECnet traffic that is received by an affected device. An attacker could exploit this vulnerability by sending DECnet traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1356.json b/2021/1xxx/CVE-2021-1356.json
index 9dee39eae4c..58dbcd86be7 100644
--- a/2021/1xxx/CVE-2021-1356.json
+++ b/2021/1xxx/CVE-2021-1356.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition.\r These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality.\r Note: These vulnerabilities do not affect the console connection.\r "
+                "value": "Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality. Note: These vulnerabilities do not affect the console connection."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1371.json b/2021/1xxx/CVE-2021-1371.json
index 82879c8748b..8fc657dfa8a 100644
--- a/2021/1xxx/CVE-2021-1371.json
+++ b/2021/1xxx/CVE-2021-1371.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration.\r This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.\r "
+                "value": "A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1373.json b/2021/1xxx/CVE-2021-1373.json
index a4a7e89dfef..a1483f5a259 100644
--- a/2021/1xxx/CVE-2021-1373.json
+++ b/2021/1xxx/CVE-2021-1373.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. "
+                "value": "A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1374.json b/2021/1xxx/CVE-2021-1374.json
index c87d3b28d10..f5e6e5e6b10 100644
--- a/2021/1xxx/CVE-2021-1374.json
+++ b/2021/1xxx/CVE-2021-1374.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the web-based management interface of Cisco IOS XE Wireless Controller software for the Catalyst 9000 Family of switches could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the web-based management interface of an affected device.\r The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by authenticating to the device as a high-privileged user, adding certain configurations with malicious code in one of its fields, and persuading another user to click on it. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.\r "
+                "value": "A vulnerability in the web-based management interface of Cisco IOS XE Wireless Controller software for the Catalyst 9000 Family of switches could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by authenticating to the device as a high-privileged user, adding certain configurations with malicious code in one of its fields, and persuading another user to click on it. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1375.json b/2021/1xxx/CVE-2021-1375.json
index f00c732a089..ebd3e1ad929 100644
--- a/2021/1xxx/CVE-2021-1375.json
+++ b/2021/1xxx/CVE-2021-1375.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device.\r These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1376.json b/2021/1xxx/CVE-2021-1376.json
index 868bad8f1a4..b0815310b22 100644
--- a/2021/1xxx/CVE-2021-1376.json
+++ b/2021/1xxx/CVE-2021-1376.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device.\r These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1377.json b/2021/1xxx/CVE-2021-1377.json
index 65787727577..e6a5e66d1e2 100644
--- a/2021/1xxx/CVE-2021-1377.json
+++ b/2021/1xxx/CVE-2021-1377.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets.\r This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition.\r "
+                "value": "A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets. This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1381.json b/2021/1xxx/CVE-2021-1381.json
index a4fa60af01f..38e3d6419ee 100644
--- a/2021/1xxx/CVE-2021-1381.json
+++ b/2021/1xxx/CVE-2021-1381.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with high privileges or an unauthenticated attacker with physical access to the device to open a debugging console.\r The vulnerability is due to insufficient command authorization restrictions. An attacker could exploit this vulnerability by running commands on the hardware platform to open a debugging console. A successful exploit could allow the attacker to access a debugging console.\r "
+                "value": "A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with high privileges or an unauthenticated attacker with physical access to the device to open a debugging console. The vulnerability is due to insufficient command authorization restrictions. An attacker could exploit this vulnerability by running commands on the hardware platform to open a debugging console. A successful exploit could allow the attacker to access a debugging console."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1382.json b/2021/1xxx/CVE-2021-1382.json
index 5ff5d117aa1..0f2f3841073 100644
--- a/2021/1xxx/CVE-2021-1382.json
+++ b/2021/1xxx/CVE-2021-1382.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system.\r This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges.\r "
+                "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1383.json b/2021/1xxx/CVE-2021-1383.json
index e4266b64fb3..a100f968a5e 100644
--- a/2021/1xxx/CVE-2021-1383.json
+++ b/2021/1xxx/CVE-2021-1383.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges.\r These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.\r "
+                "value": "Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1384.json b/2021/1xxx/CVE-2021-1384.json
index e57e1903b4f..0b71522a71f 100644
--- a/2021/1xxx/CVE-2021-1384.json
+++ b/2021/1xxx/CVE-2021-1384.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user.\r This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user.\r "
+                "value": "A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user. This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1385.json b/2021/1xxx/CVE-2021-1385.json
index 766060499f0..eb1e8c81c13 100644
--- a/2021/1xxx/CVE-2021-1385.json
+++ b/2021/1xxx/CVE-2021-1385.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system.\r This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.\r "
+                "value": "A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system."
             }
         ]
     },
@@ -85,4 +85,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1390.json b/2021/1xxx/CVE-2021-1390.json
index 699a9e73e76..c833eec9651 100644
--- a/2021/1xxx/CVE-2021-1390.json
+++ b/2021/1xxx/CVE-2021-1390.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in one of the diagnostic test CLI commands of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker would need to have valid user credentials at privilege level 15.\r This vulnerability exists because the affected software permits modification of the run-time memory of an affected device under specific circumstances. An attacker could exploit this vulnerability by authenticating to the affected device and issuing a specific diagnostic test command at the CLI. A successful exploit could trigger a logic error in the code that was designed to restrict run-time memory modifications. The attacker could take advantage of this logic error to overwrite system memory locations and execute arbitrary code on the underlying Linux operating system (OS) of the affected device.\r "
+                "value": "A vulnerability in one of the diagnostic test CLI commands of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker would need to have valid user credentials at privilege level 15. This vulnerability exists because the affected software permits modification of the run-time memory of an affected device under specific circumstances. An attacker could exploit this vulnerability by authenticating to the affected device and issuing a specific diagnostic test command at the CLI. A successful exploit could trigger a logic error in the code that was designed to restrict run-time memory modifications. The attacker could take advantage of this logic error to overwrite system memory locations and execute arbitrary code on the underlying Linux operating system (OS) of the affected device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1391.json b/2021/1xxx/CVE-2021-1391.json
index 1f62a99bb21..67200ac963f 100644
--- a/2021/1xxx/CVE-2021-1391.json
+++ b/2021/1xxx/CVE-2021-1391.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege.\r The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.\r "
+                "value": "A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1392.json b/2021/1xxx/CVE-2021-1392.json
index 8189d193346..611ffe55989 100644
--- a/2021/1xxx/CVE-2021-1392.json
+++ b/2021/1xxx/CVE-2021-1392.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user.\r This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.\r "
+                "value": "A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1394.json b/2021/1xxx/CVE-2021-1394.json
index 856209309bc..9775a156d96 100644
--- a/2021/1xxx/CVE-2021-1394.json
+++ b/2021/1xxx/CVE-2021-1394.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the ingress traffic manager of Cisco IOS XE Software for Cisco Network Convergence System (NCS) 520 Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the web management interface of an affected device.\r This vulnerability is due to incorrect processing of certain IPv4 TCP traffic that is destined to an affected device. An attacker could exploit this vulnerability by sending a large number of crafted TCP packets to the affected device. A successful exploit could allow the attacker to cause the web management interface to become unavailable, resulting in a DoS condition.\r Note: This vulnerability does not impact traffic that is going through the device or going to the Management Ethernet interface of the device.\r "
+                "value": "A vulnerability in the ingress traffic manager of Cisco IOS XE Software for Cisco Network Convergence System (NCS) 520 Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the web management interface of an affected device. This vulnerability is due to incorrect processing of certain IPv4 TCP traffic that is destined to an affected device. An attacker could exploit this vulnerability by sending a large number of crafted TCP packets to the affected device. A successful exploit could allow the attacker to cause the web management interface to become unavailable, resulting in a DoS condition. Note: This vulnerability does not impact traffic that is going through the device or going to the Management Ethernet interface of the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1398.json b/2021/1xxx/CVE-2021-1398.json
index 27210f76567..5c7170a3c26 100644
--- a/2021/1xxx/CVE-2021-1398.json
+++ b/2021/1xxx/CVE-2021-1398.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device.\r This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.\r "
+                "value": "A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device. This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1403.json b/2021/1xxx/CVE-2021-1403.json
index e6a790f83fa..03195af6f10 100644
--- a/2021/1xxx/CVE-2021-1403.json
+++ b/2021/1xxx/CVE-2021-1403.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site WebSocket hijacking (CSWSH) attack and cause a denial of service (DoS) condition on an affected device.\r This vulnerability is due to insufficient HTTP protections in the web UI on an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the web UI to follow a crafted link. A successful exploit could allow the attacker to corrupt memory on the affected device, forcing it to reload and causing a DoS condition.\r "
+                "value": "A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site WebSocket hijacking (CSWSH) attack and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient HTTP protections in the web UI on an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the web UI to follow a crafted link. A successful exploit could allow the attacker to corrupt memory on the affected device, forcing it to reload and causing a DoS condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1411.json b/2021/1xxx/CVE-2021-1411.json
index 0fa68689ccb..1d4416dd02d 100644
--- a/2021/1xxx/CVE-2021-1411.json
+++ b/2021/1xxx/CVE-2021-1411.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -87,4 +87,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1417.json b/2021/1xxx/CVE-2021-1417.json
index 6c5e40bd9f4..8ae399d8492 100644
--- a/2021/1xxx/CVE-2021-1417.json
+++ b/2021/1xxx/CVE-2021-1417.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -87,4 +87,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1418.json b/2021/1xxx/CVE-2021-1418.json
index 27658d75c64..b612e9660cd 100644
--- a/2021/1xxx/CVE-2021-1418.json
+++ b/2021/1xxx/CVE-2021-1418.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -87,4 +87,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1423.json b/2021/1xxx/CVE-2021-1423.json
index 09fb5f3ed4c..afc229383eb 100644
--- a/2021/1xxx/CVE-2021-1423.json
+++ b/2021/1xxx/CVE-2021-1423.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device.\r This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device.\r "
+                "value": "A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device. This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1431.json b/2021/1xxx/CVE-2021-1431.json
index 250b84cd50c..4ee82c5d60c 100644
--- a/2021/1xxx/CVE-2021-1431.json
+++ b/2021/1xxx/CVE-2021-1431.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition.\r This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r "
+                "value": "A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1432.json b/2021/1xxx/CVE-2021-1432.json
index aa6603dc0be..c70a05b363b 100644
--- a/2021/1xxx/CVE-2021-1432.json
+++ b/2021/1xxx/CVE-2021-1432.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability.\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\r "
+                "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1433.json b/2021/1xxx/CVE-2021-1433.json
index 4b6f37d8b24..099e2eaa1d6 100644
--- a/2021/1xxx/CVE-2021-1433.json
+++ b/2021/1xxx/CVE-2021-1433.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device.\r This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition.\r "
+                "value": "A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1434.json b/2021/1xxx/CVE-2021-1434.json
index 940989bc54e..00400bea8ea 100644
--- a/2021/1xxx/CVE-2021-1434.json
+++ b/2021/1xxx/CVE-2021-1434.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying file system.\r This vulnerability is due to insufficient validation of the parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of any arbitrary file that resides on the underlying host file system.\r "
+                "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying file system. This vulnerability is due to insufficient validation of the parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of any arbitrary file that resides on the underlying host file system."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1435.json b/2021/1xxx/CVE-2021-1435.json
index fe821c666d4..0951a40cb7d 100644
--- a/2021/1xxx/CVE-2021-1435.json
+++ b/2021/1xxx/CVE-2021-1435.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject arbitrary commands that can be executed as the root user.\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web UI of an affected device with arbitrary commands injected into a portion of the request. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\r "
+                "value": "A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject arbitrary commands that can be executed as the root user. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web UI of an affected device with arbitrary commands injected into a portion of the request. A successful exploit could allow the attacker to execute arbitrary commands as the root user."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1436.json b/2021/1xxx/CVE-2021-1436.json
index 2f96e475894..b8c5dc0c7ca 100644
--- a/2021/1xxx/CVE-2021-1436.json
+++ b/2021/1xxx/CVE-2021-1436.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system.\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system.\r "
+                "value": "A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1437.json b/2021/1xxx/CVE-2021-1437.json
index d611614e469..a3ca0c679ad 100644
--- a/2021/1xxx/CVE-2021-1437.json
+++ b/2021/1xxx/CVE-2021-1437.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP). "
+                "value": "A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP)."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1439.json b/2021/1xxx/CVE-2021-1439.json
index 1e5012dce83..e8a5aee05a7 100644
--- a/2021/1xxx/CVE-2021-1439.json
+++ b/2021/1xxx/CVE-2021-1439.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.\r "
+                "value": "A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1441.json b/2021/1xxx/CVE-2021-1441.json
index e57c8ed94d7..627917bc297 100644
--- a/2021/1xxx/CVE-2021-1441.json
+++ b/2021/1xxx/CVE-2021-1441.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the hardware initialization routines of Cisco IOS XE Software for Cisco 1100 Series Industrial Integrated Services Routers and Cisco ESR6300 Embedded Series Routers could allow an authenticated, local attacker to execute unsigned code at system boot time.\r This vulnerability is due to incorrect validations of parameters passed to a diagnostic script that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with an executable file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device.\r To exploit this vulnerability, the attacker would need administrative level credentials (level 15) on the device.\r "
+                "value": "A vulnerability in the hardware initialization routines of Cisco IOS XE Software for Cisco 1100 Series Industrial Integrated Services Routers and Cisco ESR6300 Embedded Series Routers could allow an authenticated, local attacker to execute unsigned code at system boot time. This vulnerability is due to incorrect validations of parameters passed to a diagnostic script that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with an executable file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. To exploit this vulnerability, the attacker would need administrative level credentials (level 15) on the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1442.json b/2021/1xxx/CVE-2021-1442.json
index 082a1e0647e..dada404bb86 100644
--- a/2021/1xxx/CVE-2021-1442.json
+++ b/2021/1xxx/CVE-2021-1442.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " A vulnerability in a diagnostic command for the Plug-and-Play (PnP) subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to the level of an Administrator user (level 15) on an affected device. The vulnerability is due to insufficient protection of sensitive information. An attacker with low privileges could exploit this vulnerability by issuing the diagnostic CLI show pnp profile when a specific PnP listener is enabled on the device. A successful exploit could allow the attacker to obtain a privileged authentication token. This token can be used to send crafted PnP messages and execute privileged commands on the targeted system. "
+                "value": "A vulnerability in a diagnostic command for the Plug-and-Play (PnP) subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to the level of an Administrator user (level 15) on an affected device. The vulnerability is due to insufficient protection of sensitive information. An attacker with low privileges could exploit this vulnerability by issuing the diagnostic CLI show pnp profile when a specific PnP listener is enabled on the device. A successful exploit could allow the attacker to obtain a privileged authentication token. This token can be used to send crafted PnP messages and execute privileged commands on the targeted system."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1443.json b/2021/1xxx/CVE-2021-1443.json
index 5ce6a8ceff9..0aa69bca503 100644
--- a/2021/1xxx/CVE-2021-1443.json
+++ b/2021/1xxx/CVE-2021-1443.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying operating system of an affected device.\r The vulnerability exists because the affected software improperly sanitizes values that are parsed from a specific configuration file. An attacker could exploit this vulnerability by tampering with a specific configuration file and then sending an API call. A successful exploit could allow the attacker to inject arbitrary code that would be executed on the underlying operating system of the affected device. To exploit this vulnerability, the attacker would need to have a privileged set of credentials to the device.\r "
+                "value": "A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying operating system of an affected device. The vulnerability exists because the affected software improperly sanitizes values that are parsed from a specific configuration file. An attacker could exploit this vulnerability by tampering with a specific configuration file and then sending an API call. A successful exploit could allow the attacker to inject arbitrary code that would be executed on the underlying operating system of the affected device. To exploit this vulnerability, the attacker would need to have a privileged set of credentials to the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1446.json b/2021/1xxx/CVE-2021-1446.json
index 3ec0c839d04..2c885766b9e 100644
--- a/2021/1xxx/CVE-2021-1446.json
+++ b/2021/1xxx/CVE-2021-1446.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device.\r The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic.\r "
+                "value": "A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1449.json b/2021/1xxx/CVE-2021-1449.json
index 852b0f4dab6..4456392d7bf 100644
--- a/2021/1xxx/CVE-2021-1449.json
+++ b/2021/1xxx/CVE-2021-1449.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": " A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device. "
+                "value": "A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1451.json b/2021/1xxx/CVE-2021-1451.json
index 79eb22de172..75a07ea83fc 100644
--- a/2021/1xxx/CVE-2021-1451.json
+++ b/2021/1xxx/CVE-2021-1451.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device.\r The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.\r "
+                "value": "A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1452.json b/2021/1xxx/CVE-2021-1452.json
index 77e258ffb98..6069bf0acf7 100644
--- a/2021/1xxx/CVE-2021-1452.json
+++ b/2021/1xxx/CVE-2021-1452.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the ROM Monitor (ROMMON) of Cisco IOS XE Software for Cisco Catalyst IE3200, IE3300, and IE3400 Rugged Series Switches, Cisco Catalyst IE3400 Heavy Duty Series Switches, and Cisco Embedded Services 3300 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time.\r This vulnerability is due to incorrect validations of specific function arguments passed to a boot script when specific ROMMON variables are set. An attacker could exploit this vulnerability by setting malicious values for a specific ROMMON variable. A successful exploit could allow the attacker to execute unsigned code and bypass the image verification check during the secure boot process of an affected device. To exploit this vulnerability, the attacker would need to have unauthenticated, physical access to the device or obtain privileged access to the root shell on the device.\r "
+                "value": "A vulnerability in the ROM Monitor (ROMMON) of Cisco IOS XE Software for Cisco Catalyst IE3200, IE3300, and IE3400 Rugged Series Switches, Cisco Catalyst IE3400 Heavy Duty Series Switches, and Cisco Embedded Services 3300 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. This vulnerability is due to incorrect validations of specific function arguments passed to a boot script when specific ROMMON variables are set. An attacker could exploit this vulnerability by setting malicious values for a specific ROMMON variable. A successful exploit could allow the attacker to execute unsigned code and bypass the image verification check during the secure boot process of an affected device. To exploit this vulnerability, the attacker would need to have unauthenticated, physical access to the device or obtain privileged access to the root shell on the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1453.json b/2021/1xxx/CVE-2021-1453.json
index a3db79d3a55..136f2744cf9 100644
--- a/2021/1xxx/CVE-2021-1453.json
+++ b/2021/1xxx/CVE-2021-1453.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the software image verification functionality of Cisco IOS XE Software for the Cisco Catalyst 9000 Family of switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time.\r The vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the secure boot process of an affected device.\r To exploit this vulnerability, the attacker would need to have unauthenticated physical access to the device or obtain privileged access to the root shell on the device.\r "
+                "value": "A vulnerability in the software image verification functionality of Cisco IOS XE Software for the Cisco Catalyst 9000 Family of switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. The vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the secure boot process of an affected device. To exploit this vulnerability, the attacker would need to have unauthenticated physical access to the device or obtain privileged access to the root shell on the device."
             }
         ]
     },
@@ -83,4 +83,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1454.json b/2021/1xxx/CVE-2021-1454.json
index fad7c083b03..af57a8fd5d5 100644
--- a/2021/1xxx/CVE-2021-1454.json
+++ b/2021/1xxx/CVE-2021-1454.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges.\r These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.\r "
+                "value": "Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges."
             }
         ]
     },
@@ -84,4 +84,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1460.json b/2021/1xxx/CVE-2021-1460.json
index 8e81ffcf11d..ae66fe82424 100644
--- a/2021/1xxx/CVE-2021-1460.json
+++ b/2021/1xxx/CVE-2021-1460.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "\r A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.\r "
+                "value": "A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition."
             }
         ]
     },
@@ -86,4 +86,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1469.json b/2021/1xxx/CVE-2021-1469.json
index 8f16c69a0c1..71c9b3b3ee1 100644
--- a/2021/1xxx/CVE-2021-1469.json
+++ b/2021/1xxx/CVE-2021-1469.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -87,4 +87,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/1xxx/CVE-2021-1471.json b/2021/1xxx/CVE-2021-1471.json
index b6dd87652d7..8fce2b54654 100644
--- a/2021/1xxx/CVE-2021-1471.json
+++ b/2021/1xxx/CVE-2021-1471.json
@@ -36,7 +36,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition.\r For more information about these vulnerabilities, see the Details section of this advisory.\r "
+                "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory."
             }
         ]
     },
@@ -87,4 +87,4 @@
         ],
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/21xxx/CVE-2021-21385.json b/2021/21xxx/CVE-2021-21385.json
index 38c72607a50..3ca5f0cce23 100644
--- a/2021/21xxx/CVE-2021-21385.json
+++ b/2021/21xxx/CVE-2021-21385.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Mifos-Mobile Android Application for MifosX is an Android Application built on top of the MifosX Self-Service platform. Mifos-Mobile before commit e505f62 disables HTTPS hostname verification of its HTTP client. Additionally it accepted any self-signed certificate as valid. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. Accepting any certificate, even self-signed ones allows man-in-the-middle attacks.\nThis problem is fixed in mifos-mobile commit e505f62."
+                "value": "Mifos-Mobile Android Application for MifosX is an Android Application built on top of the MifosX Self-Service platform. Mifos-Mobile before commit e505f62 disables HTTPS hostname verification of its HTTP client. Additionally it accepted any self-signed certificate as valid. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. Accepting any certificate, even self-signed ones allows man-in-the-middle attacks. This problem is fixed in mifos-mobile commit e505f62."
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28957.json b/2021/28xxx/CVE-2021-28957.json
index 57fb4197775..14ab665121f 100644
--- a/2021/28xxx/CVE-2021-28957.json
+++ b/2021/28xxx/CVE-2021-28957.json
@@ -61,6 +61,11 @@
                 "url": "https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270",
                 "refsource": "MISC",
                 "name": "https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210324 [SECURITY] [DLA 2606-1] lxml security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html"
             }
         ]
     }

From 01d7ab25a914f0a7f4b3bf803089dbc06fee0533 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 24 Mar 2021 22:00:46 +0000
Subject: [PATCH 611/845] "-Synchronized-Data."

---
 2020/7xxx/CVE-2020-7852.json   | 81 +++++++++++++++++++++++++++++++---
 2021/29xxx/CVE-2021-29154.json | 18 ++++++++
 2 files changed, 93 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29154.json

diff --git a/2020/7xxx/CVE-2020-7852.json b/2020/7xxx/CVE-2020-7852.json
index 3b14d652982..aabe5c65999 100644
--- a/2020/7xxx/CVE-2020-7852.json
+++ b/2020/7xxx/CVE-2020-7852.json
@@ -1,18 +1,87 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "vuln@krcert.or.kr",
+        "DATE_PUBLIC": "2021-03-23T02:07:00.000Z",
         "ID": "CVE-2020-7852",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "DaviewIndy Heap Overflow Vulnerabilities"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "DaviewIndy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "9.0 or lower"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "HumanTalk"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "DaviewIndy has a Heap-based overflow vulnerability, triggered when the user opens a malformed ex.j2c format file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-122 Heap-based Buffer Overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35940",
+                "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35940"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29154.json b/2021/29xxx/CVE-2021-29154.json
new file mode 100644
index 00000000000..6f9d94488a5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29154.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29154",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From f58d9bc27bea7ad8a3594650cf69b66eb64cbd54 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 00:00:43 +0000
Subject: [PATCH 612/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 2020/13xxx/CVE-2020-13949.json | 5 +++++
 2020/25xxx/CVE-2020-25097.json | 5 +++++
 2020/27xxx/CVE-2020-27170.json | 5 +++++
 2020/27xxx/CVE-2020-27171.json | 5 +++++
 5 files changed, 25 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 9703cfdd85b..cb0b7e74871 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -129,6 +129,11 @@
                 "refsource": "MLIST",
                 "name": "[santuario-dev] 20210323 [GitHub] [santuario-xml-security-java] dependabot[bot] opened a new pull request #33: Bump dependency-check-maven from 6.1.2 to 6.1.3",
                 "url": "https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4@%3Cdev.santuario.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210324 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da@%3Cdev.ws.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index f2371371aea..8685c97a178 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -308,6 +308,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
                 "url": "https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new issue #11028: Bump Thrift library version",
+                "url": "https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25097.json b/2020/25xxx/CVE-2020-25097.json
index a485c48ef8c..4f354f461bc 100644
--- a/2020/25xxx/CVE-2020-25097.json
+++ b/2020/25xxx/CVE-2020-25097.json
@@ -66,6 +66,11 @@
                 "url": "http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch",
                 "refsource": "MISC",
                 "name": "http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4873",
+                "url": "https://www.debian.org/security/2021/dsa-4873"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json
index 3d880c51ef2..771b48c1606 100644
--- a/2020/27xxx/CVE-2020-27170.json
+++ b/2020/27xxx/CVE-2020-27170.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e49da8a226",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210324 Re: [CVE-2020-27170] Protection against speculatively out-of-bounds loads in the Linux kernel can be bypassed by unprivileged local users to leak content of kernel memory",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/24/4"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json
index b6a4dfca8da..fb9544ec9d3 100644
--- a/2020/27xxx/CVE-2020-27171.json
+++ b/2020/27xxx/CVE-2020-27171.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e49da8a226",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210324 Re: [CVE-2020-27171] Numeric error when restricting speculative pointer arithmetic allows unprivileged local users to leak content of kernel memory",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/24/5"
             }
         ]
     }

From c92593707cf7005e5669acd6aa7d271ddf7d1732 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 01:00:40 +0000
Subject: [PATCH 613/845] "-Synchronized-Data."

---
 2018/14xxx/CVE-2018-14718.json | 5 +++++
 2018/7xxx/CVE-2018-7489.json   | 5 +++++
 2019/0xxx/CVE-2019-0193.json   | 5 +++++
 2019/17xxx/CVE-2019-17558.json | 5 +++++
 2020/13xxx/CVE-2020-13941.json | 5 +++++
 2020/13xxx/CVE-2020-13949.json | 5 +++++
 2020/13xxx/CVE-2020-13957.json | 5 +++++
 7 files changed, 35 insertions(+)

diff --git a/2018/14xxx/CVE-2018-14718.json b/2018/14xxx/CVE-2018-14718.json
index 42030f1bdf3..c3ad5de87e9 100644
--- a/2018/14xxx/CVE-2018-14718.json
+++ b/2018/14xxx/CVE-2018-14718.json
@@ -221,6 +221,11 @@
                 "name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
                 "refsource": "CONFIRM",
                 "url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     }
diff --git a/2018/7xxx/CVE-2018-7489.json b/2018/7xxx/CVE-2018-7489.json
index 4a5ee6cb9e8..8f907aca445 100644
--- a/2018/7xxx/CVE-2018-7489.json
+++ b/2018/7xxx/CVE-2018-7489.json
@@ -186,6 +186,11 @@
                 "name": "https://github.com/FasterXML/jackson-databind/issues/1931",
                 "refsource": "CONFIRM",
                 "url": "https://github.com/FasterXML/jackson-databind/issues/1931"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0193.json b/2019/0xxx/CVE-2019-0193.json
index 70046dc95be..09ed0d0ea0c 100644
--- a/2019/0xxx/CVE-2019-0193.json
+++ b/2019/0xxx/CVE-2019-0193.json
@@ -133,6 +133,11 @@
                 "refsource": "MLIST",
                 "name": "[submarine-commits] 20201209 [GitHub] [submarine] QiAnXinCodeSafe opened a new issue #474: There is a vulnerability in Apache Solr 5.5.4,upgrade recommended",
                 "url": "https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2019/17xxx/CVE-2019-17558.json b/2019/17xxx/CVE-2019-17558.json
index 463065215a4..0e53f871fd6 100644
--- a/2019/17xxx/CVE-2019-17558.json
+++ b/2019/17xxx/CVE-2019-17558.json
@@ -183,6 +183,11 @@
                 "refsource": "MLIST",
                 "name": "[lucene-issues] 20210315 [GitHub] [lucene-solr] erikhatcher commented on pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability",
                 "url": "https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071@%3Cissues.lucene.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13941.json b/2020/13xxx/CVE-2020-13941.json
index 9532045e7a4..fa3b9ee6ae9 100644
--- a/2020/13xxx/CVE-2020-13941.json
+++ b/2020/13xxx/CVE-2020-13941.json
@@ -58,6 +58,11 @@
                 "refsource": "MLIST",
                 "name": "[submarine-commits] 20201209 [GitHub] [submarine] QiAnXinCodeSafe opened a new issue #474: There is a vulnerability in Apache Solr 5.5.4,upgrade recommended",
                 "url": "https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 8685c97a178..988dcf79b43 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -313,6 +313,11 @@
                 "refsource": "MLIST",
                 "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new issue #11028: Bump Thrift library version",
                 "url": "https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13957.json b/2020/13xxx/CVE-2020-13957.json
index 7292bab809f..4e6bdd881d0 100644
--- a/2020/13xxx/CVE-2020-13957.json
+++ b/2020/13xxx/CVE-2020-13957.json
@@ -148,6 +148,11 @@
                 "refsource": "MLIST",
                 "name": "[bigtop-dev] 20210301 [GitHub] [bigtop] JunHe77 commented on pull request #743: BIGTOP-3507: CVE-2020-13957 mitigation backport",
                 "url": "https://lists.apache.org/thread.html/r622a043c2890327f8a4aea16b131e8a7137a282a004614369fceb224@%3Cdev.bigtop.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
+                "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },

From 8421ba0e854880a875c33e3d56b4313d453376ef Mon Sep 17 00:00:00 2001
From: Ikuya Fukumoto 
Date: Thu, 25 Mar 2021 14:22:54 +0900
Subject: [PATCH 614/845] JPCERT/CC 2021-03-25-14-22

---
 2021/20xxx/CVE-2021-20679.json | 53 ++++++++++++++++++++++++++++++++--
 1 file changed, 50 insertions(+), 3 deletions(-)

diff --git a/2021/20xxx/CVE-2021-20679.json b/2021/20xxx/CVE-2021-20679.json
index 71904c0b0d6..1a4a4137c98 100644
--- a/2021/20xxx/CVE-2021-20679.json
+++ b/2021/20xxx/CVE-2021-20679.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20679",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vultures@jpcert.or.jp"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Fuji Xerox Co.,Ltd.",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Fuji Xerox multifunction devices and printers",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "DocuCentre-VII C7773/C6673/C5573/C4473/C3373/C3372/C2273, DocuCentre-VII C7788/C6688/C5588, ApeosPort-VII C7773/C6673/C5573/C4473/C3373/C3372 C2273, ApeosPort-VII C7788/C6688/C5588, ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C7070G/C6570G/C5570G/C4570G/C3570G/C3070G, ApeosPort-VII C4421/C3321, ApeosPort C3060/C2560/C2060/C3060G/C2560G/C2060G, ApeosPort-VII CP4421, ApeosPort Print C5570, ApeosPort 5570/4570/5570G/4570G, ApeosPort 3560/3060/2560/3560G/3060G/2560G, ApeosPort-VII 5021/ 4021, ApeosPort-VII P5021, DocuPrint CP 555 d/505 d, DocuPrint P505 d, PrimeLink C9065/C9070, DocuPrint CP475AP, and DocuPrint P475AP"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial-of-service (DoS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.fujixerox.co.jp/company/news/notice/2021/0319_announce.html"
+            },
+            {
+                "url": "https://www.fujixerox.com/eng/company/news/notice/2021/0319_announce.html"
+            },
+            {
+                "url": "https://jvn.jp/en/jp/JVN37607293/index.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Fuji Xerox multifunction devices and printers (DocuCentre-VII C7773/C6673/C5573/C4473/C3373/C3372/C2273, DocuCentre-VII C7788/C6688/C5588, ApeosPort-VII C7773/C6673/C5573/C4473/C3373/C3372 C2273, ApeosPort-VII C7788/C6688/C5588, ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C7070G/C6570G/C5570G/C4570G/C3570G/C3070G, ApeosPort-VII C4421/C3321, ApeosPort C3060/C2560/C2060/C3060G/C2560G/C2060G, ApeosPort-VII CP4421, ApeosPort Print C5570, ApeosPort 5570/4570/5570G/4570G, ApeosPort 3560/3060/2560/3560G/3060G/2560G, ApeosPort-VII 5021/ 4021, ApeosPort-VII P5021, DocuPrint CP 555 d/505 d, DocuPrint P505 d, PrimeLink C9065/C9070, DocuPrint CP475AP, and DocuPrint P475AP) allow an attacker to cause a denial of service (DoS) condition and abnormal end (ABEND) of the affected products via sending a specially crafted command."
             }
         ]
     }

From 08c694fc3d5937ac8a7f583f9c127719d8bbb3a4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 06:00:41 +0000
Subject: [PATCH 615/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json | 40 ++++++++++++++++++++++++++++++++++
 2020/27xxx/CVE-2020-27216.json |  5 +++++
 2021/20xxx/CVE-2021-20679.json | 15 +++++++++----
 3 files changed, 56 insertions(+), 4 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 988dcf79b43..e36c1768e68 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -318,6 +318,46 @@
                 "refsource": "MLIST",
                 "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
                 "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210325 [GitHub] [hbase] pankaj72981 merged pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
+                "url": "https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-commits] 20210324 [hbase] branch branch-2.2 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3086)",
+                "url": "https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-commits] 20210324 [hbase] branch branch-2.4 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3084)",
+                "url": "https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 merged pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
+                "url": "https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 merged pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
+                "url": "https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-commits] 20210325 [hbase] branch branch-2.3 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3085)",
+                "url": "https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210325 [GitHub] [hbase] pankaj72981 commented on pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
+                "url": "https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210325 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index 5088513bf6f..bd8748cbc6a 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -540,6 +540,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210324 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210325 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20679.json b/2021/20xxx/CVE-2021-20679.json
index 1a4a4137c98..18f72f0e855 100644
--- a/2021/20xxx/CVE-2021-20679.json
+++ b/2021/20xxx/CVE-2021-20679.json
@@ -4,7 +4,8 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20679",
-        "ASSIGNER": "vultures@jpcert.or.jp"
+        "ASSIGNER": "vultures@jpcert.or.jp",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
@@ -44,13 +45,19 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://www.fujixerox.co.jp/company/news/notice/2021/0319_announce.html"
+                "url": "https://www.fujixerox.co.jp/company/news/notice/2021/0319_announce.html",
+                "refsource": "MISC",
+                "name": "https://www.fujixerox.co.jp/company/news/notice/2021/0319_announce.html"
             },
             {
-                "url": "https://www.fujixerox.com/eng/company/news/notice/2021/0319_announce.html"
+                "url": "https://www.fujixerox.com/eng/company/news/notice/2021/0319_announce.html",
+                "refsource": "MISC",
+                "name": "https://www.fujixerox.com/eng/company/news/notice/2021/0319_announce.html"
             },
             {
-                "url": "https://jvn.jp/en/jp/JVN37607293/index.html"
+                "url": "https://jvn.jp/en/jp/JVN37607293/index.html",
+                "refsource": "MISC",
+                "name": "https://jvn.jp/en/jp/JVN37607293/index.html"
             }
         ]
     },

From a1d81838da030112cfb6ee729ed332bc17c7b1dc Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 07:00:38 +0000
Subject: [PATCH 616/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index e36c1768e68..ee0350824a2 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -358,6 +358,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210325 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210325 [GitHub] [hbase] Apache-HBase commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
+                "url": "https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },

From 89c66ac4c4126352db7ae41d2b69b2c16d5dd0db Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 08:00:40 +0000
Subject: [PATCH 617/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29155.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29155.json

diff --git a/2021/29xxx/CVE-2021-29155.json b/2021/29xxx/CVE-2021-29155.json
new file mode 100644
index 00000000000..085130e6200
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29155.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29155",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From b263bc04d6d7381bd2781c6d69bb38b20b904ca3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 09:00:39 +0000
Subject: [PATCH 618/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 10 +++++
 2020/25xxx/CVE-2020-25649.json | 10 +++++
 2021/26xxx/CVE-2021-26715.json | 61 ++++++++++++++++++++++++++++---
 2021/27xxx/CVE-2021-27582.json |  5 +++
 2021/29xxx/CVE-2021-29156.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29157.json | 18 +++++++++
 2021/29xxx/CVE-2021-29158.json | 18 +++++++++
 2021/29xxx/CVE-2021-29159.json | 18 +++++++++
 8 files changed, 201 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29156.json
 create mode 100644 2021/29xxx/CVE-2021-29157.json
 create mode 100644 2021/29xxx/CVE-2021-29158.json
 create mode 100644 2021/29xxx/CVE-2021-29159.json

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index cb0b7e74871..43d86d58dbf 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -134,6 +134,16 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210324 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210325 [jira] [Updated] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210325 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245@%3Cdev.ws.apache.org%3E"
             }
         ]
     },
diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json
index f25e7f8ff08..433ddbdacb8 100644
--- a/2020/25xxx/CVE-2020-25649.json
+++ b/2020/25xxx/CVE-2020-25649.json
@@ -298,6 +298,16 @@
                 "refsource": "MLIST",
                 "name": "[iotdb-reviews] 20210324 [GitHub] [iotdb] wangchao316 closed pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
                 "url": "https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-commits] 20210325 [iotdb] branch master updated: [IOTDB-1256] upgrade Jackson to 2.11.0 because of loopholes CVE-2020-25649 (#2896)",
+                "url": "https://lists.apache.org/thread.html/r73bef1bb601a9f093f915f8075eb49fcca51efade57b817afd5def07@%3Ccommits.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210325 [GitHub] [iotdb] jixuan1989 merged pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
+                "url": "https://lists.apache.org/thread.html/r6cbd599b80e787f02ff7a1391d9278a03f37d6a6f4f943f0f01a62fb@%3Creviews.iotdb.apache.org%3E"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26715.json b/2021/26xxx/CVE-2021-26715.json
index 8956a0bc913..385ee6439b7 100644
--- a/2021/26xxx/CVE-2021-26715.json
+++ b/2021/26xxx/CVE-2021-26715.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26715",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26715",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases",
+                "refsource": "MISC",
+                "name": "https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://portswigger.net/research/hidden-oauth-attack-vectors",
+                "url": "https://portswigger.net/research/hidden-oauth-attack-vectors"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27582.json b/2021/27xxx/CVE-2021-27582.json
index 79431a2e2d7..3a662bde41c 100644
--- a/2021/27xxx/CVE-2021-27582.json
+++ b/2021/27xxx/CVE-2021-27582.json
@@ -61,6 +61,11 @@
                 "url": "http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html",
                 "refsource": "MISC",
                 "name": "http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://portswigger.net/research/hidden-oauth-attack-vectors",
+                "url": "https://portswigger.net/research/hidden-oauth-attack-vectors"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29156.json b/2021/29xxx/CVE-2021-29156.json
new file mode 100644
index 00000000000..cdcb7cc1513
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29156.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29156",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://portswigger.net/research/hidden-oauth-attack-vectors",
+                "refsource": "MISC",
+                "name": "https://portswigger.net/research/hidden-oauth-attack-vectors"
+            },
+            {
+                "url": "https://bugster.forgerock.org/jira/browse/OPENAM-10135",
+                "refsource": "MISC",
+                "name": "https://bugster.forgerock.org/jira/browse/OPENAM-10135"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29157.json b/2021/29xxx/CVE-2021-29157.json
new file mode 100644
index 00000000000..470b4b4ab9f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29157.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29157",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29158.json b/2021/29xxx/CVE-2021-29158.json
new file mode 100644
index 00000000000..1833e2a1818
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29158.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29158",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29159.json b/2021/29xxx/CVE-2021-29159.json
new file mode 100644
index 00000000000..35b72add20f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29159.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29159",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 75c7aa20dc8c8833c3697ffff22dea8c8337a0e4 Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Thu, 25 Mar 2021 09:16:53 +0000
Subject: [PATCH 619/845] CVE-2020-1946 for SpamAssassin

---
 2020/1xxx/CVE-2020-1946.json | 76 ++++++++++++++++++++++++++++++++----
 1 file changed, 69 insertions(+), 7 deletions(-)

diff --git a/2020/1xxx/CVE-2020-1946.json b/2020/1xxx/CVE-2020-1946.json
index e27bd79fe8b..acdc39bccb9 100644
--- a/2020/1xxx/CVE-2020-1946.json
+++ b/2020/1xxx/CVE-2020-1946.json
@@ -1,18 +1,80 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2020-1946",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Apache SpamAssassin has an OS Command Injection vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache SpamAssassin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Apache SpamAssassin",
+                                            "version_value": "3.4.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Apache SpamAssassin would like to thank Damian Lukowski at credativ for ethically reporting this issue."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios.  In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places. "
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-78 OS Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://s.apache.org/3r1wh"
+            }
+        ]
+    },
+    "source": {
+        "defect": [
+            "https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7793"
+        ],
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}

From 9c4de4d44c1f255089c2c0fc4deddce0ca6dedbe Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 10:00:42 +0000
Subject: [PATCH 620/845] "-Synchronized-Data."

---
 2020/1xxx/CVE-2020-1946.json | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/2020/1xxx/CVE-2020-1946.json b/2020/1xxx/CVE-2020-1946.json
index acdc39bccb9..ba15b0cc8ee 100644
--- a/2020/1xxx/CVE-2020-1946.json
+++ b/2020/1xxx/CVE-2020-1946.json
@@ -43,7 +43,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios.  In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places. "
+                "value": "In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places."
             }
         ]
     },
@@ -66,8 +66,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://s.apache.org/3r1wh"
+                "refsource": "MISC",
+                "url": "https://s.apache.org/3r1wh",
+                "name": "https://s.apache.org/3r1wh"
             }
         ]
     },
@@ -77,4 +78,4 @@
         ],
         "discovery": "UNKNOWN"
     }
-}
+}
\ No newline at end of file

From ee3c0c9fd4d4d251c08d31bced00a34bb40a7182 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 11:00:39 +0000
Subject: [PATCH 621/845] "-Synchronized-Data."

---
 2018/8xxx/CVE-2018-8088.json | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json
index f6da86267a4..ed6ea51fd83 100644
--- a/2018/8xxx/CVE-2018-8088.json
+++ b/2018/8xxx/CVE-2018-8088.json
@@ -276,6 +276,16 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210127 [GitHub] [pulsar] GLouMcK opened a new issue #9347: Security Vulnerabilities - Black Duck Scan",
                 "url": "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-notifications] 20210325 [jira] [Created] (IOTDB-1258) jcl-over-slf4j have Security Vulnerabilities CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/r17e7e6abc53d29c0e269153517d36f4bec2755b95900596e6df15cbe@%3Cnotifications.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210325 [GitHub] [iotdb] wangchao316 opened a new pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/r37644f0a00aca9fbcbc21c0f9a91f927b63153ec3607be469cd515e5@%3Creviews.iotdb.apache.org%3E"
             }
         ]
     }

From ffbef3490f955a3b2f8c1b66d4c8436abab08108 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 13:00:40 +0000
Subject: [PATCH 622/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29160.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29161.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29162.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29163.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29164.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29165.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29166.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29167.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29168.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29169.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29170.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29171.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29172.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29173.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29174.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29175.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29176.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29177.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29178.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29179.json | 18 ++++++++++++++++++
 20 files changed, 360 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29160.json
 create mode 100644 2021/29xxx/CVE-2021-29161.json
 create mode 100644 2021/29xxx/CVE-2021-29162.json
 create mode 100644 2021/29xxx/CVE-2021-29163.json
 create mode 100644 2021/29xxx/CVE-2021-29164.json
 create mode 100644 2021/29xxx/CVE-2021-29165.json
 create mode 100644 2021/29xxx/CVE-2021-29166.json
 create mode 100644 2021/29xxx/CVE-2021-29167.json
 create mode 100644 2021/29xxx/CVE-2021-29168.json
 create mode 100644 2021/29xxx/CVE-2021-29169.json
 create mode 100644 2021/29xxx/CVE-2021-29170.json
 create mode 100644 2021/29xxx/CVE-2021-29171.json
 create mode 100644 2021/29xxx/CVE-2021-29172.json
 create mode 100644 2021/29xxx/CVE-2021-29173.json
 create mode 100644 2021/29xxx/CVE-2021-29174.json
 create mode 100644 2021/29xxx/CVE-2021-29175.json
 create mode 100644 2021/29xxx/CVE-2021-29176.json
 create mode 100644 2021/29xxx/CVE-2021-29177.json
 create mode 100644 2021/29xxx/CVE-2021-29178.json
 create mode 100644 2021/29xxx/CVE-2021-29179.json

diff --git a/2021/29xxx/CVE-2021-29160.json b/2021/29xxx/CVE-2021-29160.json
new file mode 100644
index 00000000000..633849c035a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29160.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29160",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29161.json b/2021/29xxx/CVE-2021-29161.json
new file mode 100644
index 00000000000..7a1e28d8a13
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29161.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29161",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29162.json b/2021/29xxx/CVE-2021-29162.json
new file mode 100644
index 00000000000..55407ae5316
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29162.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29162",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29163.json b/2021/29xxx/CVE-2021-29163.json
new file mode 100644
index 00000000000..7f8f0898362
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29163.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29163",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29164.json b/2021/29xxx/CVE-2021-29164.json
new file mode 100644
index 00000000000..dc58991efff
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29164.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29164",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29165.json b/2021/29xxx/CVE-2021-29165.json
new file mode 100644
index 00000000000..7e722b9a51c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29165.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29165",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29166.json b/2021/29xxx/CVE-2021-29166.json
new file mode 100644
index 00000000000..33d413dbfd5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29166.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29166",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29167.json b/2021/29xxx/CVE-2021-29167.json
new file mode 100644
index 00000000000..df5e2f8ac03
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29167.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29167",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29168.json b/2021/29xxx/CVE-2021-29168.json
new file mode 100644
index 00000000000..99dc485723e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29168.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29168",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29169.json b/2021/29xxx/CVE-2021-29169.json
new file mode 100644
index 00000000000..5459a2a6451
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29169.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29169",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29170.json b/2021/29xxx/CVE-2021-29170.json
new file mode 100644
index 00000000000..eab8b2fd9d4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29170.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29170",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29171.json b/2021/29xxx/CVE-2021-29171.json
new file mode 100644
index 00000000000..c73be5216dc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29171.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29171",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29172.json b/2021/29xxx/CVE-2021-29172.json
new file mode 100644
index 00000000000..3249345582b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29172.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29172",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29173.json b/2021/29xxx/CVE-2021-29173.json
new file mode 100644
index 00000000000..7c2210cdeb5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29173.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29173",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29174.json b/2021/29xxx/CVE-2021-29174.json
new file mode 100644
index 00000000000..eb0e316eebe
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29174.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29174",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29175.json b/2021/29xxx/CVE-2021-29175.json
new file mode 100644
index 00000000000..9024735d4bf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29175.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29175",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29176.json b/2021/29xxx/CVE-2021-29176.json
new file mode 100644
index 00000000000..3236cc07b3d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29176.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29176",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29177.json b/2021/29xxx/CVE-2021-29177.json
new file mode 100644
index 00000000000..e6ca449e8a1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29177.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29177",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29178.json b/2021/29xxx/CVE-2021-29178.json
new file mode 100644
index 00000000000..8bf7a108be6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29178.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29178",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29179.json b/2021/29xxx/CVE-2021-29179.json
new file mode 100644
index 00000000000..cb194bde8bc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29179.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29179",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 4ef77a4ac9322cd28388de47e98fe16424cbb9bd Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 14:00:40 +0000
Subject: [PATCH 623/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29180.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29181.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29182.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29183.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29184.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29185.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29186.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29187.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29188.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29189.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29190.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29191.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29192.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29193.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29194.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29195.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29196.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29197.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29198.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29199.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29200.json | 18 ++++++++++++++++++
 21 files changed, 378 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29180.json
 create mode 100644 2021/29xxx/CVE-2021-29181.json
 create mode 100644 2021/29xxx/CVE-2021-29182.json
 create mode 100644 2021/29xxx/CVE-2021-29183.json
 create mode 100644 2021/29xxx/CVE-2021-29184.json
 create mode 100644 2021/29xxx/CVE-2021-29185.json
 create mode 100644 2021/29xxx/CVE-2021-29186.json
 create mode 100644 2021/29xxx/CVE-2021-29187.json
 create mode 100644 2021/29xxx/CVE-2021-29188.json
 create mode 100644 2021/29xxx/CVE-2021-29189.json
 create mode 100644 2021/29xxx/CVE-2021-29190.json
 create mode 100644 2021/29xxx/CVE-2021-29191.json
 create mode 100644 2021/29xxx/CVE-2021-29192.json
 create mode 100644 2021/29xxx/CVE-2021-29193.json
 create mode 100644 2021/29xxx/CVE-2021-29194.json
 create mode 100644 2021/29xxx/CVE-2021-29195.json
 create mode 100644 2021/29xxx/CVE-2021-29196.json
 create mode 100644 2021/29xxx/CVE-2021-29197.json
 create mode 100644 2021/29xxx/CVE-2021-29198.json
 create mode 100644 2021/29xxx/CVE-2021-29199.json
 create mode 100644 2021/29xxx/CVE-2021-29200.json

diff --git a/2021/29xxx/CVE-2021-29180.json b/2021/29xxx/CVE-2021-29180.json
new file mode 100644
index 00000000000..ec3b82de6d0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29180.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29180",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29181.json b/2021/29xxx/CVE-2021-29181.json
new file mode 100644
index 00000000000..2c63db2cbcf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29181.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29181",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29182.json b/2021/29xxx/CVE-2021-29182.json
new file mode 100644
index 00000000000..693d60fb7c4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29182.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29182",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29183.json b/2021/29xxx/CVE-2021-29183.json
new file mode 100644
index 00000000000..008aa3fbb11
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29183.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29183",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29184.json b/2021/29xxx/CVE-2021-29184.json
new file mode 100644
index 00000000000..8d4cea3fedb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29184.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29184",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29185.json b/2021/29xxx/CVE-2021-29185.json
new file mode 100644
index 00000000000..720304f41ac
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29185.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29185",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29186.json b/2021/29xxx/CVE-2021-29186.json
new file mode 100644
index 00000000000..73f0d8e3f32
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29186.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29186",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29187.json b/2021/29xxx/CVE-2021-29187.json
new file mode 100644
index 00000000000..2a0098e2f4c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29187.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29187",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29188.json b/2021/29xxx/CVE-2021-29188.json
new file mode 100644
index 00000000000..033efa099c6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29188.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29188",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29189.json b/2021/29xxx/CVE-2021-29189.json
new file mode 100644
index 00000000000..02e6936fcd6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29189.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29189",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29190.json b/2021/29xxx/CVE-2021-29190.json
new file mode 100644
index 00000000000..ecfb65f09ad
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29190.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29190",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29191.json b/2021/29xxx/CVE-2021-29191.json
new file mode 100644
index 00000000000..03a360a5d26
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29191.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29191",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29192.json b/2021/29xxx/CVE-2021-29192.json
new file mode 100644
index 00000000000..b547c538f60
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29192.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29192",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29193.json b/2021/29xxx/CVE-2021-29193.json
new file mode 100644
index 00000000000..d91599124ac
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29193.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29193",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29194.json b/2021/29xxx/CVE-2021-29194.json
new file mode 100644
index 00000000000..c1400f82665
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29194.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29194",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29195.json b/2021/29xxx/CVE-2021-29195.json
new file mode 100644
index 00000000000..928f6233f22
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29195.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29195",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29196.json b/2021/29xxx/CVE-2021-29196.json
new file mode 100644
index 00000000000..384839b6954
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29196.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29196",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29197.json b/2021/29xxx/CVE-2021-29197.json
new file mode 100644
index 00000000000..b9b14542dbb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29197.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29197",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29198.json b/2021/29xxx/CVE-2021-29198.json
new file mode 100644
index 00000000000..32315946def
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29198.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29198",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29199.json b/2021/29xxx/CVE-2021-29199.json
new file mode 100644
index 00000000000..526ecfb55fb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29199.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29199",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29200.json b/2021/29xxx/CVE-2021-29200.json
new file mode 100644
index 00000000000..1443f1fc396
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29200.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29200",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 8f9a07b6965fa4b1dbf6467f50c62e7bb5222041 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 10:17:54 -0400
Subject: [PATCH 624/845] Update CVE-2021-29096.json

---
 2021/29xxx/CVE-2021-29096.json | 162 +++++++++++++++++++++++++++++----
 1 file changed, 145 insertions(+), 17 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index 15c01febe2e..bb9399ab676 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -1,18 +1,146 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-29096",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
-    }
-}
\ No newline at end of file
+	"CVE_data_meta": {
+		"ASSIGNER": "PSIRT@esri.com",
+		"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
+		"ID": "CVE-2021-29096",
+		"STATE": "READY",
+		"TITLE": "ArcGIS general raster security update: use-after-free"
+	},
+	"affects": {
+		"vendor": {
+			"vendor_data": [{
+				"product": {
+					"product_data": [{
+							"product_name": "ArcReader",
+							"version": {
+								"version_data": [{
+									"platform": "x86 Windows",
+									"version_affected": "<",
+									"version_name": "All",
+									"version_value": "10.9.0"
+								}]
+							}
+						},
+						{
+							"product_name": "ArcGIS Desktop",
+							"version": {
+								"version_data": [{
+									"platform": "x86 Windows",
+									"version_affected": "<",
+									"version_name": "All",
+									"version_value": "10.9.0"
+								}]
+							}
+						},
+						{
+							"product_name": "ArcGIS Engine",
+							"version": {
+								"version_data": [{
+										"platform": "X64 Windows",
+										"version_affected": "<",
+										"version_name": "All",
+										"version_value": "10.9.0"
+									},
+									{
+										"platform": "x64 Linux",
+										"version_affected": "<",
+										"version_name": "All",
+										"version_value": "10.9.0"
+									},
+									{
+										"platform": "X86 Windows",
+										"version_affected": "<",
+										"version_name": "All",
+										"version_value": "10.9.0"
+									},
+									{
+										"platform": "X86 Linux",
+										"version_affected": "<",
+										"version_name": "All",
+										"version_value": "10.9.0"
+									}
+								]
+							}
+						},
+						{
+							"product_name": "ArcGIS Desktop Background Geoprocessing",
+							"version": {
+								"version_data": [{
+									"platform": "x86 Windows",
+									"version_affected": "<",
+									"version_name": "All",
+									"version_value": "10.9.0"
+								}]
+							}
+						},
+						{
+							"product_name": "ArcGIS Engine Background Geoprocessing",
+							"version": {
+								"version_data": [{
+										"platform": "x64 Windows",
+										"version_affected": "<",
+										"version_name": "All",
+										"version_value": "10.9.0"
+									},
+									{
+										"platform": "x64 Linux",
+										"version_affected": "<",
+										"version_name": "All",
+										"version_value": "10.9.0"
+									}
+								]
+							}
+						}
+					]
+				},
+				"vendor_name": "Esri"
+			}]
+		}
+	},
+	"data_format": "MITRE",
+	"data_type": "CVE",
+	"data_version": "4.0",
+	"description": {
+		"description_data": [{
+			"lang": "eng",
+			"value": "A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
+		}]
+	},
+	"generator": {
+		"engine": "Vulnogram 0.0.8"
+	},
+	"impact": {
+		"cvss": {
+			"attackComplexity": "LOW",
+			"attackVector": "LOCAL",
+			"availabilityImpact": "HIGH",
+			"baseScore": 7.8,
+			"baseSeverity": "HIGH",
+			"confidentialityImpact": "HIGH",
+			"integrityImpact": "HIGH",
+			"privilegesRequired": "NONE",
+			"scope": "UNCHANGED",
+			"userInteraction": "REQUIRED",
+			"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+			"version": "3.0"
+		}
+	},
+	"problemtype": {
+		"problemtype_data": [{
+			"description": [{
+				"lang": "eng",
+				"value": "CWE-416 Use After Free"
+			}]
+		}]
+	},
+	"references": {
+		"reference_data": [{
+			"name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
+			"refsource": "CONFIRM",
+			"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+		}]
+	},
+	"source": {
+		"discovery": "EXTERNAL"
+	}
+}

From bfeaab17d655192651d93dbc7e9c191decb9d6d4 Mon Sep 17 00:00:00 2001
From: Matt Caswell 
Date: Thu, 25 Mar 2021 14:20:31 +0000
Subject: [PATCH 625/845] Updates for new OpenSSL CVEs

CVE-2021-3449
CVE-2021-3450
---
 2021/3xxx/CVE-2021-3449.json | 76 +++++++++++++++++++++++++++++++++---
 2021/3xxx/CVE-2021-3450.json | 76 +++++++++++++++++++++++++++++++++---
 2 files changed, 140 insertions(+), 12 deletions(-)

diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index 2ee9c071437..f4833817ec1 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -1,17 +1,81 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "openssl-security@openssl.org",
+        "DATE_PUBLIC": "2021-03-25",
         "ID": "CVE-2021-3449",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "NULL pointer deref in signature_algorithms processing"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenSSL",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j)"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "OpenSSL"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Peter K\u00e4stle (Nokia) and Samuel Sapalski (Nokia)"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j)."
+            }
+        ]
+    },
+    "impact": [
+        {
+            "lang": "eng",
+            "url": "https://www.openssl.org/policies/secpolicy.html#High",
+            "value": "High"
+        }
+    ],
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "NULL pointer dereference"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.openssl.org/news/secadv/20210325.txt",
+                "refsource": "CONFIRM",
+                "url": "https://www.openssl.org/news/secadv/20210325.txt"
+            },
+            {
+                "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148",
+                "refsource": "CONFIRM",
+                "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 404605b1cbc..4755f60861b 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -1,17 +1,81 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "openssl-security@openssl.org",
+        "DATE_PUBLIC": "2021-03-25",
         "ID": "CVE-2021-3450",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "CA certificate check bypass with X509_V_FLAG_X509_STRICT"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenSSL",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j)"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "OpenSSL"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Benjamin Kaduk (Akamai), Xiang Ding (Akamai), others at Akamai"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j)."
+            }
+        ]
+    },
+    "impact": [
+        {
+            "lang": "eng",
+            "url": "https://www.openssl.org/policies/secpolicy.html#High",
+            "value": "High"
+        }
+    ],
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Invalid Certificate Verification"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.openssl.org/news/secadv/20210325.txt",
+                "refsource": "CONFIRM",
+                "url": "https://www.openssl.org/news/secadv/20210325.txt"
+            },
+            {
+                "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b",
+                "refsource": "CONFIRM",
+                "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b"
             }
         ]
     }

From bfcfb383dbff0c8cca4a1c67770c0509c364c4dc Mon Sep 17 00:00:00 2001
From: santosomar 
Date: Thu, 25 Mar 2021 14:22:08 +0000
Subject: [PATCH 626/845] Adding Cisco CVE-2021-1492

---
 2021/1xxx/CVE-2021-1492.json | 87 +++++++++++++++++++++++++++++++++---
 1 file changed, 80 insertions(+), 7 deletions(-)

diff --git a/2021/1xxx/CVE-2021-1492.json b/2021/1xxx/CVE-2021-1492.json
index 2827e500d71..28bfd31da09 100644
--- a/2021/1xxx/CVE-2021-1492.json
+++ b/2021/1xxx/CVE-2021-1492.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@cisco.com",
+        "DATE_PUBLIC": "2021-03-25T13:00:00.000Z",
         "ID": "CVE-2021-1492",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Duo Authentication Proxy Installer Denial of Service Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Duo Authentication Proxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "5.2.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Cisco"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Duo Security appreciates Ido Hoorvitch from CyberArk Labs for reporting the method of exploitation."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The Duo Authentication Proxy installer prior to 5.2.1 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Duo Authentication Proxy installer, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. This is only exploitable during new installations, while the installer is running, and is not exploitable once installation has finished. Versions 5.2.1 of Duo Authentication Proxy installer addresses this issue."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.6,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-64 "
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://help.duo.com/s/article/6789",
+                "refsource": "CISCO",
+                "url": "https://help.duo.com/s/article/6789"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "6789",
+        "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From d44cd28cd9fe169b4fabc1bd9cb069e48b1182c4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 16:00:41 +0000
Subject: [PATCH 627/845] "-Synchronized-Data."

---
 2012/6xxx/CVE-2012-6708.json   |   5 ++
 2020/13xxx/CVE-2020-13949.json |   5 ++
 2020/14xxx/CVE-2020-14209.json |   5 ++
 2020/6xxx/CVE-2020-6771.json   |  81 ++++++++++++++++++-
 2020/6xxx/CVE-2020-6785.json   | 137 ++++++++++++++++++++++++++++++++-
 2020/6xxx/CVE-2020-6786.json   |  84 +++++++++++++++++++-
 2020/6xxx/CVE-2020-6787.json   |  81 ++++++++++++++++++-
 2020/6xxx/CVE-2020-6788.json   |  73 +++++++++++++++++-
 2020/6xxx/CVE-2020-6789.json   |  81 ++++++++++++++++++-
 2020/6xxx/CVE-2020-6790.json   |  81 ++++++++++++++++++-
 2021/22xxx/CVE-2021-22496.json |  50 +++++++++++-
 2021/22xxx/CVE-2021-22659.json |  55 ++++++++++++-
 2021/29xxx/CVE-2021-29201.json |  18 +++++
 2021/29xxx/CVE-2021-29202.json |  18 +++++
 2021/29xxx/CVE-2021-29203.json |  18 +++++
 2021/29xxx/CVE-2021-29204.json |  18 +++++
 2021/29xxx/CVE-2021-29205.json |  18 +++++
 2021/29xxx/CVE-2021-29206.json |  18 +++++
 2021/29xxx/CVE-2021-29207.json |  18 +++++
 2021/29xxx/CVE-2021-29208.json |  18 +++++
 2021/29xxx/CVE-2021-29209.json |  18 +++++
 2021/29xxx/CVE-2021-29210.json |  18 +++++
 2021/29xxx/CVE-2021-29211.json |  18 +++++
 2021/29xxx/CVE-2021-29212.json |  18 +++++
 2021/29xxx/CVE-2021-29213.json |  18 +++++
 2021/29xxx/CVE-2021-29214.json |  18 +++++
 2021/29xxx/CVE-2021-29215.json |  18 +++++
 2021/29xxx/CVE-2021-29216.json |  18 +++++
 2021/29xxx/CVE-2021-29217.json |  18 +++++
 2021/29xxx/CVE-2021-29218.json |  18 +++++
 2021/29xxx/CVE-2021-29219.json |  18 +++++
 2021/29xxx/CVE-2021-29220.json |  18 +++++
 2021/3xxx/CVE-2021-3378.json   |   5 ++
 33 files changed, 1072 insertions(+), 31 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29201.json
 create mode 100644 2021/29xxx/CVE-2021-29202.json
 create mode 100644 2021/29xxx/CVE-2021-29203.json
 create mode 100644 2021/29xxx/CVE-2021-29204.json
 create mode 100644 2021/29xxx/CVE-2021-29205.json
 create mode 100644 2021/29xxx/CVE-2021-29206.json
 create mode 100644 2021/29xxx/CVE-2021-29207.json
 create mode 100644 2021/29xxx/CVE-2021-29208.json
 create mode 100644 2021/29xxx/CVE-2021-29209.json
 create mode 100644 2021/29xxx/CVE-2021-29210.json
 create mode 100644 2021/29xxx/CVE-2021-29211.json
 create mode 100644 2021/29xxx/CVE-2021-29212.json
 create mode 100644 2021/29xxx/CVE-2021-29213.json
 create mode 100644 2021/29xxx/CVE-2021-29214.json
 create mode 100644 2021/29xxx/CVE-2021-29215.json
 create mode 100644 2021/29xxx/CVE-2021-29216.json
 create mode 100644 2021/29xxx/CVE-2021-29217.json
 create mode 100644 2021/29xxx/CVE-2021-29218.json
 create mode 100644 2021/29xxx/CVE-2021-29219.json
 create mode 100644 2021/29xxx/CVE-2021-29220.json

diff --git a/2012/6xxx/CVE-2012-6708.json b/2012/6xxx/CVE-2012-6708.json
index 642cdc429c3..269d2c3fdd4 100644
--- a/2012/6xxx/CVE-2012-6708.json
+++ b/2012/6xxx/CVE-2012-6708.json
@@ -101,6 +101,11 @@
                 "refsource": "SUSE",
                 "name": "openSUSE-SU-2020:0395",
                 "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html",
+                "url": "http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html"
             }
         ]
     }
diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index ee0350824a2..5121cc8f43b 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -363,6 +363,11 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210325 [GitHub] [hbase] Apache-HBase commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
                 "url": "https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210325 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/14xxx/CVE-2020-14209.json b/2020/14xxx/CVE-2020-14209.json
index a866383573f..6750d05918b 100644
--- a/2020/14xxx/CVE-2020-14209.json
+++ b/2020/14xxx/CVE-2020-14209.json
@@ -61,6 +61,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://github.com/Dolibarr/dolibarr/releases/tag/11.0.5",
                 "url": "https://github.com/Dolibarr/dolibarr/releases/tag/11.0.5"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161955/Dolibarr-ERP-CRM-11.0.4-Bypass-Code-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161955/Dolibarr-ERP-CRM-11.0.4-Bypass-Code-Execution.html"
             }
         ]
     }
diff --git a/2020/6xxx/CVE-2020-6771.json b/2020/6xxx/CVE-2020-6771.json
index a4f0e3a8ead..a2e592fd030 100644
--- a/2020/6xxx/CVE-2020-6771.json
+++ b/2020/6xxx/CVE-2020-6771.json
@@ -4,15 +4,88 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6771",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch IP Helper",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "IP Helper",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.00.0008",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Loading a DLL through an Uncontrolled Search Path Element in Bosch IP Helper up to and including version 1.00.0008 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same application directory as the portable IP Helper application."
             }
         ]
-    }
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "EXTERNAL"
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Nir Yehoshua"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6785.json b/2020/6xxx/CVE-2020-6785.json
index 0bf97ea3157..18fe27a4733 100644
--- a/2020/6xxx/CVE-2020-6785.json
+++ b/2020/6xxx/CVE-2020-6785.json
@@ -4,15 +4,146 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6785",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch BVMS and BVMS Viewer",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BVMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.0.2",
+                                            "version_affected": "<",
+                                            "version_name": "10.0"
+                                        },
+                                        {
+                                            "version_value": "10.1.1",
+                                            "version_affected": "<",
+                                            "version_name": "10.1"
+                                        },
+                                        {
+                                            "version_value": "9.0.0",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "BVMS Viewer",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.0.2",
+                                            "version_affected": "<",
+                                            "version_name": "10.0"
+                                        },
+                                        {
+                                            "version_value": "10.1.1",
+                                            "version_affected": "<",
+                                            "version_name": "10.1"
+                                        },
+                                        {
+                                            "version_value": "9.0.0",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "DIVAR IP 7000 R2",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "all",
+                                            "version_affected": "="
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "DIVAR IP all-in-one 5000",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "all",
+                                            "version_affected": "="
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "DIVAR IP all-in-one 7000",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "all",
+                                            "version_affected": "="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Loading a DLL through an Uncontrolled Search Path Element in Bosch BVMS and BVMS Viewer in versions 10.1.0, 10.0.1, 10.0.0 and 9.0.0 and older potentially allows an attacker to execute arbitrary code on a victim's system. This affects both the installer as well as the installed application. This also affects Bosch DIVAR IP 7000 R2, Bosch DIVAR IP all-in-one 5000 and Bosch DIVAR IP all-in-one 7000 with installers and installed BVMS versions prior to BVMS 10.1.1."
             }
         ]
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "INTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6786.json b/2020/6xxx/CVE-2020-6786.json
index e2c28fbe396..3c176c238ae 100644
--- a/2020/6xxx/CVE-2020-6786.json
+++ b/2020/6xxx/CVE-2020-6786.json
@@ -4,15 +4,93 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6786",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch Video Recording Manager Installer",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Video Recording Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "3.82.0055",
+                                            "version_affected": "<=",
+                                            "version_name": "3.82"
+                                        },
+                                        {
+                                            "version_value": "3.81.0064",
+                                            "version_affected": "<=",
+                                            "version_name": "3.81"
+                                        },
+                                        {
+                                            "version_value": "all",
+                                            "version_affected": "=",
+                                            "version_name": "3.71 and older"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Video Recording Manager installer up to and including version 3.82.0055 for 3.82, up to and including version 3.81.0064 for 3.81 and 3.71 and older potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from."
             }
         ]
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "INTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6787.json b/2020/6xxx/CVE-2020-6787.json
index da49f2643ae..f50a08e1943 100644
--- a/2020/6xxx/CVE-2020-6787.json
+++ b/2020/6xxx/CVE-2020-6787.json
@@ -4,15 +4,88 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6787",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch Video Client installer",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Video Client",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.7.6.079",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Video Client installer up to and including version 1.7.6.079 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from."
             }
         ]
-    }
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "EXTERNAL"
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Eli Paz of CyberArk"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6788.json b/2020/6xxx/CVE-2020-6788.json
index f5df90a7723..28454043633 100644
--- a/2020/6xxx/CVE-2020-6788.json
+++ b/2020/6xxx/CVE-2020-6788.json
@@ -4,15 +4,82 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6788",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch Configuration Manager Installer",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Configuration Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.21.0078",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Configuration Manager installer up to and including version 7.21.0078 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from."
             }
         ]
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "INTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6789.json b/2020/6xxx/CVE-2020-6789.json
index 2b670ac4c56..e76882d1d36 100644
--- a/2020/6xxx/CVE-2020-6789.json
+++ b/2020/6xxx/CVE-2020-6789.json
@@ -4,15 +4,88 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6789",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch Monitor Wall Installer",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Monitor Wall",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.00.0164",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Loading a DLL through an Uncontrolled Search Path Element in the Bosch Monitor Wall installer up to and including version 10.00.0164 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from."
             }
         ]
-    }
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "EXTERNAL"
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Dhiraj Mishra"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6790.json b/2020/6xxx/CVE-2020-6790.json
index 42492ff07ed..1c11afcdb48 100644
--- a/2020/6xxx/CVE-2020-6790.json
+++ b/2020/6xxx/CVE-2020-6790.json
@@ -4,15 +4,88 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-6790",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@bosch.com",
+        "DATE_PUBLIC": "2021-03-24",
+        "TITLE": "Uncontrolled Search Path Element in Bosch Video Streaming Gateway Installer",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Bosch",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Video Streaming Gateway",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.45.10",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-427 Uncontrolled Search Path Element"
+                    }
+                ]
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "attackVector": "LOCAL",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "REQUIRED",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "name": "https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Calling an executable through an Uncontrolled Search Path Element in the Bosch Video Streaming Gateway installer up to and including version 6.45.10 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious exe in the same directory where the installer is started from."
             }
         ]
-    }
+    },
+    "source": {
+        "advisory": "BOSCH-SA-835563-BT",
+        "discovery": "EXTERNAL"
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Dhiraj Mishra"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22496.json b/2021/22xxx/CVE-2021-22496.json
index 9bf1a1f29bd..764fb5cc20a 100644
--- a/2021/22xxx/CVE-2021-22496.json
+++ b/2021/22xxx/CVE-2021-22496.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22496",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@microfocus.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Access Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Access Manager versions prior to 4.5.3.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Authentication Bypass"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.netiq.com/documentation/access-manager-45-appliance/accessmanager453-p3-release-notes/data/accessmanager453-p3-release-notes.html",
+                "url": "https://www.netiq.com/documentation/access-manager-45-appliance/accessmanager453-p3-release-notes/data/accessmanager453-p3-release-notes.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Authentication Bypass Vulnerability in Micro Focus Access Manager Product, affects all version prior to version 4.5.3.3. The vulnerability could cause information leakage."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22659.json b/2021/22xxx/CVE-2021-22659.json
index 07b7a04d3ac..297e8281611 100644
--- a/2021/22xxx/CVE-2021-22659.json
+++ b/2021/22xxx/CVE-2021-22659.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22659",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Rockwell Automation MicroLogix 1400",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "MicroLogix 1400, All series Version 21.6 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CLASSIC BUFFER OVERFLOW CWE-120"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-033-01",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-033-01"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129877/loc/en_US#__highlight",
+                "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129877/loc/en_US#__highlight"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attacker to send a specially crafted Modbus packet allowing the attacker to retrieve or modify random values in the register. If successfully exploited, this may lead to a buffer overflow resulting in a denial-of-service condition. The FAULT LED will flash RED and communications may be lost. Recovery from denial-of-service condition requires the fault to be cleared by the user."
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29201.json b/2021/29xxx/CVE-2021-29201.json
new file mode 100644
index 00000000000..c9c7ca5f1c3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29201.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29201",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29202.json b/2021/29xxx/CVE-2021-29202.json
new file mode 100644
index 00000000000..12dc5860b65
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29202.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29202",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29203.json b/2021/29xxx/CVE-2021-29203.json
new file mode 100644
index 00000000000..b732760b15f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29203.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29203",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29204.json b/2021/29xxx/CVE-2021-29204.json
new file mode 100644
index 00000000000..3fabca9802e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29204.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29204",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29205.json b/2021/29xxx/CVE-2021-29205.json
new file mode 100644
index 00000000000..0f18c22f67f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29205.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29205",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29206.json b/2021/29xxx/CVE-2021-29206.json
new file mode 100644
index 00000000000..51bc3f33851
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29206.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29206",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29207.json b/2021/29xxx/CVE-2021-29207.json
new file mode 100644
index 00000000000..789a76cfbb7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29207.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29207",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29208.json b/2021/29xxx/CVE-2021-29208.json
new file mode 100644
index 00000000000..1f752865526
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29208.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29208",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29209.json b/2021/29xxx/CVE-2021-29209.json
new file mode 100644
index 00000000000..416f21882ab
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29209.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29209",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29210.json b/2021/29xxx/CVE-2021-29210.json
new file mode 100644
index 00000000000..ac3e769b86d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29210.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29210",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29211.json b/2021/29xxx/CVE-2021-29211.json
new file mode 100644
index 00000000000..2813a5161ac
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29211.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29211",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29212.json b/2021/29xxx/CVE-2021-29212.json
new file mode 100644
index 00000000000..f5fe1f07a88
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29212.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29212",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29213.json b/2021/29xxx/CVE-2021-29213.json
new file mode 100644
index 00000000000..826978dbb9c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29213.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29213",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29214.json b/2021/29xxx/CVE-2021-29214.json
new file mode 100644
index 00000000000..1bd354c3ebf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29214.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29214",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29215.json b/2021/29xxx/CVE-2021-29215.json
new file mode 100644
index 00000000000..ef61a65d408
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29215.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29215",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29216.json b/2021/29xxx/CVE-2021-29216.json
new file mode 100644
index 00000000000..919e85588b7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29216.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29216",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29217.json b/2021/29xxx/CVE-2021-29217.json
new file mode 100644
index 00000000000..5a39a4a18c7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29217.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29217",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29218.json b/2021/29xxx/CVE-2021-29218.json
new file mode 100644
index 00000000000..d705db742a2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29218.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29218",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29219.json b/2021/29xxx/CVE-2021-29219.json
new file mode 100644
index 00000000000..cbf19ce74d3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29219.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29219",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29220.json b/2021/29xxx/CVE-2021-29220.json
new file mode 100644
index 00000000000..c654d2d53ee
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29220.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29220",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3378.json b/2021/3xxx/CVE-2021-3378.json
index fefc0d1f023..b1bc1c19ff4 100644
--- a/2021/3xxx/CVE-2021-3378.json
+++ b/2021/3xxx/CVE-2021-3378.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html",
                 "url": "http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html",
+                "url": "http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html"
             }
         ]
     }

From e920ba0aceca665c65351e7cb0cee924ffc25a2e Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 12:24:13 -0400
Subject: [PATCH 628/845] Update CVE-2021-29096.json

---
 2021/29xxx/CVE-2021-29096.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index bb9399ab676..6991091a3f9 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -3,7 +3,7 @@
 		"ASSIGNER": "PSIRT@esri.com",
 		"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
 		"ID": "CVE-2021-29096",
-		"STATE": "READY",
+		"STATE": "PUBLIC",
 		"TITLE": "ArcGIS general raster security update: use-after-free"
 	},
 	"affects": {

From 1492dccb732b9c2e87a4c463441ebd11bd8aab34 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 12:37:57 -0400
Subject: [PATCH 629/845] Update CVE-2021-29096.json

---
 2021/29xxx/CVE-2021-29096.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index 6991091a3f9..84a7cb6278c 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -1,6 +1,6 @@
 {
 	"CVE_data_meta": {
-		"ASSIGNER": "PSIRT@esri.com",
+		"ASSIGNER": "Esri",
 		"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
 		"ID": "CVE-2021-29096",
 		"STATE": "PUBLIC",

From 44f8790f7dc7864acf53349cb7acb222e1bb1c36 Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Thu, 25 Mar 2021 09:48:12 -0700
Subject: [PATCH 630/845] Add CVE-2021-21389 for GHSA-m6j4-8r7p-wpp3

---
 2021/21xxx/CVE-2021-21389.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21389.json b/2021/21xxx/CVE-2021-21389.json
index 7dc4e9d0243..8ec3cdc11e0 100644
--- a/2021/21xxx/CVE-2021-21389.json
+++ b/2021/21xxx/CVE-2021-21389.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21389",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "BuddyPress privilege escalation via REST API"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BuddyPress",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 5.0.0, < 7.2.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "buddypress"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint.\n\nThe vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 8.1,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-863: Incorrect Authorization "
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3"
+            },
+            {
+                "name": "https://buddypress.org/2021/03/buddypress-7-2-1-security-release/",
+                "refsource": "MISC",
+                "url": "https://buddypress.org/2021/03/buddypress-7-2-1-security-release/"
+            },
+            {
+                "name": "https://codex.buddypress.org/releases/version-7-2-1/",
+                "refsource": "MISC",
+                "url": "https://codex.buddypress.org/releases/version-7-2-1/"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-m6j4-8r7p-wpp3",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 7a6641108ff65006c727babf313e852a119f5f8c Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 12:57:50 -0400
Subject: [PATCH 631/845] Update CVE-2021-29096.json

---
 2021/29xxx/CVE-2021-29096.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index 84a7cb6278c..6991091a3f9 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -1,6 +1,6 @@
 {
 	"CVE_data_meta": {
-		"ASSIGNER": "Esri",
+		"ASSIGNER": "PSIRT@esri.com",
 		"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
 		"ID": "CVE-2021-29096",
 		"STATE": "PUBLIC",

From c4daca2c2b0f14da5bdcfe80039fb8f6786fb075 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 17:00:40 +0000
Subject: [PATCH 632/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21783.json | 50 +++++++++++++++++--
 2021/25xxx/CVE-2021-25349.json | 85 +++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25350.json | 85 +++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25351.json | 90 +++++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25352.json | 84 ++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25353.json | 84 ++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25354.json | 84 ++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25355.json | 84 ++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25366.json | 84 ++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25367.json | 84 ++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25368.json | 84 ++++++++++++++++++++++++++++---
 2021/29xxx/CVE-2021-29221.json | 18 +++++++
 2021/29xxx/CVE-2021-29222.json | 18 +++++++
 2021/29xxx/CVE-2021-29223.json | 18 +++++++
 2021/29xxx/CVE-2021-29224.json | 18 +++++++
 2021/29xxx/CVE-2021-29225.json | 18 +++++++
 2021/29xxx/CVE-2021-29226.json | 18 +++++++
 2021/29xxx/CVE-2021-29227.json | 18 +++++++
 2021/29xxx/CVE-2021-29228.json | 18 +++++++
 2021/29xxx/CVE-2021-29229.json | 18 +++++++
 2021/29xxx/CVE-2021-29230.json | 18 +++++++
 21 files changed, 1015 insertions(+), 63 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29221.json
 create mode 100644 2021/29xxx/CVE-2021-29222.json
 create mode 100644 2021/29xxx/CVE-2021-29223.json
 create mode 100644 2021/29xxx/CVE-2021-29224.json
 create mode 100644 2021/29xxx/CVE-2021-29225.json
 create mode 100644 2021/29xxx/CVE-2021-29226.json
 create mode 100644 2021/29xxx/CVE-2021-29227.json
 create mode 100644 2021/29xxx/CVE-2021-29228.json
 create mode 100644 2021/29xxx/CVE-2021-29229.json
 create mode 100644 2021/29xxx/CVE-2021-29230.json

diff --git a/2021/21xxx/CVE-2021-21783.json b/2021/21xxx/CVE-2021-21783.json
index 4329dc7942d..682467d3230 100644
--- a/2021/21xxx/CVE-2021-21783.json
+++ b/2021/21xxx/CVE-2021-21783.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21783",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "talos-cna@cisco.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Genivia",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Genivia gSOAP 2.8.109, Genivia gSOAP 2.8.110"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote code execution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
+                "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25349.json b/2021/25xxx/CVE-2021-25349.json
index dc3c74e6fcb..d620f333aca 100644
--- a/2021/25xxx/CVE-2021-25349.json
+++ b/2021/25xxx/CVE-2021-25349.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25349",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Slow Motion Editor",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Android Q(10.0)",
+                                            "version_value": "3.5.18.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Using unsafe PendingIntent in Slow Motion Editor prior to version 3.5.18.5 allows local attackers unauthorized action without permission via hijacking the PendingIntent."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-284 Improper Access Control"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25350.json b/2021/25xxx/CVE-2021-25350.json
index aab4f856444..2bc09aa0edd 100644
--- a/2021/25xxx/CVE-2021-25350.json
+++ b/2021/25xxx/CVE-2021-25350.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25350",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Account",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Android Q(10.0)",
+                                            "version_value": "12.1.1.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Information Exposure vulnerability in Samsung Account prior to version 12.1.1.3 allows physically proximate attackers to access user information via log."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 2,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200 Information Exposure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25351.json b/2021/25xxx/CVE-2021-25351.json
index 59f19f652fd..41975429e94 100644
--- a/2021/25xxx/CVE-2021-25351.json
+++ b/2021/25xxx/CVE-2021-25351.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25351",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Account",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Android P(9.0) and below",
+                                            "version_value": "10.7.07"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Android Q(10.0)",
+                                            "version_value": "12.1.1.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper Access Control in EmailValidationView in Samsung Account prior to version 10.7.0.7 and 12.1.1.3 allows physically proximate attackers to log out user account on device without user password."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "PHYSICAL",
+            "availabilityImpact": "LOW",
+            "baseScore": 3.2,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-285 Improper Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25352.json b/2021/25xxx/CVE-2021-25352.json
index 48af6dd54eb..1c16ab86394 100644
--- a/2021/25xxx/CVE-2021-25352.json
+++ b/2021/25xxx/CVE-2021-25352.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25352",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Bixby Voice",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "3.0.52.14"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Using PendingIntent with implicit intent in Bixby Voice prior to version 3.0.52.14 allows attackers to execute privileged action by hijacking and modifying the intent."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-285 Improper Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25353.json b/2021/25xxx/CVE-2021-25353.json
index 571424df0bf..015ef6f2dd8 100644
--- a/2021/25xxx/CVE-2021-25353.json
+++ b/2021/25xxx/CVE-2021-25353.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25353",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Galaxy Themes",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "5.2.00.1215"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Using empty PendingIntent in Galaxy Themes prior to version 5.2.00.1215 allows local attackers to read/write private file directories of Galaxy Themes application without permission via hijacking the PendingIntent."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-285 Improper Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25354.json b/2021/25xxx/CVE-2021-25354.json
index 57ec7b8b2cc..c82edfcd7dc 100644
--- a/2021/25xxx/CVE-2021-25354.json
+++ b/2021/25xxx/CVE-2021-25354.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25354",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Internet",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "13.2.1.46"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper input check in Samsung Internet prior to version 13.2.1.46 allows attackers to launch non-exported activity in Samsung Browser via malicious deeplink."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "LOW",
+            "baseScore": 3.3,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-285 Improper Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25355.json b/2021/25xxx/CVE-2021-25355.json
index 4467b8c1f3a..5dc12b07b51 100644
--- a/2021/25xxx/CVE-2021-25355.json
+++ b/2021/25xxx/CVE-2021-25355.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25355",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Notes",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "4.2.00.22"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Using unsafe PendingIntent in Samsung Notes prior to version 4.2.00.22 allows local attackers unauthorized action without permission via hijacking the PendingIntent."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-285 Improper Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25366.json b/2021/25xxx/CVE-2021-25366.json
index 995dcdfddf6..4f817af1072 100644
--- a/2021/25xxx/CVE-2021-25366.json
+++ b/2021/25xxx/CVE-2021-25366.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25366",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Internet",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "13.2.1.70"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper access control in Samsung Internet prior to version 13.2.1.70 allows physically proximate attackers to bypass the secret mode's authentication."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "PHYSICAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.2,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-703 Improper Check or Handling of Exceptional Conditions"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25367.json b/2021/25xxx/CVE-2021-25367.json
index 7af18650bf1..2b1beb64103 100644
--- a/2021/25xxx/CVE-2021-25367.json
+++ b/2021/25xxx/CVE-2021-25367.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25367",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Notes",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "4.2.00.22"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Path Traversal vulnerability in Samsung Notes prior to version 4.2.00.22 allows attackers to access local files without permission."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.7,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25368.json b/2021/25xxx/CVE-2021-25368.json
index 9ed99c7b79b..3f26bce0cb3 100644
--- a/2021/25xxx/CVE-2021-25368.json
+++ b/2021/25xxx/CVE-2021-25368.json
@@ -1,18 +1,90 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25368",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Cloud",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "4.7.0.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Hijacking vulnerability in Samsung Cloud prior to version 4.7.0.3 allows attackers to intercept when the provider is executed."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.3,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-287 Improper Authentication"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com/",
+                "name": "https://security.samsungmobile.com/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/serviceWeb.smsb",
+                "url": "https://security.samsungmobile.com/serviceWeb.smsb"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29221.json b/2021/29xxx/CVE-2021-29221.json
new file mode 100644
index 00000000000..e0b64ddc449
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29221.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29221",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29222.json b/2021/29xxx/CVE-2021-29222.json
new file mode 100644
index 00000000000..9da3d04569b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29222.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29222",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29223.json b/2021/29xxx/CVE-2021-29223.json
new file mode 100644
index 00000000000..6f9526e6812
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29223.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29223",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29224.json b/2021/29xxx/CVE-2021-29224.json
new file mode 100644
index 00000000000..1a39a701e28
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29224.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29224",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29225.json b/2021/29xxx/CVE-2021-29225.json
new file mode 100644
index 00000000000..649588b3a12
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29225.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29225",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29226.json b/2021/29xxx/CVE-2021-29226.json
new file mode 100644
index 00000000000..25b678b2913
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29226.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29226",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29227.json b/2021/29xxx/CVE-2021-29227.json
new file mode 100644
index 00000000000..54af4ff87d3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29227.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29227",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29228.json b/2021/29xxx/CVE-2021-29228.json
new file mode 100644
index 00000000000..f6c80751347
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29228.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29228",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29229.json b/2021/29xxx/CVE-2021-29229.json
new file mode 100644
index 00000000000..c547cdb3e38
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29229.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29229",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29230.json b/2021/29xxx/CVE-2021-29230.json
new file mode 100644
index 00000000000..afad9c2145f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29230.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29230",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From a45b25467a25ec429d2a5e7a77a60af30642f237 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 18:00:41 +0000
Subject: [PATCH 633/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29231.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29231.json

diff --git a/2021/29xxx/CVE-2021-29231.json b/2021/29xxx/CVE-2021-29231.json
new file mode 100644
index 00000000000..96fe7e7d1ef
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29231.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29231",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 8fa569a24ddfdc05e1239d8a841e948de51e1de6 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 19:00:43 +0000
Subject: [PATCH 634/845] "-Synchronized-Data."

---
 2016/2xxx/CVE-2016-2170.json   |   5 +
 2019/16xxx/CVE-2019-16652.json |   9 +-
 2019/16xxx/CVE-2019-16653.json |   4 +-
 2020/35xxx/CVE-2020-35502.json |  55 +++++-
 2021/20xxx/CVE-2021-20210.json |  55 +++++-
 2021/20xxx/CVE-2021-20211.json |  55 +++++-
 2021/20xxx/CVE-2021-20212.json |  55 +++++-
 2021/20xxx/CVE-2021-20213.json |  55 +++++-
 2021/20xxx/CVE-2021-20214.json |  55 +++++-
 2021/20xxx/CVE-2021-20215.json |  55 +++++-
 2021/20xxx/CVE-2021-20216.json |  60 ++++++-
 2021/20xxx/CVE-2021-20217.json |  50 +++++-
 2021/26xxx/CVE-2021-26295.json |   5 +
 2021/26xxx/CVE-2021-26596.json |  61 ++++++-
 2021/26xxx/CVE-2021-26597.json |  61 ++++++-
 2021/27xxx/CVE-2021-27192.json |  56 +++++-
 2021/27xxx/CVE-2021-27193.json |  56 +++++-
 2021/27xxx/CVE-2021-27194.json |  56 +++++-
 2021/27xxx/CVE-2021-27195.json |  56 +++++-
 2021/29xxx/CVE-2021-29096.json | 309 +++++++++++++++++----------------
 2021/3xxx/CVE-2021-3443.json   |  50 +++++-
 2021/3xxx/CVE-2021-3446.json   |  50 +++++-
 2021/3xxx/CVE-2021-3449.json   |   5 +
 2021/3xxx/CVE-2021-3450.json   |   5 +
 2021/3xxx/CVE-2021-3466.json   |  50 +++++-
 2021/3xxx/CVE-2021-3467.json   |  50 +++++-
 26 files changed, 1154 insertions(+), 229 deletions(-)

diff --git a/2016/2xxx/CVE-2016-2170.json b/2016/2xxx/CVE-2016-2170.json
index 451ee624ae8..8fac4a9b627 100644
--- a/2016/2xxx/CVE-2016-2170.json
+++ b/2016/2xxx/CVE-2016-2170.json
@@ -91,6 +91,11 @@
                 "name": "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html",
                 "refsource": "MISC",
                 "url": "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-dev] 20210325 Comment out the SOAP and HTTP engines?",
+                "url": "https://lists.apache.org/thread.html/r0d97a3b7a14777b9e9e085b483629d2774343c4723236d1c73f43ff0@%3Cdev.ofbiz.apache.org%3E"
             }
         ]
     }
diff --git a/2019/16xxx/CVE-2019-16652.json b/2019/16xxx/CVE-2019-16652.json
index 8dd708ca58c..d14424140d9 100644
--- a/2019/16xxx/CVE-2019-16652.json
+++ b/2019/16xxx/CVE-2019-16652.json
@@ -53,14 +53,9 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://www.quantumleap.it/news/advisory/",
                 "refsource": "MISC",
-                "name": "https://www.quantumleap.it/news/advisory/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.quantumleap.it/genius-bytes-genius-server-v-3-2-2-multiple-vulnerabilities/",
-                "url": "https://www.quantumleap.it/genius-bytes-genius-server-v-3-2-2-multiple-vulnerabilities/"
+                "name": "https://www2.deloitte.com/it/it/pages/risk/articles/security-advisory-article---deloitte-italy---risk.html",
+                "url": "https://www2.deloitte.com/it/it/pages/risk/articles/security-advisory-article---deloitte-italy---risk.html"
             }
         ]
     }
diff --git a/2019/16xxx/CVE-2019-16653.json b/2019/16xxx/CVE-2019-16653.json
index 4e69e00ab51..6fd3fa2e9b4 100644
--- a/2019/16xxx/CVE-2019-16653.json
+++ b/2019/16xxx/CVE-2019-16653.json
@@ -54,8 +54,8 @@
         "reference_data": [
             {
                 "refsource": "MISC",
-                "name": "https://www.quantumleap.it/genius-bytes-genius-server-v-3-2-2-multiple-vulnerabilities/",
-                "url": "https://www.quantumleap.it/genius-bytes-genius-server-v-3-2-2-multiple-vulnerabilities/"
+                "name": "https://www2.deloitte.com/it/it/pages/risk/articles/security-advisory-article---deloitte-italy---risk.html",
+                "url": "https://www2.deloitte.com/it/it/pages/risk/articles/security-advisory-article---deloitte-italy---risk.html"
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35502.json b/2020/35xxx/CVE-2020-35502.json
index 19b863e7f14..fd83c929afd 100644
--- a/2020/35xxx/CVE-2020-35502.json
+++ b/2020/35xxx/CVE-2020-35502.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-35502",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928749",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928749"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Memory leaks when a response is buffered and the buffer limit is reached or Privoxy is running out of memory can lead to a system crash."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20210.json b/2021/20xxx/CVE-2021-20210.json
index fb1cbb62a91..7bae58ab684 100644
--- a/2021/20xxx/CVE-2021-20210.json
+++ b/2021/20xxx/CVE-2021-20210.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20210",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928729",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928729"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Memory leak in the show-status CGI handler when no filter files are configured can lead to a system crash."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20211.json b/2021/20xxx/CVE-2021-20211.json
index bb2ecab65d4..81df8b214e1 100644
--- a/2021/20xxx/CVE-2021-20211.json
+++ b/2021/20xxx/CVE-2021-20211.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20211",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928733",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928733"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Memory leak when client tags are active can cause a system crash."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20212.json b/2021/20xxx/CVE-2021-20212.json
index 6fc48450fee..d2fda3c14fe 100644
--- a/2021/20xxx/CVE-2021-20212.json
+++ b/2021/20xxx/CVE-2021-20212.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20212",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928736",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928736"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Memory leak if multiple filters are executed and the last one is skipped due to a pcre error leading to a system crash."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20213.json b/2021/20xxx/CVE-2021-20213.json
index 15b14b7f818..0549dadd217 100644
--- a/2021/20xxx/CVE-2021-20213.json
+++ b/2021/20xxx/CVE-2021-20213.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20213",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-476"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928739",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928739"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20214.json b/2021/20xxx/CVE-2021-20214.json
index 7cbf7dbabc1..59774d904d8 100644
--- a/2021/20xxx/CVE-2021-20214.json
+++ b/2021/20xxx/CVE-2021-20214.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20214",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928742",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928742"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Memory leaks in the client-tags CGI handler when client tags are configured and memory allocations fail can lead to a system crash."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20215.json b/2021/20xxx/CVE-2021-20215.json
index a50af8658d2..9837fd0818d 100644
--- a/2021/20xxx/CVE-2021-20215.json
+++ b/2021/20xxx/CVE-2021-20215.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20215",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Privoxy 3.0.29"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.29/user-manual/whatsnew.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1928746",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928746"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.29. Memory leaks in the show-status CGI handler when memory allocations fail can lead to a system crash."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20216.json b/2021/20xxx/CVE-2021-20216.json
index 8a0e3b18103..99da47582a1 100644
--- a/2021/20xxx/CVE-2021-20216.json
+++ b/2021/20xxx/CVE-2021-20216.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20216",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "privoxy 3.0.31"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1923256",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923256"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/01/31/2",
+                "url": "https://www.openwall.com/lists/oss-security/2021/01/31/2"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.privoxy.org/3.0.31/user-manual/whatsnew.html",
+                "url": "https://www.privoxy.org/3.0.31/user-manual/whatsnew.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.31. A memory leak that occurs when decompression fails unexpectedly may lead to a denial of service. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20217.json b/2021/20xxx/CVE-2021-20217.json
index d2a6b589e12..12b3357282a 100644
--- a/2021/20xxx/CVE-2021-20217.json
+++ b/2021/20xxx/CVE-2021-20217.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20217",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "privoxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "privoxy 3.0.31"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-617"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1923252",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923252"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in Privoxy in versions before 3.0.31. An assertion failure triggered by a crafted CGI request may lead to denial of service. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index ec3091bcf6c..72ef172f7e3 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -74,6 +74,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-notifications] 20210324 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
                 "url": "https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-dev] 20210325 Comment out the SOAP and HTTP engines?",
+                "url": "https://lists.apache.org/thread.html/r0d97a3b7a14777b9e9e085b483629d2774343c4723236d1c73f43ff0@%3Cdev.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26596.json b/2021/26xxx/CVE-2021-26596.json
index 230dc2c9ea6..ba074f0ad0c 100644
--- a/2021/26xxx/CVE-2021-26596.json
+++ b/2021/26xxx/CVE-2021-26596.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26596",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26596",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Nokia NetAct 18A. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.gruppotim.it/redteam",
+                "url": "https://www.gruppotim.it/redteam"
+            },
+            {
+                "url": "https://www.trusted-introducer.org/directory/teams/nokia-psirt.html",
+                "refsource": "MISC",
+                "name": "https://www.trusted-introducer.org/directory/teams/nokia-psirt.html"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26597.json b/2021/26xxx/CVE-2021-26597.json
index ebca86eee52..6f7bb95b1e2 100644
--- a/2021/26xxx/CVE-2021-26597.json
+++ b/2021/26xxx/CVE-2021-26597.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26597",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26597",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Nokia NetAct 18A. A remote user, authenticated to the NOKIA NetAct Web Page, can visit the Site Configuration Tool web site section and arbitrarily upload potentially dangerous files without restrictions via the /netact/sct dir parameter in conjunction with the operation=upload value."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.gruppotim.it/redteam",
+                "url": "https://www.gruppotim.it/redteam"
+            },
+            {
+                "url": "https://www.trusted-introducer.org/directory/teams/nokia-psirt.html",
+                "refsource": "MISC",
+                "name": "https://www.trusted-introducer.org/directory/teams/nokia-psirt.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27192.json b/2021/27xxx/CVE-2021-27192.json
index c41fc87fa91..da978f45d3d 100644
--- a/2021/27xxx/CVE-2021-27192.json
+++ b/2021/27xxx/CVE-2021-27192.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27192",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27192",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Local privilege escalation vulnerability in Windows clients of Netop Vision Pro up to and including 9.7.1 allows a local user to gain administrator privileges whilst using the clients."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight",
+                "url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27193.json b/2021/27xxx/CVE-2021-27193.json
index 96c6646ab65..f54efe41c10 100644
--- a/2021/27xxx/CVE-2021-27193.json
+++ b/2021/27xxx/CVE-2021-27193.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27193",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27193",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Incorrect default permissions vulnerability in the API of Netop Vision Pro up to and including 9.7.1 allows a remote unauthenticated attacker to read and write files on the remote machine with system privileges resulting in a privilege escalation."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight",
+                "url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27194.json b/2021/27xxx/CVE-2021-27194.json
index 079af95a830..bbb917bb61b 100644
--- a/2021/27xxx/CVE-2021-27194.json
+++ b/2021/27xxx/CVE-2021-27194.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27194",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27194",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cleartext transmission of sensitive information in Netop Vision Pro up to and including 9.7.1 allows a remote unauthenticated attacker to gather credentials including Windows login usernames and passwords."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight",
+                "url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27195.json b/2021/27xxx/CVE-2021-27195.json
index dcffeef5674..02f97140e90 100644
--- a/2021/27xxx/CVE-2021-27195.json
+++ b/2021/27xxx/CVE-2021-27195.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27195",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27195",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper Authorization vulnerability in Netop Vision Pro up to and including to 9.7.1 allows an attacker to replay network traffic."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight",
+                "url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index 6991091a3f9..26d90377878 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -1,146 +1,165 @@
 {
-	"CVE_data_meta": {
-		"ASSIGNER": "PSIRT@esri.com",
-		"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
-		"ID": "CVE-2021-29096",
-		"STATE": "PUBLIC",
-		"TITLE": "ArcGIS general raster security update: use-after-free"
-	},
-	"affects": {
-		"vendor": {
-			"vendor_data": [{
-				"product": {
-					"product_data": [{
-							"product_name": "ArcReader",
-							"version": {
-								"version_data": [{
-									"platform": "x86 Windows",
-									"version_affected": "<",
-									"version_name": "All",
-									"version_value": "10.9.0"
-								}]
-							}
-						},
-						{
-							"product_name": "ArcGIS Desktop",
-							"version": {
-								"version_data": [{
-									"platform": "x86 Windows",
-									"version_affected": "<",
-									"version_name": "All",
-									"version_value": "10.9.0"
-								}]
-							}
-						},
-						{
-							"product_name": "ArcGIS Engine",
-							"version": {
-								"version_data": [{
-										"platform": "X64 Windows",
-										"version_affected": "<",
-										"version_name": "All",
-										"version_value": "10.9.0"
-									},
-									{
-										"platform": "x64 Linux",
-										"version_affected": "<",
-										"version_name": "All",
-										"version_value": "10.9.0"
-									},
-									{
-										"platform": "X86 Windows",
-										"version_affected": "<",
-										"version_name": "All",
-										"version_value": "10.9.0"
-									},
-									{
-										"platform": "X86 Linux",
-										"version_affected": "<",
-										"version_name": "All",
-										"version_value": "10.9.0"
-									}
-								]
-							}
-						},
-						{
-							"product_name": "ArcGIS Desktop Background Geoprocessing",
-							"version": {
-								"version_data": [{
-									"platform": "x86 Windows",
-									"version_affected": "<",
-									"version_name": "All",
-									"version_value": "10.9.0"
-								}]
-							}
-						},
-						{
-							"product_name": "ArcGIS Engine Background Geoprocessing",
-							"version": {
-								"version_data": [{
-										"platform": "x64 Windows",
-										"version_affected": "<",
-										"version_name": "All",
-										"version_value": "10.9.0"
-									},
-									{
-										"platform": "x64 Linux",
-										"version_affected": "<",
-										"version_name": "All",
-										"version_value": "10.9.0"
-									}
-								]
-							}
-						}
-					]
-				},
-				"vendor_name": "Esri"
-			}]
-		}
-	},
-	"data_format": "MITRE",
-	"data_type": "CVE",
-	"data_version": "4.0",
-	"description": {
-		"description_data": [{
-			"lang": "eng",
-			"value": "A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
-		}]
-	},
-	"generator": {
-		"engine": "Vulnogram 0.0.8"
-	},
-	"impact": {
-		"cvss": {
-			"attackComplexity": "LOW",
-			"attackVector": "LOCAL",
-			"availabilityImpact": "HIGH",
-			"baseScore": 7.8,
-			"baseSeverity": "HIGH",
-			"confidentialityImpact": "HIGH",
-			"integrityImpact": "HIGH",
-			"privilegesRequired": "NONE",
-			"scope": "UNCHANGED",
-			"userInteraction": "REQUIRED",
-			"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-			"version": "3.0"
-		}
-	},
-	"problemtype": {
-		"problemtype_data": [{
-			"description": [{
-				"lang": "eng",
-				"value": "CWE-416 Use After Free"
-			}]
-		}]
-	},
-	"references": {
-		"reference_data": [{
-			"name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
-			"refsource": "CONFIRM",
-			"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
-		}]
-	},
-	"source": {
-		"discovery": "EXTERNAL"
-	}
-}
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@esri.com",
+        "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
+        "ID": "CVE-2021-29096",
+        "STATE": "PUBLIC",
+        "TITLE": "ArcGIS general raster security update: use-after-free"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ArcReader",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Desktop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Engine",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "X64 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "x64 Linux",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "X86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "X86 Linux",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Desktop Background Geoprocessing",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Engine Background Geoprocessing",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "x64 Linux",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Esri"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
+            }
+        ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.8"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-416 Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
+                "refsource": "CONFIRM",
+                "url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3443.json b/2021/3xxx/CVE-2021-3443.json
index a9daf6d1f09..dda62ba7f18 100644
--- a/2021/3xxx/CVE-2021-3443.json
+++ b/2021/3xxx/CVE-2021-3443.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3443",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "jasper",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "jasper 2.0.27"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-476"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939233",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939233"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3446.json b/2021/3xxx/CVE-2021-3446.json
index 1874ac16c62..097d6c46622 100644
--- a/2021/3xxx/CVE-2021-3446.json
+++ b/2021/3xxx/CVE-2021-3446.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3446",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "libtpms",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "libtpms 0.8.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-327"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939664",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939664"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in libtpms in versions before 0.8.2. The commonly used integration of libtpms with OpenSSL contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index f4833817ec1..6e13bdb9279 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -76,6 +76,11 @@
                 "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148",
                 "refsource": "CONFIRM",
                 "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148"
+            },
+            {
+                "refsource": "CISCO",
+                "name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 4755f60861b..ee147cedfb9 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -76,6 +76,11 @@
                 "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b",
                 "refsource": "CONFIRM",
                 "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b"
+            },
+            {
+                "refsource": "CISCO",
+                "name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
+                "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3466.json b/2021/3xxx/CVE-2021-3466.json
index 3c0b7c51287..3fa8fdeea29 100644
--- a/2021/3xxx/CVE-2021-3466.json
+++ b/2021/3xxx/CVE-2021-3466.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3466",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "libmicrohttpd",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "libmicrohttpd 0.9.71"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-120"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939127",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939127"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in libmicrohttpd in versions before 0.9.71. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3467.json b/2021/3xxx/CVE-2021-3467.json
index 96aea2c5d88..db95e7b0a68 100644
--- a/2021/3xxx/CVE-2021-3467.json
+++ b/2021/3xxx/CVE-2021-3467.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3467",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "jasper",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "jasper 2.0.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-476"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1942097",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942097"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.26 handled component references in CDEF box in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened."
             }
         ]
     }

From f5080bc25e61dde30768dc72ec0ed7ccef2a222c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 20:00:40 +0000
Subject: [PATCH 635/845] "-Synchronized-Data."

---
 2020/10xxx/CVE-2020-10579.json | 56 +++++++++++++++++++++++++++----
 2020/10xxx/CVE-2020-10580.json | 56 +++++++++++++++++++++++++++----
 2020/10xxx/CVE-2020-10581.json | 56 +++++++++++++++++++++++++++----
 2020/10xxx/CVE-2020-10582.json | 56 +++++++++++++++++++++++++++----
 2020/10xxx/CVE-2020-10583.json | 56 +++++++++++++++++++++++++++----
 2020/10xxx/CVE-2020-10584.json | 56 +++++++++++++++++++++++++++----
 2021/22xxx/CVE-2021-22888.json | 60 ++++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22889.json | 60 ++++++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25917.json |  2 +-
 2021/25xxx/CVE-2021-25918.json |  2 +-
 2021/27xxx/CVE-2021-27438.json | 50 ++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27440.json | 50 ++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27448.json | 50 ++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27450.json | 50 ++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27452.json | 50 ++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27454.json | 50 ++++++++++++++++++++++++++--
 2021/29xxx/CVE-2021-29008.json | 56 +++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29009.json | 56 +++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29010.json | 56 +++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29232.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29233.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29234.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29235.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29236.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29237.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29238.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29239.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29240.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29241.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29242.json | 18 ++++++++++
 30 files changed, 1046 insertions(+), 80 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29232.json
 create mode 100644 2021/29xxx/CVE-2021-29233.json
 create mode 100644 2021/29xxx/CVE-2021-29234.json
 create mode 100644 2021/29xxx/CVE-2021-29235.json
 create mode 100644 2021/29xxx/CVE-2021-29236.json
 create mode 100644 2021/29xxx/CVE-2021-29237.json
 create mode 100644 2021/29xxx/CVE-2021-29238.json
 create mode 100644 2021/29xxx/CVE-2021-29239.json
 create mode 100644 2021/29xxx/CVE-2021-29240.json
 create mode 100644 2021/29xxx/CVE-2021-29241.json
 create mode 100644 2021/29xxx/CVE-2021-29242.json

diff --git a/2020/10xxx/CVE-2020-10579.json b/2020/10xxx/CVE-2020-10579.json
index 2c8614a0d4e..b5331f0d562 100644
--- a/2020/10xxx/CVE-2020-10579.json
+++ b/2020/10xxx/CVE-2020-10579.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-10579",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-10579",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A directory traversal on the /admin/sysmon.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote attackers to list the content of arbitrary server directories accessible to the user running the application."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf",
+                "url": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf"
             }
         ]
     }
diff --git a/2020/10xxx/CVE-2020-10580.json b/2020/10xxx/CVE-2020-10580.json
index e0aa987aef5..4fab22d41ff 100644
--- a/2020/10xxx/CVE-2020-10580.json
+++ b/2020/10xxx/CVE-2020-10580.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-10580",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-10580",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A command injection on the /admin/broadcast.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote authenticated attackers to execute arbitrary PHP code on the server as the user running the application."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf",
+                "url": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf"
             }
         ]
     }
diff --git a/2020/10xxx/CVE-2020-10581.json b/2020/10xxx/CVE-2020-10581.json
index 01d336c0ea8..555a25f66fd 100644
--- a/2020/10xxx/CVE-2020-10581.json
+++ b/2020/10xxx/CVE-2020-10581.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-10581",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-10581",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple session validity check issues in several administration functionalities of Invigo Automatic Device Management (ADM) through 5.0 allow remote attackers to read potentially sensitive data hosted by the application."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf",
+                "url": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf"
             }
         ]
     }
diff --git a/2020/10xxx/CVE-2020-10582.json b/2020/10xxx/CVE-2020-10582.json
index 85ac9693656..0d24ce0ed08 100644
--- a/2020/10xxx/CVE-2020-10582.json
+++ b/2020/10xxx/CVE-2020-10582.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-10582",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-10582",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A SQL injection on the /admin/display_errors.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote attackers to execute arbitrary SQL requests (including data reading and modification) on the database."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf",
+                "url": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf"
             }
         ]
     }
diff --git a/2020/10xxx/CVE-2020-10583.json b/2020/10xxx/CVE-2020-10583.json
index d939ef5969c..85add072f37 100644
--- a/2020/10xxx/CVE-2020-10583.json
+++ b/2020/10xxx/CVE-2020-10583.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-10583",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-10583",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The /admin/admapi.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote authenticated attackers to execute arbitrary OS commands on the server as the user running the application."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf",
+                "url": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf"
             }
         ]
     }
diff --git a/2020/10xxx/CVE-2020-10584.json b/2020/10xxx/CVE-2020-10584.json
index de482e7a4a9..2631003be25 100644
--- a/2020/10xxx/CVE-2020-10584.json
+++ b/2020/10xxx/CVE-2020-10584.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-10584",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-10584",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A directory traversal on the /admin/search_by.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote attackers to read arbitrary server files accessible to the user running the application."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf",
+                "url": "https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf"
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22888.json b/2021/22xxx/CVE-2021-22888.json
index 03f463a2ddc..fefefb571c6 100644
--- a/2021/22xxx/CVE-2021-22888.json
+++ b/2021/22xxx/CVE-2021-22888.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22888",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "support@hackerone.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "https://github.com/revive-adserver/revive-adserver",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Fixed in v5.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-site Scripting (XSS) - Reflected (CWE-79)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://hackerone.com/reports/1097979",
+                "url": "https://hackerone.com/reports/1097979"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.revive-adserver.com/security/revive-sa-2021-003/",
+                "url": "https://www.revive-adserver.com/security/revive-sa-2021-003/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/revive-adserver/revive-adserver/commit/f472d890",
+                "url": "https://github.com/revive-adserver/revive-adserver/commit/f472d890"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Revive Adserver before v5.2.0 is vulnerable to a reflected XSS vulnerability in the `status` parameter of campaign-zone-zones.php. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22889.json b/2021/22xxx/CVE-2021-22889.json
index 17b083a8593..d441f87cd9e 100644
--- a/2021/22xxx/CVE-2021-22889.json
+++ b/2021/22xxx/CVE-2021-22889.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22889",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "support@hackerone.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "https://github.com/revive-adserver/revive-adserver",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Fixed in v5.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-site Scripting (XSS) - Reflected (CWE-79)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.revive-adserver.com/security/revive-sa-2021-003/",
+                "url": "https://www.revive-adserver.com/security/revive-sa-2021-003/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://hackerone.com/reports/1097217",
+                "url": "https://hackerone.com/reports/1097217"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/revive-adserver/revive-adserver/commit/2f868414",
+                "url": "https://github.com/revive-adserver/revive-adserver/commit/2f868414"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Revive Adserver before v5.2.0 is vulnerable to a reflected XSS vulnerability in the `statsBreakdown` parameter of stats.php (and possibly other scripts) due to single quotes not being escaped. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and pressing a certain key combination to execute injected JavaScript code."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25917.json b/2021/25xxx/CVE-2021-25917.json
index 0e48cb20bfd..77355a83322 100644
--- a/2021/25xxx/CVE-2021-25917.json
+++ b/2021/25xxx/CVE-2021-25917.json
@@ -60,7 +60,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
+                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25918.json b/2021/25xxx/CVE-2021-25918.json
index ecbeb701b6e..dc62bda37b7 100644
--- a/2021/25xxx/CVE-2021-25918.json
+++ b/2021/25xxx/CVE-2021-25918.json
@@ -60,7 +60,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
+                "value": "In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the TOTP Authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27438.json b/2021/27xxx/CVE-2021-27438.json
index b7de2948fb8..28052cbfcde 100644
--- a/2021/27xxx/CVE-2021-27438.json
+++ b/2021/27xxx/CVE-2021-27438.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27438",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Reason DR60",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All firmware versions prior to 02A04.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CODE INJECTION CWE-94"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The software contains a hard-coded password it uses for its own inbound authentication or for outbound communication to external components on the Reason DR60 (all firmware versions prior to 02A04.1)."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27440.json b/2021/27xxx/CVE-2021-27440.json
index 069be0c6432..64f7dd4fb15 100644
--- a/2021/27xxx/CVE-2021-27440.json
+++ b/2021/27xxx/CVE-2021-27440.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27440",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Reason DR60",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All firmware versions prior to 02A04.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "USE OF HARD-CODED PASSWORD CWE-259"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The software contains a hard-coded password it uses for its own inbound authentication or for outbound communication to external components on the Reason DR60 (all firmware versions prior to 02A04.1)."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27448.json b/2021/27xxx/CVE-2021-27448.json
index 81567d26704..1eebf18fc18 100644
--- a/2021/27xxx/CVE-2021-27448.json
+++ b/2021/27xxx/CVE-2021-27448.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27448",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "MU320E",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All firmware versions prior to v04A00.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A miscommunication in the file system allows adversaries with access to the MU320E to escalate privileges on the MU320E (all firmware versions prior to v04A00.1)."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27450.json b/2021/27xxx/CVE-2021-27450.json
index 3f3e963ad23..06f6f8046cf 100644
--- a/2021/27xxx/CVE-2021-27450.json
+++ b/2021/27xxx/CVE-2021-27450.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27450",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "MU320E",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All firmware versions prior to v04A00.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "INADEQUATE ENCRYPTION STRENGTH CWE-326"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "SSH server configuration file does not implement some best practices. This could lead to a weakening of the SSH protocol strength, which could lead to additional misconfiguration or be leveraged as part of a larger attack on the MU320E (all firmware versions prior to v04A00.1)."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27452.json b/2021/27xxx/CVE-2021-27452.json
index 07835140d8b..b8d894ba462 100644
--- a/2021/27xxx/CVE-2021-27452.json
+++ b/2021/27xxx/CVE-2021-27452.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27452",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "MU320E",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All firmware versions prior to v04A00.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "USE OF HARD-CODED PASSWORD CWE-259"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The software contains a hard-coded password that could allow an attacker to take control of the merging unit using these hard-coded credentials on the MU320E (all firmware versions prior to v04A00.1)."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27454.json b/2021/27xxx/CVE-2021-27454.json
index e2d2e014fba..d95c1828d5d 100644
--- a/2021/27xxx/CVE-2021-27454.json
+++ b/2021/27xxx/CVE-2021-27454.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-27454",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "ics-cert@hq.dhs.gov",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Reason DR60",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All firmware versions prior to 02A04.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03",
+                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses on the Reason DR60 (all firmware versions prior to 02A04.1)."
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29008.json b/2021/29xxx/CVE-2021-29008.json
index 74dc43fe72f..184211ae34d 100644
--- a/2021/29xxx/CVE-2021-29008.json
+++ b/2021/29xxx/CVE-2021-29008.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29008",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29008",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via webmaster-tools.php in the \"to_time\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/seopanel/Seo-Panel/issues/211",
+                "refsource": "MISC",
+                "name": "https://github.com/seopanel/Seo-Panel/issues/211"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29009.json b/2021/29xxx/CVE-2021-29009.json
index fed10ab0b41..fe91d9d558d 100644
--- a/2021/29xxx/CVE-2021-29009.json
+++ b/2021/29xxx/CVE-2021-29009.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29009",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29009",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php in the \"type\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/seopanel/Seo-Panel/issues/210",
+                "refsource": "MISC",
+                "name": "https://github.com/seopanel/Seo-Panel/issues/210"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29010.json b/2021/29xxx/CVE-2021-29010.json
index eb739608a91..0a087f44e66 100644
--- a/2021/29xxx/CVE-2021-29010.json
+++ b/2021/29xxx/CVE-2021-29010.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29010",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29010",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php in the \"report_type\" parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/seopanel/Seo-Panel/issues/212",
+                "refsource": "MISC",
+                "name": "https://github.com/seopanel/Seo-Panel/issues/212"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29232.json b/2021/29xxx/CVE-2021-29232.json
new file mode 100644
index 00000000000..c8aabbf0275
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29232.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29232",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29233.json b/2021/29xxx/CVE-2021-29233.json
new file mode 100644
index 00000000000..11fd6902e3f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29233.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29233",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29234.json b/2021/29xxx/CVE-2021-29234.json
new file mode 100644
index 00000000000..4faa9a5dcb4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29234.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29234",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29235.json b/2021/29xxx/CVE-2021-29235.json
new file mode 100644
index 00000000000..863876bc509
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29235.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29235",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29236.json b/2021/29xxx/CVE-2021-29236.json
new file mode 100644
index 00000000000..4f41a09a1a3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29236.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29236",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29237.json b/2021/29xxx/CVE-2021-29237.json
new file mode 100644
index 00000000000..b48dbcb2dfd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29237.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29237",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29238.json b/2021/29xxx/CVE-2021-29238.json
new file mode 100644
index 00000000000..11b86e0bf31
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29238.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29238",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29239.json b/2021/29xxx/CVE-2021-29239.json
new file mode 100644
index 00000000000..f92ed570c8e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29239.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29239",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29240.json b/2021/29xxx/CVE-2021-29240.json
new file mode 100644
index 00000000000..559b7425fe1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29240.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29240",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29241.json b/2021/29xxx/CVE-2021-29241.json
new file mode 100644
index 00000000000..bcfceacec21
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29241.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29241",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29242.json b/2021/29xxx/CVE-2021-29242.json
new file mode 100644
index 00000000000..584bea773b9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29242.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29242",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 57219caba485b41d343daaa25122baf462f09401 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 16:19:47 -0400
Subject: [PATCH 636/845] Update CVE-2021-29093.json

---
 2021/29xxx/CVE-2021-29093.json | 85 +++++++++++++++++++++++++++++++---
 1 file changed, 78 insertions(+), 7 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29093.json b/2021/29xxx/CVE-2021-29093.json
index 90418589f45..cee6ff9dbff 100644
--- a/2021/29xxx/CVE-2021-29093.json
+++ b/2021/29xxx/CVE-2021-29093.json
@@ -1,18 +1,89 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@esri.com",
+        "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
         "ID": "CVE-2021-29093",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "ArcGIS Server image service and raster analytics security update: use-after-free"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ArcGIS Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64 ",
+                                            "version_affected": "<=",
+                                            "version_name": "All",
+                                            "version_value": "10.9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Esri "
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A use-after-free vulnerability when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.\n"
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.8"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-416 Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image",
+                "refsource": "CONFIRM",
+                "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From aa542e2ae0d45d589e4d5d3983022412786e2108 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 16:20:51 -0400
Subject: [PATCH 637/845] Update CVE-2021-29094.json

---
 2021/29xxx/CVE-2021-29094.json | 85 +++++++++++++++++++++++++++++++---
 1 file changed, 78 insertions(+), 7 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29094.json b/2021/29xxx/CVE-2021-29094.json
index 87042f23f6c..ae2f1d5165e 100644
--- a/2021/29xxx/CVE-2021-29094.json
+++ b/2021/29xxx/CVE-2021-29094.json
@@ -1,18 +1,89 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "PSIRT@esri.com",
+        "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
         "ID": "CVE-2021-29094",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "ArcGIS Server image service and raster analytics security update: buffer overflow "
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ArcGIS Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64",
+                                            "version_affected": "<=",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Esri "
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.\n"
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.8"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-120 Buffer Overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image",
+                "refsource": "CONFIRM",
+                "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From b86109a9fe28c1b135a752325a4bbe9e32e543d9 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 16:21:56 -0400
Subject: [PATCH 638/845] Update CVE-2021-29095.json

---
 2021/29xxx/CVE-2021-29095.json | 85 +++++++++++++++++++++++++++++++---
 1 file changed, 78 insertions(+), 7 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29095.json b/2021/29xxx/CVE-2021-29095.json
index 5d44a4ea4ec..23ea7217681 100644
--- a/2021/29xxx/CVE-2021-29095.json
+++ b/2021/29xxx/CVE-2021-29095.json
@@ -1,18 +1,89 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@esri.com",
+        "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
         "ID": "CVE-2021-29095",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "ArcGIS Server image service and raster analytics security update: uninitialized pointer"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ArcGIS Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64",
+                                            "version_affected": "<",
+                                            "version_name": "10.8.1",
+                                            "version_value": "10.9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Esri"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.8"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-824 Access of Uninitialized Pointer"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image",
+                "refsource": "CONFIRM",
+                "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From c41a6cf71789ff534cbf8d2f7bc9dca26bf59989 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 16:22:55 -0400
Subject: [PATCH 639/845] Update CVE-2021-29097.json

---
 2021/29xxx/CVE-2021-29097.json | 157 +++++++++++++++++++++++++++++++--
 1 file changed, 150 insertions(+), 7 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 4fb8e116381..5f89da6e617 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -1,18 +1,161 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@esri.com",
+        "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
         "ID": "CVE-2021-29097",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "ArcGIS general raster security update: buffer overflow"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ArcReader",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 ",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Desktop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 ",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Engine",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64 ",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "x86",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Pro",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64 ",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "4.7.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Desktop Background Geoprocessing",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 ",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9"
+                                        },
+                                        {
+                                            "platform": "x64",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Esri"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.8"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-122 Heap-based Buffer Overflow"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-121 Stack-based Buffer Overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
+                "refsource": "CONFIRM",
+                "url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From 70630ed1419a2024bc6e6f7e3748e936ed77ecd9 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Thu, 25 Mar 2021 16:23:54 -0400
Subject: [PATCH 640/845] Update CVE-2021-29098.json

---
 2021/29xxx/CVE-2021-29098.json | 161 +++++++++++++++++++++++++++++++--
 1 file changed, 154 insertions(+), 7 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 6dbf308033e..09806196082 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -1,18 +1,165 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@esri.com",
+        "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
         "ID": "CVE-2021-29098",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "ArcGIS general raster security update: uninitialized pointer"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ArcReader",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Desktop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Engine",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "X64 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "x64 Linux",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "X86 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "X86 Linux",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Pro",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "4.7.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "ArcGIS Desktop Background Geoprocessing",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x64 Windows",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        },
+                                        {
+                                            "platform": "x64 Linux",
+                                            "version_affected": "<",
+                                            "version_name": "All",
+                                            "version_value": "10.9.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Esri"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.8"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-824 Access of Uninitialized Pointer"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
+                "refsource": "CONFIRM",
+                "url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From 77a7c098c4afb61b1df736139d15e53e13e6169b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 21:00:42 +0000
Subject: [PATCH 641/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29093.json |  4 ++--
 2021/29xxx/CVE-2021-29094.json |  6 +++---
 2021/29xxx/CVE-2021-29243.json | 18 ++++++++++++++++++
 3 files changed, 23 insertions(+), 5 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29243.json

diff --git a/2021/29xxx/CVE-2021-29093.json b/2021/29xxx/CVE-2021-29093.json
index cee6ff9dbff..e6955a0e8fe 100644
--- a/2021/29xxx/CVE-2021-29093.json
+++ b/2021/29xxx/CVE-2021-29093.json
@@ -39,7 +39,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "A use-after-free vulnerability when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.\n"
+                "value": "A use-after-free vulnerability when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account."
             }
         ]
     },
@@ -86,4 +86,4 @@
     "source": {
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29094.json b/2021/29xxx/CVE-2021-29094.json
index ae2f1d5165e..aa4a47a570a 100644
--- a/2021/29xxx/CVE-2021-29094.json
+++ b/2021/29xxx/CVE-2021-29094.json
@@ -1,6 +1,6 @@
 {
     "CVE_data_meta": {
-        "ASSIGNER": "PSIRT@esri.com",
+        "ASSIGNER": "psirt@esri.com",
         "DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
         "ID": "CVE-2021-29094",
         "STATE": "PUBLIC",
@@ -39,7 +39,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.\n"
+                "value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account."
             }
         ]
     },
@@ -86,4 +86,4 @@
     "source": {
         "discovery": "INTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29243.json b/2021/29xxx/CVE-2021-29243.json
new file mode 100644
index 00000000000..2bfc433991d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29243.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29243",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From b36e773aeccfd2dff8a76de12ea2fab7a1329bdc Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 22:00:40 +0000
Subject: [PATCH 642/845] "-Synchronized-Data."

---
 2016/2xxx/CVE-2016-2170.json   |  5 +++
 2021/26xxx/CVE-2021-26295.json |  5 +++
 2021/27xxx/CVE-2021-27372.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29244.json | 18 +++++++++++
 2021/3xxx/CVE-2021-3449.json   |  5 +++
 5 files changed, 83 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29244.json

diff --git a/2016/2xxx/CVE-2016-2170.json b/2016/2xxx/CVE-2016-2170.json
index 8fac4a9b627..5611c107190 100644
--- a/2016/2xxx/CVE-2016-2170.json
+++ b/2016/2xxx/CVE-2016-2170.json
@@ -96,6 +96,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-dev] 20210325 Comment out the SOAP and HTTP engines?",
                 "url": "https://lists.apache.org/thread.html/r0d97a3b7a14777b9e9e085b483629d2774343c4723236d1c73f43ff0@%3Cdev.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-dev] 20210325 Re: Comment out the SOAP and HTTP engines?",
+                "url": "https://lists.apache.org/thread.html/reccf8c8a58337ce7c035495d3d82fbc549e97036a9789a2a7d9cccf6@%3Cdev.ofbiz.apache.org%3E"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index 72ef172f7e3..ca7be26fad7 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -79,6 +79,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-dev] 20210325 Comment out the SOAP and HTTP engines?",
                 "url": "https://lists.apache.org/thread.html/r0d97a3b7a14777b9e9e085b483629d2774343c4723236d1c73f43ff0@%3Cdev.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-dev] 20210325 Re: Comment out the SOAP and HTTP engines?",
+                "url": "https://lists.apache.org/thread.html/reccf8c8a58337ce7c035495d3d82fbc549e97036a9789a2a7d9cccf6@%3Cdev.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27372.json b/2021/27xxx/CVE-2021-27372.json
index f8e6af65873..d50cf0c2b8b 100644
--- a/2021/27xxx/CVE-2021-27372.json
+++ b/2021/27xxx/CVE-2021-27372.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27372",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27372",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Realtek xPON RTL9601D SDK 1.9 stores passwords in plaintext which may allow attackers to possibly gain access to the device with root permissions via the build-in network monitoring tool and execute arbitrary commands."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.realtek.com/images/safe-report/RTL9601D_CVE-2021-27372.pdf",
+                "url": "https://www.realtek.com/images/safe-report/RTL9601D_CVE-2021-27372.pdf"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29244.json b/2021/29xxx/CVE-2021-29244.json
new file mode 100644
index 00000000000..9aa11394e1a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29244.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29244",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index 6e13bdb9279..a79c3e08ab0 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -81,6 +81,11 @@
                 "refsource": "CISCO",
                 "name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
                 "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4875",
+                "url": "https://www.debian.org/security/2021/dsa-4875"
             }
         ]
     }

From d51b1e53bb93a3f6fc9836377e2c540558bbdcfe Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 25 Mar 2021 23:00:41 +0000
Subject: [PATCH 643/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26539.json |  5 +++
 2021/26xxx/CVE-2021-26540.json |  5 +++
 2021/3xxx/CVE-2021-3119.json   | 61 ++++++++++++++++++++++++++++++----
 3 files changed, 65 insertions(+), 6 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26539.json b/2021/26xxx/CVE-2021-26539.json
index e91f7f50299..c1338a98e29 100644
--- a/2021/26xxx/CVE-2021-26539.json
+++ b/2021/26xxx/CVE-2021-26539.json
@@ -61,6 +61,11 @@
                 "url": "https://github.com/apostrophecms/sanitize-html/pull/458",
                 "refsource": "MISC",
                 "name": "https://github.com/apostrophecms/sanitize-html/pull/458"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4308",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4308"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26540.json b/2021/26xxx/CVE-2021-26540.json
index b2d5068ab6a..4b0c5e380cc 100644
--- a/2021/26xxx/CVE-2021-26540.json
+++ b/2021/26xxx/CVE-2021-26540.json
@@ -61,6 +61,11 @@
                 "url": "https://github.com/apostrophecms/sanitize-html/pull/460",
                 "refsource": "MISC",
                 "name": "https://github.com/apostrophecms/sanitize-html/pull/460"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4309",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4309"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3119.json b/2021/3xxx/CVE-2021-3119.json
index 889f32b77db..ae553d5cc3e 100644
--- a/2021/3xxx/CVE-2021-3119.json
+++ b/2021/3xxx/CVE-2021-3119.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3119",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3119",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes a segmentation fault."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.telekom.com/resource/blob/621186/3fb50ca7a4a97728be18717ed7b0062c/dl-210308-critical-dos-vulnerability-in-sqlcipher-sql-command-processing-data.pdf",
+                "url": "https://www.telekom.com/resource/blob/621186/3fb50ca7a4a97728be18717ed7b0062c/dl-210308-critical-dos-vulnerability-in-sqlcipher-sql-command-processing-data.pdf"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f#diff-9305215a9a0ea69300281fc4af90bc7f3437e34a0e1745d030213152993ddae4",
+                "url": "https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f#diff-9305215a9a0ea69300281fc4af90bc7f3437e34a0e1745d030213152993ddae4"
             }
         ]
     }

From 0bf0108b57b2450c18568d0c169583e5707e165d Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 03:00:35 +0000
Subject: [PATCH 644/845] "-Synchronized-Data."

---
 2020/23xxx/CVE-2020-23517.json | 56 ++++++++++++++++++++++++++++++----
 2021/3xxx/CVE-2021-3027.json   | 56 ++++++++++++++++++++++++++++++----
 2021/3xxx/CVE-2021-3153.json   | 56 ++++++++++++++++++++++++++++++----
 3 files changed, 150 insertions(+), 18 deletions(-)

diff --git a/2020/23xxx/CVE-2020-23517.json b/2020/23xxx/CVE-2020-23517.json
index 5611aded529..84d03afb882 100644
--- a/2020/23xxx/CVE-2020-23517.json
+++ b/2020/23xxx/CVE-2020-23517.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-23517",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-23517",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in Aryanic HighMail (High CMS) versions 2020 and before allows remote attackers to inject arbitrary web script or HTML, via 'user' to LoginForm."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html",
+                "url": "https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3027.json b/2021/3xxx/CVE-2021-3027.json
index aecfe00584e..ee22058cd95 100644
--- a/2021/3xxx/CVE-2021-3027.json
+++ b/2021/3xxx/CVE-2021-3027.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3027",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3027",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "app/views_mod/user/user.py in LibrIT PaSSHport through 2.5 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided search filter because user input gets no sanitization."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://jorgectf.gitlab.io/disclosure/cve-2021-3027/",
+                "url": "https://jorgectf.gitlab.io/disclosure/cve-2021-3027/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3153.json b/2021/3xxx/CVE-2021-3153.json
index ecb500fd0bb..4e40e1b31db 100644
--- a/2021/3xxx/CVE-2021-3153.json
+++ b/2021/3xxx/CVE-2021-3153.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3153",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3153",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "HashiCorp Terraform Enterprise up to v202102-2 failed to enforce an organization-level setting that required users within an organization to have two-factor authentication enabled. Fixed in v202103-1."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://discuss.hashicorp.com/t/hcsec-2021-06-terraform-enterprise-organization-level-mfa-requirement-was-not-enforced/22401",
+                "url": "https://discuss.hashicorp.com/t/hcsec-2021-06-terraform-enterprise-organization-level-mfa-requirement-was-not-enforced/22401"
             }
         ]
     }

From 6e9f77e54283af9fccdbd015df617be929a39cdf Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 04:00:39 +0000
Subject: [PATCH 645/845] "-Synchronized-Data."

---
 2020/11xxx/CVE-2020-11022.json |  5 +++
 2020/11xxx/CVE-2020-11023.json |  5 +++
 2020/28xxx/CVE-2020-28346.json | 61 ++++++++++++++++++++++++++++++----
 3 files changed, 65 insertions(+), 6 deletions(-)

diff --git a/2020/11xxx/CVE-2020-11022.json b/2020/11xxx/CVE-2020-11022.json
index 0f10976c754..feddedd89a8 100644
--- a/2020/11xxx/CVE-2020-11022.json
+++ b/2020/11xxx/CVE-2020-11022.json
@@ -208,6 +208,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-02",
                 "url": "https://www.tenable.com/security/tns-2021-02"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11023.json b/2020/11xxx/CVE-2020-11023.json
index 72cf27f1da5..b86badebf46 100644
--- a/2020/11xxx/CVE-2020-11023.json
+++ b/2020/11xxx/CVE-2020-11023.json
@@ -318,6 +318,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-02",
                 "url": "https://www.tenable.com/security/tns-2021-02"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html"
             }
         ]
     },
diff --git a/2020/28xxx/CVE-2020-28346.json b/2020/28xxx/CVE-2020-28346.json
index 26657e7527b..9af9377f606 100644
--- a/2020/28xxx/CVE-2020-28346.json
+++ b/2020/28xxx/CVE-2020-28346.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-28346",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-28346",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "ACRN through 2.2 has a devicemodel/hw/pci/virtio/virtio.c NULL Pointer Dereference."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/projectacrn/acrn-hypervisor/pull/5453/commits/ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681",
+                "url": "https://github.com/projectacrn/acrn-hypervisor/pull/5453/commits/ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/projectacrn/acrn-hypervisor/pull/5453",
+                "url": "https://github.com/projectacrn/acrn-hypervisor/pull/5453"
             }
         ]
     }

From df99909f7b11eea06f820b67c99481946f413feb Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 05:00:39 +0000
Subject: [PATCH 646/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29245.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29246.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29247.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29248.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29249.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29250.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29251.json | 18 ++++++++++++++++++
 7 files changed, 126 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29245.json
 create mode 100644 2021/29xxx/CVE-2021-29246.json
 create mode 100644 2021/29xxx/CVE-2021-29247.json
 create mode 100644 2021/29xxx/CVE-2021-29248.json
 create mode 100644 2021/29xxx/CVE-2021-29249.json
 create mode 100644 2021/29xxx/CVE-2021-29250.json
 create mode 100644 2021/29xxx/CVE-2021-29251.json

diff --git a/2021/29xxx/CVE-2021-29245.json b/2021/29xxx/CVE-2021-29245.json
new file mode 100644
index 00000000000..78403623d7b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29245.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29245",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29246.json b/2021/29xxx/CVE-2021-29246.json
new file mode 100644
index 00000000000..95e39f65649
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29246.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29246",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29247.json b/2021/29xxx/CVE-2021-29247.json
new file mode 100644
index 00000000000..5b0a7183217
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29247.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29247",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29248.json b/2021/29xxx/CVE-2021-29248.json
new file mode 100644
index 00000000000..55861417e69
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29248.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29248",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29249.json b/2021/29xxx/CVE-2021-29249.json
new file mode 100644
index 00000000000..430b0355f5b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29249.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29249",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29250.json b/2021/29xxx/CVE-2021-29250.json
new file mode 100644
index 00000000000..7a9ebbc0fb6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29250.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29250",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29251.json b/2021/29xxx/CVE-2021-29251.json
new file mode 100644
index 00000000000..5d735f0b517
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29251.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29251",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 77d8b60dd845ab162c49ee066268569d4225d608 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 06:00:39 +0000
Subject: [PATCH 647/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13949.json | 25 +++++++++++++++++++++++++
 2020/27xxx/CVE-2020-27216.json |  5 +++++
 2021/29xxx/CVE-2021-29252.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29253.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29254.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29255.json | 18 ++++++++++++++++++
 6 files changed, 102 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29252.json
 create mode 100644 2021/29xxx/CVE-2021-29253.json
 create mode 100644 2021/29xxx/CVE-2021-29254.json
 create mode 100644 2021/29xxx/CVE-2021-29255.json

diff --git a/2020/13xxx/CVE-2020-13949.json b/2020/13xxx/CVE-2020-13949.json
index 5121cc8f43b..57fbc170edc 100644
--- a/2020/13xxx/CVE-2020-13949.json
+++ b/2020/13xxx/CVE-2020-13949.json
@@ -368,6 +368,31 @@
                 "refsource": "MLIST",
                 "name": "[hbase-issues] 20210325 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
                 "url": "https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-commits] 20210326 [hbase] branch branch-2 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3083)",
+                "url": "https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210326 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210326 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
+                "url": "https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210326 [GitHub] [hbase] pankaj72981 merged pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
+                "url": "https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[hbase-issues] 20210326 [GitHub] [hbase] pankaj72981 commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
+                "url": "https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index bd8748cbc6a..a4edad8475e 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -545,6 +545,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210325 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210326 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29252.json b/2021/29xxx/CVE-2021-29252.json
new file mode 100644
index 00000000000..8cd60cd020e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29252.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29252",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29253.json b/2021/29xxx/CVE-2021-29253.json
new file mode 100644
index 00000000000..dd6784bd2c4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29253.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29253",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29254.json b/2021/29xxx/CVE-2021-29254.json
new file mode 100644
index 00000000000..3c2520a7de2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29254.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29254",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29255.json b/2021/29xxx/CVE-2021-29255.json
new file mode 100644
index 00000000000..ab4774ae44d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29255.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29255",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 1bbe8e8967dde322a4107e86b9f68fb91aedcbda Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 07:00:38 +0000
Subject: [PATCH 648/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29256.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29257.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29258.json | 18 ++++++++++++++++++
 3 files changed, 54 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29256.json
 create mode 100644 2021/29xxx/CVE-2021-29257.json
 create mode 100644 2021/29xxx/CVE-2021-29258.json

diff --git a/2021/29xxx/CVE-2021-29256.json b/2021/29xxx/CVE-2021-29256.json
new file mode 100644
index 00000000000..05e788ace47
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29256.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29256",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29257.json b/2021/29xxx/CVE-2021-29257.json
new file mode 100644
index 00000000000..55b7eb38d5c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29257.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29257",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29258.json b/2021/29xxx/CVE-2021-29258.json
new file mode 100644
index 00000000000..09f779fbc7c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29258.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29258",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 8b8fe824ed5d52a754a8a9aabbded0e20fe4df11 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 08:00:39 +0000
Subject: [PATCH 649/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28246.json | 56 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28247.json | 56 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28248.json | 56 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28249.json | 56 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28250.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29259.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29260.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29261.json | 18 +++++++++++
 8 files changed, 304 insertions(+), 30 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29259.json
 create mode 100644 2021/29xxx/CVE-2021-29260.json
 create mode 100644 2021/29xxx/CVE-2021-29261.json

diff --git a/2021/28xxx/CVE-2021-28246.json b/2021/28xxx/CVE-2021-28246.json
index 08eec6a8930..e047fcf2ef1 100644
--- a/2021/28xxx/CVE-2021-28246.json
+++ b/2021/28xxx/CVE-2021-28246.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28246",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28246",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/",
+                "url": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28247.json b/2021/28xxx/CVE-2021-28247.json
index a41a8dc399c..749432ef095 100644
--- a/2021/28xxx/CVE-2021-28247.json
+++ b/2021/28xxx/CVE-2021-28247.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28247",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28247",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site Scripting attack against the platform users. The affected endpoints are: cgi/nhWeb with the parameter report, aviewbin/filtermibobjects.pl with the parameter namefilter, and aviewbin/query.pl with the parameters System, SystemText, Group, and GroupText. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/",
+                "url": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28248.json b/2021/28xxx/CVE-2021-28248.json
index cc07ba42765..93dc5f7d8f6 100644
--- a/2021/28xxx/CVE-2021-28248.json
+++ b/2021/28xxx/CVE-2021-28248.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28248",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28248",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Improper Restriction of Excessive Authentication Attempts. An attacker is able to perform an arbitrary number of /web/frames/ authentication attempts using different passwords, and eventually gain access to a targeted account, NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/",
+                "url": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28249.json b/2021/28xxx/CVE-2021-28249.json
index 033da72fa5e..2c9b9ba5d54 100644
--- a/2021/28xxx/CVE-2021-28249.json
+++ b/2021/28xxx/CVE-2021-28249.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28249",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28249",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/",
+                "url": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28250.json b/2021/28xxx/CVE-2021-28250.json
index 73c397e49bd..5028bdb2f16 100644
--- a/2021/28xxx/CVE-2021-28250.json
+++ b/2021/28xxx/CVE-2021-28250.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28250",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28250",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/",
+                "url": "https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29259.json b/2021/29xxx/CVE-2021-29259.json
new file mode 100644
index 00000000000..137bec1fcd6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29259.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29259",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29260.json b/2021/29xxx/CVE-2021-29260.json
new file mode 100644
index 00000000000..4cd0c90133e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29260.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29260",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29261.json b/2021/29xxx/CVE-2021-29261.json
new file mode 100644
index 00000000000..706cb0ee11a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29261.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29261",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 13e668745ba55c0196016f43ea6dffd7388d6c33 Mon Sep 17 00:00:00 2001
From: Ikuya Fukumoto 
Date: Fri, 26 Mar 2021 17:39:28 +0900
Subject: [PATCH 650/845] JPCERT/CC 2021-03-26-17-34

---
 2021/20xxx/CVE-2021-20677.json | 50 ++++++++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20681.json | 50 ++++++++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20682.json | 50 ++++++++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20683.json | 50 ++++++++++++++++++++++++++++++++--
 4 files changed, 188 insertions(+), 12 deletions(-)

diff --git a/2021/20xxx/CVE-2021-20677.json b/2021/20xxx/CVE-2021-20677.json
index 9caa75145d1..a611f6eff48 100644
--- a/2021/20xxx/CVE-2021-20677.json
+++ b/2021/20xxx/CVE-2021-20677.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20677",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vultures@jpcert.or.jp"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "NEC Platforms, Ltd.",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "UNIVERGE Aspire series PBX",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "UNIVERGE Aspire WX from 1.00 to 3.51, UNIVERGE Aspire UX from 1.00 to 9.70, UNIVERGE SV9100 from 1.00 to 10.70, and SL2100 from 1.00 to 3.00"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial-of-service (DoS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.necplatforms.co.jp/en/press/security_adv.html"
+            },
+            {
+                "url": "https://jvn.jp/en/jp/JVN12737530/index.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "UNIVERGE Aspire series PBX (UNIVERGE Aspire WX from 1.00 to 3.51, UNIVERGE Aspire UX from 1.00 to 9.70, UNIVERGE SV9100 from 1.00 to 10.70, and SL2100 from 1.00 to 3.00) allows a remote authenticated attacker to cause system down and a denial of service (DoS) condition by sending a specially crafted command."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20681.json b/2021/20xxx/CVE-2021-20681.json
index de3744fa09b..605f53257bb 100644
--- a/2021/20xxx/CVE-2021-20681.json
+++ b/2021/20xxx/CVE-2021-20681.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20681",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vultures@jpcert.or.jp"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "baserCMS Users Community",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "baserCMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "versions prior to 4.4.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://basercms.net/security/JVN64869876"
+            },
+            {
+                "url": "https://jvn.jp/en/jp/JVN64869876/index.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20682.json b/2021/20xxx/CVE-2021-20682.json
index 44b6a175ab4..d1f0e00ce98 100644
--- a/2021/20xxx/CVE-2021-20682.json
+++ b/2021/20xxx/CVE-2021-20682.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20682",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vultures@jpcert.or.jp"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "baserCMS Users Community",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "baserCMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "versions prior to 4.4.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "OS Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://basercms.net/security/JVN64869876"
+            },
+            {
+                "url": "https://jvn.jp/en/jp/JVN64869876/index.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20683.json b/2021/20xxx/CVE-2021-20683.json
index 9b8bfb258b2..3b19bc19399 100644
--- a/2021/20xxx/CVE-2021-20683.json
+++ b/2021/20xxx/CVE-2021-20683.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20683",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vultures@jpcert.or.jp"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "baserCMS Users Community",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "baserCMS",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "versions prior to 4.4.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://basercms.net/security/JVN64869876"
+            },
+            {
+                "url": "https://jvn.jp/en/jp/JVN64869876/index.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors."
             }
         ]
     }

From 7d1792cceb036aecfc457eb463164d74f9139ccb Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 09:00:41 +0000
Subject: [PATCH 651/845] "-Synchronized-Data."

---
 2021/20xxx/CVE-2021-20677.json | 11 ++++++++---
 2021/20xxx/CVE-2021-20681.json | 11 ++++++++---
 2021/20xxx/CVE-2021-20682.json | 11 ++++++++---
 2021/20xxx/CVE-2021-20683.json | 11 ++++++++---
 4 files changed, 32 insertions(+), 12 deletions(-)

diff --git a/2021/20xxx/CVE-2021-20677.json b/2021/20xxx/CVE-2021-20677.json
index a611f6eff48..446b909597e 100644
--- a/2021/20xxx/CVE-2021-20677.json
+++ b/2021/20xxx/CVE-2021-20677.json
@@ -4,7 +4,8 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20677",
-        "ASSIGNER": "vultures@jpcert.or.jp"
+        "ASSIGNER": "vultures@jpcert.or.jp",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
@@ -44,10 +45,14 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://www.necplatforms.co.jp/en/press/security_adv.html"
+                "url": "https://www.necplatforms.co.jp/en/press/security_adv.html",
+                "refsource": "MISC",
+                "name": "https://www.necplatforms.co.jp/en/press/security_adv.html"
             },
             {
-                "url": "https://jvn.jp/en/jp/JVN12737530/index.html"
+                "url": "https://jvn.jp/en/jp/JVN12737530/index.html",
+                "refsource": "MISC",
+                "name": "https://jvn.jp/en/jp/JVN12737530/index.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20681.json b/2021/20xxx/CVE-2021-20681.json
index 605f53257bb..53218b064ac 100644
--- a/2021/20xxx/CVE-2021-20681.json
+++ b/2021/20xxx/CVE-2021-20681.json
@@ -4,7 +4,8 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20681",
-        "ASSIGNER": "vultures@jpcert.or.jp"
+        "ASSIGNER": "vultures@jpcert.or.jp",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
@@ -44,10 +45,14 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://basercms.net/security/JVN64869876"
+                "url": "https://basercms.net/security/JVN64869876",
+                "refsource": "MISC",
+                "name": "https://basercms.net/security/JVN64869876"
             },
             {
-                "url": "https://jvn.jp/en/jp/JVN64869876/index.html"
+                "url": "https://jvn.jp/en/jp/JVN64869876/index.html",
+                "refsource": "MISC",
+                "name": "https://jvn.jp/en/jp/JVN64869876/index.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20682.json b/2021/20xxx/CVE-2021-20682.json
index d1f0e00ce98..23925988f87 100644
--- a/2021/20xxx/CVE-2021-20682.json
+++ b/2021/20xxx/CVE-2021-20682.json
@@ -4,7 +4,8 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20682",
-        "ASSIGNER": "vultures@jpcert.or.jp"
+        "ASSIGNER": "vultures@jpcert.or.jp",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
@@ -44,10 +45,14 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://basercms.net/security/JVN64869876"
+                "url": "https://basercms.net/security/JVN64869876",
+                "refsource": "MISC",
+                "name": "https://basercms.net/security/JVN64869876"
             },
             {
-                "url": "https://jvn.jp/en/jp/JVN64869876/index.html"
+                "url": "https://jvn.jp/en/jp/JVN64869876/index.html",
+                "refsource": "MISC",
+                "name": "https://jvn.jp/en/jp/JVN64869876/index.html"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20683.json b/2021/20xxx/CVE-2021-20683.json
index 3b19bc19399..4e4e7be548c 100644
--- a/2021/20xxx/CVE-2021-20683.json
+++ b/2021/20xxx/CVE-2021-20683.json
@@ -4,7 +4,8 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20683",
-        "ASSIGNER": "vultures@jpcert.or.jp"
+        "ASSIGNER": "vultures@jpcert.or.jp",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
@@ -44,10 +45,14 @@
     "references": {
         "reference_data": [
             {
-                "url": "https://basercms.net/security/JVN64869876"
+                "url": "https://basercms.net/security/JVN64869876",
+                "refsource": "MISC",
+                "name": "https://basercms.net/security/JVN64869876"
             },
             {
-                "url": "https://jvn.jp/en/jp/JVN64869876/index.html"
+                "url": "https://jvn.jp/en/jp/JVN64869876/index.html",
+                "refsource": "MISC",
+                "name": "https://jvn.jp/en/jp/JVN64869876/index.html"
             }
         ]
     },

From b6b453c102c2ad766e5d7364f697a99198742d13 Mon Sep 17 00:00:00 2001
From: lordoxley <40054947+lordoxley@users.noreply.github.com>
Date: Fri, 26 Mar 2021 09:26:19 +0000
Subject: [PATCH 652/845] Update CVE-2021-23888.json

---
 2021/23xxx/CVE-2021-23888.json | 82 +++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23888.json b/2021/23xxx/CVE-2021-23888.json
index e64998effa0..6218cfa2728 100644
--- a/2021/23xxx/CVE-2021-23888.json
+++ b/2021/23xxx/CVE-2021-23888.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@mcafee.com",
         "ID": "CVE-2021-23888",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "McAfee ePO unvalidated URL redirect vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "McAfee ePolicy Orchestrator (ePO)",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "5.10 CU 10"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "McAfee,LLC"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Unvalidated client-side URL redirect vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 could cause an authenticated ePO user to load an untrusted site in an ePO iframe which could steal information from the authenticated user."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-938: Unvalidated Redirects and Forwards"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10352",
+                "refsource": "CONFIRM",
+                "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10352"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}

From 864fe89b94cf7983de9c3bc452d895a0287bb120 Mon Sep 17 00:00:00 2001
From: lordoxley <40054947+lordoxley@users.noreply.github.com>
Date: Fri, 26 Mar 2021 09:28:38 +0000
Subject: [PATCH 653/845] Update CVE-2021-23889.json

---
 2021/23xxx/CVE-2021-23889.json | 82 +++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23889.json b/2021/23xxx/CVE-2021-23889.json
index 87d414f18c3..a680ca34346 100644
--- a/2021/23xxx/CVE-2021-23889.json
+++ b/2021/23xxx/CVE-2021-23889.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@mcafee.com",
         "ID": "CVE-2021-23889",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "McAfee ePO Cross-site Scripting vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "McAfee ePolicy Orchestrator (ePO)",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "5.10 CU 10"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "McAfee,LLC"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 allows ePO administrators to inject arbitrary web script or HTML via multiple parameters where the administrator's entries were not correctly sanitized."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.5,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE 79: Cross-Site Scripting (XSS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10352",
+                "refsource": "CONFIRM",
+                "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10352"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}

From 7bc16716583f237dcbd5f797f3ba4ef14efcd52e Mon Sep 17 00:00:00 2001
From: lordoxley <40054947+lordoxley@users.noreply.github.com>
Date: Fri, 26 Mar 2021 09:30:41 +0000
Subject: [PATCH 654/845] Update CVE-2021-23890.json

---
 2021/23xxx/CVE-2021-23890.json | 82 +++++++++++++++++++++++++++++++---
 1 file changed, 75 insertions(+), 7 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23890.json b/2021/23xxx/CVE-2021-23890.json
index 0567b50938c..47a360d7d6f 100644
--- a/2021/23xxx/CVE-2021-23890.json
+++ b/2021/23xxx/CVE-2021-23890.json
@@ -1,18 +1,86 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@mcafee.com",
         "ID": "CVE-2021-23890",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "McAfee ePO Information Leak vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "McAfee ePolicy Orchestrator (ePO)",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "5.10 CU 10"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "McAfee,LLC"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Information leak vulnerability in the Agent Handler of McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 allows an unauthenticated user to download McAfee product packages (specifically McAfee Agent) available in ePO repository and install them on their own machines to have it managed and then in turn get policy details from the ePO server. This can only happen when the ePO Agent Handler is installed in a Demilitarized Zone (DMZ) to service machines not connected to the network through a VPN."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-717: Information Leak/Disclosure\t"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10352",
+                "refsource": "CONFIRM",
+                "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10352"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}

From 707e3a1f17aad33d2f14190ddef0fdb1874ed66f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 10:00:42 +0000
Subject: [PATCH 655/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29262.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29262.json

diff --git a/2021/29xxx/CVE-2021-29262.json b/2021/29xxx/CVE-2021-29262.json
new file mode 100644
index 00000000000..9cb1fcd1f41
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29262.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29262",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From b02147606c90b77d06d2c525a30315f83dcd00ce Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 11:00:40 +0000
Subject: [PATCH 656/845] "-Synchronized-Data."

---
 2021/20xxx/CVE-2021-20194.json | 5 +++++
 2021/20xxx/CVE-2021-20229.json | 5 +++++
 2021/23xxx/CVE-2021-23336.json | 5 +++++
 2021/26xxx/CVE-2021-26930.json | 5 +++++
 2021/26xxx/CVE-2021-26931.json | 5 +++++
 2021/26xxx/CVE-2021-26932.json | 5 +++++
 2021/26xxx/CVE-2021-26934.json | 5 +++++
 2021/27xxx/CVE-2021-27405.json | 5 +++++
 2021/3xxx/CVE-2021-3449.json   | 5 +++++
 2021/3xxx/CVE-2021-3450.json   | 5 +++++
 10 files changed, 50 insertions(+)

diff --git a/2021/20xxx/CVE-2021-20194.json b/2021/20xxx/CVE-2021-20194.json
index 5bb238943c5..3f06870bd88 100644
--- a/2021/20xxx/CVE-2021-20194.json
+++ b/2021/20xxx/CVE-2021-20194.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0003/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0003/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20229.json b/2021/20xxx/CVE-2021-20229.json
index 145133dab43..f81c51be125 100644
--- a/2021/20xxx/CVE-2021-20229.json
+++ b/2021/20xxx/CVE-2021-20229.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1925296",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925296"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0005/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0005/"
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json
index 6fd2561ac7a..0a14c103e8e 100644
--- a/2021/23xxx/CVE-2021-23336.json
+++ b/2021/23xxx/CVE-2021-23336.json
@@ -184,6 +184,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e525e48886",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0004/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0004/"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26930.json b/2021/26xxx/CVE-2021-26930.json
index e31d8146b54..034aa0deb69 100644
--- a/2021/26xxx/CVE-2021-26930.json
+++ b/2021/26xxx/CVE-2021-26930.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26931.json b/2021/26xxx/CVE-2021-26931.json
index 8374a1c7f20..d224b6f3462 100644
--- a/2021/26xxx/CVE-2021-26931.json
+++ b/2021/26xxx/CVE-2021-26931.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26932.json b/2021/26xxx/CVE-2021-26932.json
index ba74abc3982..61ca54c1216 100644
--- a/2021/26xxx/CVE-2021-26932.json
+++ b/2021/26xxx/CVE-2021-26932.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26934.json b/2021/26xxx/CVE-2021-26934.json
index 69e4f48e87c..3e649cc3801 100644
--- a/2021/26xxx/CVE-2021-26934.json
+++ b/2021/26xxx/CVE-2021-26934.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-47f53a940a",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27405.json b/2021/27xxx/CVE-2021-27405.json
index d4978182f2d..b18e8aa81f0 100644
--- a/2021/27xxx/CVE-2021-27405.json
+++ b/2021/27xxx/CVE-2021-27405.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/progfay/scrapbox-parser/pull/540",
                 "refsource": "MISC",
                 "name": "https://github.com/progfay/scrapbox-parser/pull/540"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0002/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0002/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index a79c3e08ab0..bd97277d594 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -86,6 +86,11 @@
                 "refsource": "DEBIAN",
                 "name": "DSA-4875",
                 "url": "https://www.debian.org/security/2021/dsa-4875"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index ee147cedfb9..318984737ea 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -81,6 +81,11 @@
                 "refsource": "CISCO",
                 "name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
                 "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
+                "url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
             }
         ]
     }

From e78e624d59da0af09e2c2bb99c64ac4928b661e8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 13:00:40 +0000
Subject: [PATCH 657/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3275.json | 66 ++++++++++++++++++++++++++++++++----
 1 file changed, 60 insertions(+), 6 deletions(-)

diff --git a/2021/3xxx/CVE-2021-3275.json b/2021/3xxx/CVE-2021-3275.json
index 111fbe69d41..84075545dec 100644
--- a/2021/3xxx/CVE-2021-3275.json
+++ b/2021/3xxx/CVE-2021-3275.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3275",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3275",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without sanitization."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.tp-link.com",
+                "refsource": "MISC",
+                "name": "https://www.tp-link.com"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/smriti548/CVE/blob/main/CVE-2021-3275",
+                "url": "https://github.com/smriti548/CVE/blob/main/CVE-2021-3275"
+            },
+            {
+                "refsource": "FULLDISC",
+                "name": "20210326 CVE-2021-3275 : Unauthenticated Stored Cross-site Scripting in Multiple TP-Link Devices",
+                "url": "https://seclists.org/fulldisclosure/2021/Mar/67"
             }
         ]
     }

From 27e5d1a2ff6ec410f85a6271e02cfd91129b14a9 Mon Sep 17 00:00:00 2001
From: Michael Kaplan 
Date: Fri, 26 Mar 2021 14:50:11 +0100
Subject: [PATCH 658/845] update CWE in CVE-2020-27845

---
 2020/27xxx/CVE-2020-27845.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2020/27xxx/CVE-2020-27845.json b/2020/27xxx/CVE-2020-27845.json
index e5815dcf13f..ff10b58a1af 100644
--- a/2020/27xxx/CVE-2020-27845.json
+++ b/2020/27xxx/CVE-2020-27845.json
@@ -36,7 +36,7 @@
                 "description": [
                     {
                         "lang": "eng",
-                        "value": "CWE-122"
+                        "value": "CWE-125"
                     }
                 ]
             }

From 91f2c484b5bc5eb93854f09725e4f19a2aacec01 Mon Sep 17 00:00:00 2001
From: Michael Kaplan 
Date: Fri, 26 Mar 2021 14:50:23 +0100
Subject: [PATCH 659/845] update CWE in CVE-2021-3405

---
 2021/3xxx/CVE-2021-3405.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/3xxx/CVE-2021-3405.json b/2021/3xxx/CVE-2021-3405.json
index 67fbd0ed019..3ce6c8a04ae 100644
--- a/2021/3xxx/CVE-2021-3405.json
+++ b/2021/3xxx/CVE-2021-3405.json
@@ -36,7 +36,7 @@
                 "description": [
                     {
                         "lang": "eng",
-                        "value": "CWE-119"
+                        "value": "CWE-787"
                     }
                 ]
             }

From 9f3ff43a8c985411c9482e11f68dbf53e71915be Mon Sep 17 00:00:00 2001
From: Michael Kaplan 
Date: Fri, 26 Mar 2021 14:50:29 +0100
Subject: [PATCH 660/845] update CWE in CVE-2021-3407

---
 2021/3xxx/CVE-2021-3407.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/3xxx/CVE-2021-3407.json b/2021/3xxx/CVE-2021-3407.json
index f8bc062bc8a..82d659d06cc 100644
--- a/2021/3xxx/CVE-2021-3407.json
+++ b/2021/3xxx/CVE-2021-3407.json
@@ -36,7 +36,7 @@
                 "description": [
                     {
                         "lang": "eng",
-                        "value": "CWE-119"
+                        "value": "CWE-415"
                     }
                 ]
             }

From 270406728e727eaddb1463d88575701c2eb28d85 Mon Sep 17 00:00:00 2001
From: Michael Kaplan 
Date: Fri, 26 Mar 2021 14:50:36 +0100
Subject: [PATCH 661/845] update CWE in CVE-2020-1725

---
 2020/1xxx/CVE-2020-1725.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2020/1xxx/CVE-2020-1725.json b/2020/1xxx/CVE-2020-1725.json
index 4275814ee08..a4d840380ea 100644
--- a/2020/1xxx/CVE-2020-1725.json
+++ b/2020/1xxx/CVE-2020-1725.json
@@ -36,7 +36,7 @@
                 "description": [
                     {
                         "lang": "eng",
-                        "value": "CWE-284"
+                        "value": "CWE-863"
                     }
                 ]
             }

From 4c05ca72b43fda4d042227c8c3c6fe57b1bd6e57 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 14:00:38 +0000
Subject: [PATCH 662/845] "-Synchronized-Data."

---
 2020/25xxx/CVE-2020-25840.json | 50 ++++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22506.json | 50 ++++++++++++++++++++++++++++++++--
 2021/3xxx/CVE-2021-3468.json   | 18 ++++++++++++
 3 files changed, 112 insertions(+), 6 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3468.json

diff --git a/2020/25xxx/CVE-2020-25840.json b/2020/25xxx/CVE-2020-25840.json
index 2b1c6160efa..e89ae86f8b7 100644
--- a/2020/25xxx/CVE-2020-25840.json
+++ b/2020/25xxx/CVE-2020-25840.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25840",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@microfocus.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Access Manager.",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All version prior version 5.0."
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager50-release-notes/accessmanager50-release-notes.html",
+                "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager50-release-notes/accessmanager50-release-notes.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross-Site scripting vulnerability in Micro Focus Access Manager product, affects all version prior to version 5.0. The vulnerability could cause configuration destruction."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22506.json b/2021/22xxx/CVE-2021-22506.json
index b0dc0073434..083861e37e7 100644
--- a/2021/22xxx/CVE-2021-22506.json
+++ b/2021/22xxx/CVE-2021-22506.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22506",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@microfocus.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Access Manager.",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All version prior version 5.0."
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Leakage"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager50-release-notes/accessmanager50-release-notes.html",
+                "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager50-release-notes/accessmanager50-release-notes.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product, affects all versions prior to version 5.0. The vulnerability could cause information leakage."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3468.json b/2021/3xxx/CVE-2021-3468.json
new file mode 100644
index 00000000000..c756cc3130c
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3468.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3468",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From c8f445492b99df4883553e87ec5bb6b1f5043831 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 15:00:38 +0000
Subject: [PATCH 663/845] "-Synchronized-Data."

---
 2020/19xxx/CVE-2020-19625.json | 61 ++++++++++++++++++++++++++++++----
 2020/19xxx/CVE-2020-19626.json | 61 ++++++++++++++++++++++++++++++----
 2 files changed, 110 insertions(+), 12 deletions(-)

diff --git a/2020/19xxx/CVE-2020-19625.json b/2020/19xxx/CVE-2020-19625.json
index 4d7f05f3840..24e88dc41a8 100644
--- a/2020/19xxx/CVE-2020-19625.json
+++ b/2020/19xxx/CVE-2020-19625.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19625",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19625",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Remote Code Execution Vulnerability in tests/support/stores/test_grid_filter.php in oria gridx 1.3, allows remote attackers to execute arbitrary code, via crafted value to the $query parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/oria/gridx/issues/433",
+                "refsource": "MISC",
+                "name": "https://github.com/oria/gridx/issues/433"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://mayoterry.com/file/cve/Remote_Code_Execution_Vulnerability_in_gridx_latest_version.pdf",
+                "url": "http://mayoterry.com/file/cve/Remote_Code_Execution_Vulnerability_in_gridx_latest_version.pdf"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19626.json b/2020/19xxx/CVE-2020-19626.json
index c0cb89959bb..62778a4ec53 100644
--- a/2020/19xxx/CVE-2020-19626.json
+++ b/2020/19xxx/CVE-2020-19626.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19626",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19626",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in craftcms 3.1.31, allows remote attackers to inject arbitrary web script or HTML, via /admin/settings/sites/new."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "http://mayoterry.com/file/cve/XSS_vuluerability_in_Craftcms_3.1.31.pdf",
+                "url": "http://mayoterry.com/file/cve/XSS_vuluerability_in_Craftcms_3.1.31.pdf"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/craftcms/cms/commit/76a2168b6a5e30144f5c06da4ff264f4eca577ff",
+                "url": "https://github.com/craftcms/cms/commit/76a2168b6a5e30144f5c06da4ff264f4eca577ff"
             }
         ]
     }

From c76d153ce6c7a11890efc3d5db859467f74e10e9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 16:00:38 +0000
Subject: [PATCH 664/845] "-Synchronized-Data."

---
 2020/35xxx/CVE-2020-35856.json | 61 ++++++++++++++++++++++++++++++----
 2021/26xxx/CVE-2021-26701.json |  5 +++
 2021/28xxx/CVE-2021-28834.json |  5 +++
 2021/3xxx/CVE-2021-3109.json   | 61 ++++++++++++++++++++++++++++++----
 4 files changed, 120 insertions(+), 12 deletions(-)

diff --git a/2020/35xxx/CVE-2020-35856.json b/2020/35xxx/CVE-2020-35856.json
index bd95697c5b8..e4af67b29b1 100644
--- a/2020/35xxx/CVE-2020-35856.json
+++ b/2020/35xxx/CVE-2020-35856.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-35856",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-35856",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "SolarWinds Orion Platform before 2020.2.5 allows stored XSS attacks by an administrator on the Customize View page."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://support.solarwinds.com/SuccessCenter/s/",
+                "refsource": "MISC",
+                "name": "https://support.solarwinds.com/SuccessCenter/s/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://documentation.solarwinds.com/en/Success_Center/orionplatform/Content/Release_Notes/Orion_Platform_2020-2-5_release_notes.htm",
+                "url": "https://documentation.solarwinds.com/en/Success_Center/orionplatform/Content/Release_Notes/Orion_Platform_2020-2-5_release_notes.htm"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26701.json b/2021/26xxx/CVE-2021-26701.json
index 0213d9b12aa..9d8bd94920a 100644
--- a/2021/26xxx/CVE-2021-26701.json
+++ b/2021/26xxx/CVE-2021-26701.json
@@ -84,6 +84,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-1b22f31541",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-138728e59b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28834.json b/2021/28xxx/CVE-2021-28834.json
index 4bdb4b36267..32cb3e1873f 100644
--- a/2021/28xxx/CVE-2021-28834.json
+++ b/2021/28xxx/CVE-2021-28834.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1",
                 "refsource": "MISC",
                 "name": "https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-139a6a2f9d",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3109.json b/2021/3xxx/CVE-2021-3109.json
index 33c020423ed..d030f6809a2 100644
--- a/2021/3xxx/CVE-2021-3109.json
+++ b/2021/3xxx/CVE-2021-3109.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3109",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3109",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The custom menu item options page in SolarWinds Orion Platform before 2020.2.5 allows Reverse Tabnabbing in the context of an administrator account."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://support.solarwinds.com/SuccessCenter/s/",
+                "refsource": "MISC",
+                "name": "https://support.solarwinds.com/SuccessCenter/s/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://documentation.solarwinds.com/en/Success_Center/orionplatform/Content/Release_Notes/Orion_Platform_2020-2-5_release_notes.htm",
+                "url": "https://documentation.solarwinds.com/en/Success_Center/orionplatform/Content/Release_Notes/Orion_Platform_2020-2-5_release_notes.htm"
             }
         ]
     }

From d5c0f2ca766858ea20223de2321d2e6506feda7e Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 17:00:43 +0000
Subject: [PATCH 665/845] "-Synchronized-Data."

---
 2020/1xxx/CVE-2020-1725.json   |  8 ++---
 2020/27xxx/CVE-2020-27829.json | 55 ++++++++++++++++++++++++++--
 2020/35xxx/CVE-2020-35508.json | 55 ++++++++++++++++++++++++++--
 2020/35xxx/CVE-2020-35518.json | 65 ++++++++++++++++++++++++++++++++--
 2020/6xxx/CVE-2020-6207.json   |  5 +++
 2021/1xxx/CVE-2021-1626.json   | 50 ++++++++++++++++++++++++--
 2021/1xxx/CVE-2021-1627.json   | 50 ++++++++++++++++++++++++--
 2021/1xxx/CVE-2021-1628.json   | 50 ++++++++++++++++++++++++--
 2021/1xxx/CVE-2021-1629.json   | 50 ++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20193.json | 60 +++++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20197.json | 55 ++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20271.json | 55 ++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20284.json | 55 ++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20285.json | 55 ++++++++++++++++++++++++++--
 2021/20xxx/CVE-2021-20289.json | 50 ++++++++++++++++++++++++--
 2021/21xxx/CVE-2021-21772.json |  5 +++
 2021/27xxx/CVE-2021-27807.json |  5 +++
 2021/27xxx/CVE-2021-27906.json |  5 +++
 2021/28xxx/CVE-2021-28951.json |  5 +++
 2021/28xxx/CVE-2021-28952.json |  5 +++
 2021/28xxx/CVE-2021-28964.json |  5 +++
 2021/28xxx/CVE-2021-28971.json |  5 +++
 2021/28xxx/CVE-2021-28972.json |  5 +++
 2021/3xxx/CVE-2021-3275.json   |  5 +++
 2021/3xxx/CVE-2021-3469.json   | 18 ++++++++++
 25 files changed, 738 insertions(+), 43 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3469.json

diff --git a/2020/1xxx/CVE-2020-1725.json b/2020/1xxx/CVE-2020-1725.json
index a4d840380ea..b65e25d7cdc 100644
--- a/2020/1xxx/CVE-2020-1725.json
+++ b/2020/1xxx/CVE-2020-1725.json
@@ -46,13 +46,13 @@
         "reference_data": [
             {
                 "refsource": "MISC",
-                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1765129",
-                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765129"
+                "name": "https://issues.redhat.com/browse/KEYCLOAK-16550",
+                "url": "https://issues.redhat.com/browse/KEYCLOAK-16550"
             },
             {
                 "refsource": "MISC",
-                "name": "https://issues.redhat.com/browse/KEYCLOAK-16550",
-                "url": "https://issues.redhat.com/browse/KEYCLOAK-16550"
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1765129",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765129"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27829.json b/2020/27xxx/CVE-2020-27829.json
index e6627331afd..950c390ac38 100644
--- a/2020/27xxx/CVE-2020-27829.json
+++ b/2020/27xxx/CVE-2020-27829.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-27829",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ImageMagick",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "ImageMagick 7.0.10-45"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-122"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1922525",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922525"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0",
+                "url": "https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A heap based buffer overflow in coders/tiff.c may result in program crash and denial of service in ImageMagick before 7.0.10-45."
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35508.json b/2020/35xxx/CVE-2020-35508.json
index 85c14bde8e2..a609a449831 100644
--- a/2020/35xxx/CVE-2020-35508.json
+++ b/2020/35xxx/CVE-2020-35508.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-35508",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "kernel",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "kernel 5.12"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-665"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/torvalds/linux/commit/b4e00444cab4c3f3fec876dc0cccc8cbb0d1a948",
+                "url": "https://github.com/torvalds/linux/commit/b4e00444cab4c3f3fec876dc0cccc8cbb0d1a948"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process."
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35518.json b/2020/35xxx/CVE-2020-35518.json
index a03356f2d19..04a80d2c5d7 100644
--- a/2020/35xxx/CVE-2020-35518.json
+++ b/2020/35xxx/CVE-2020-35518.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-35518",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "389-ds-base",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "389-ds-base 2.0.3, 389-ds-base 1.4.4.13, 389-ds-base 1.4.3.19"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/389ds/389-ds-base/issues/4480",
+                "url": "https://github.com/389ds/389-ds-base/issues/4480"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc",
+                "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32",
+                "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database."
             }
         ]
     }
diff --git a/2020/6xxx/CVE-2020-6207.json b/2020/6xxx/CVE-2020-6207.json
index d5d6dbe956e..415f5184e20 100644
--- a/2020/6xxx/CVE-2020-6207.json
+++ b/2020/6xxx/CVE-2020-6207.json
@@ -69,6 +69,11 @@
                 "url": "https://launchpad.support.sap.com/#/notes/2890213",
                 "refsource": "MISC",
                 "name": "https://launchpad.support.sap.com/#/notes/2890213"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161993/SAP-Solution-Manager-7.2-Remote-Command-Execution.html",
+                "url": "http://packetstormsecurity.com/files/161993/SAP-Solution-Manager-7.2-Remote-Command-Execution.html"
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1626.json b/2021/1xxx/CVE-2021-1626.json
index 3080c8a6af3..942458413fc 100644
--- a/2021/1xxx/CVE-2021-1626.json
+++ b/2021/1xxx/CVE-2021-1626.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-1626",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@salesforce.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Mulesoft",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Mule 4.1.x and 4.2.x runtime released before February 2, 2021"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Remote Code Execution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://help.salesforce.com/articleView?id=000357382&type=1&mode=1",
+                "url": "https://help.salesforce.com/articleView?id=000357382&type=1&mode=1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "MuleSoft is aware of a Remote Code Execution vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers."
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1627.json b/2021/1xxx/CVE-2021-1627.json
index 5a112c49656..b72c3030f45 100644
--- a/2021/1xxx/CVE-2021-1627.json
+++ b/2021/1xxx/CVE-2021-1627.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-1627",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@salesforce.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Mulesoft",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Mule 3.8.x,3.9.x,4.x runtime released before February 2, 2021"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Server Side Request Forgery"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://help.salesforce.com/articleView?id=000357383&type=1&mode=1",
+                "url": "https://help.salesforce.com/articleView?id=000357383&type=1&mode=1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "MuleSoft is aware of a Server Side Request Forgery vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers."
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1628.json b/2021/1xxx/CVE-2021-1628.json
index bbe78a831d5..e6874835ec2 100644
--- a/2021/1xxx/CVE-2021-1628.json
+++ b/2021/1xxx/CVE-2021-1628.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-1628",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@salesforce.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Mulesoft",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Mule 4.x runtime released before February 2, 2021"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "XML External Entity"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://help.salesforce.com/articleView?id=000357384&type=1&mode=1",
+                "url": "https://help.salesforce.com/articleView?id=000357384&type=1&mode=1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "MuleSoft is aware of a XML External Entity (XXE) vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers."
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1629.json b/2021/1xxx/CVE-2021-1629.json
index 9340c807ebe..74198fc58d9 100644
--- a/2021/1xxx/CVE-2021-1629.json
+++ b/2021/1xxx/CVE-2021-1629.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-1629",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@salesforce.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Tableau",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Tableau Server versions affected on both Windows and Linux are: 2019.4 through 2019.4.17 2020.1 through 2020.1.13 2020.2 through 2020.2.10 2020.3 through 2020.3.6 2020.4 through 2020.4.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Other or Unknown"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://help.salesforce.com/articleView?id=000357424&type=1&mode=1",
+                "url": "https://help.salesforce.com/articleView?id=000357424&type=1&mode=1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Tableau Server fails to validate certain URLs that are embedded in emails sent to Tableau Server users."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20193.json b/2021/20xxx/CVE-2021-20193.json
index e4a3683fd7f..9e2309e2716 100644
--- a/2021/20xxx/CVE-2021-20193.json
+++ b/2021/20xxx/CVE-2021-20193.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20193",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "tar",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.33 and earlier"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-401->CWE-125"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1917565",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917565"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://savannah.gnu.org/bugs/?59897",
+                "url": "https://savannah.gnu.org/bugs/?59897"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777",
+                "url": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20197.json b/2021/20xxx/CVE-2021-20197.json
index f259636b60f..0f6ba9c7285 100644
--- a/2021/20xxx/CVE-2021-20197.json
+++ b/2021/20xxx/CVE-2021-20197.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20197",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "binutils",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "binutils 2.35"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-59"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1913743",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913743"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945",
+                "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20271.json b/2021/20xxx/CVE-2021-20271.json
index e766b354a55..dcdab06f601 100644
--- a/2021/20xxx/CVE-2021-20271.json
+++ b/2021/20xxx/CVE-2021-20271.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20271",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "rpm",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "all versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-345"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21",
+                "url": "https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20284.json b/2021/20xxx/CVE-2021-20284.json
index 8f1bd9364e5..15eaa3c5b7c 100644
--- a/2021/20xxx/CVE-2021-20284.json
+++ b/2021/20xxx/CVE-2021-20284.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20284",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "binutils",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Binutils 2.35.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=26931",
+                "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26931"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1937784",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937784"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20285.json b/2021/20xxx/CVE-2021-20285.json
index 4f463d2b326..ce90c1fec81 100644
--- a/2021/20xxx/CVE-2021-20285.json
+++ b/2021/20xxx/CVE-2021-20285.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20285",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "upx",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "UPX 3.96"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/upx/upx/issues/421",
+                "url": "https://github.com/upx/upx/issues/421"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1937787",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937787"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in upx canPack in p_lx_elf.cpp in UPX 3.96. This flaw allows attackers to cause a denial of service (SEGV or buffer overflow and application crash) or possibly have unspecified other impacts via a crafted ELF. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20289.json b/2021/20xxx/CVE-2021-20289.json
index 9491a57c709..796463a2bd6 100644
--- a/2021/20xxx/CVE-2021-20289.json
+++ b/2021/20xxx/CVE-2021-20289.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20289",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "resteasy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "up to 4.6.0.Final"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-209"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21772.json b/2021/21xxx/CVE-2021-21772.json
index 1775423b9d7..7422ee1ad70 100644
--- a/2021/21xxx/CVE-2021-21772.json
+++ b/2021/21xxx/CVE-2021-21772.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-bb1b7591c4",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDGGB65YBQL662M3MOBNNJJNRNURW4TG/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6945629745",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMMHD2EOMIVJ7EKZTJJMX4C7E6ZRWDL/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 0c346b9098a..3a48eecbb44 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -129,6 +129,11 @@
                 "refsource": "MLIST",
                 "name": "[pdfbox-dev] 20210322 OSS-Fuzz integration",
                 "url": "https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-93469e0030",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index 37a29dd7223..5da7a21b7d6 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -129,6 +129,11 @@
                 "refsource": "MLIST",
                 "name": "[pdfbox-dev] 20210322 OSS-Fuzz integration",
                 "url": "https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-93469e0030",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28951.json b/2021/28xxx/CVE-2021-28951.json
index fe526d8844c..a2c74dd2ef4 100644
--- a/2021/28xxx/CVE-2021-28951.json
+++ b/2021/28xxx/CVE-2021-28951.json
@@ -56,6 +56,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3ebba796fa251d042be42b929a2d916ee5c34a49",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3ebba796fa251d042be42b929a2d916ee5c34a49"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e636ce53df",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28952.json b/2021/28xxx/CVE-2021-28952.json
index 67f4f693d51..16f0f3842d0 100644
--- a/2021/28xxx/CVE-2021-28952.json
+++ b/2021/28xxx/CVE-2021-28952.json
@@ -61,6 +61,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c668e1c0a0f74472469cd514f40c9012b324c31",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c668e1c0a0f74472469cd514f40c9012b324c31"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e636ce53df",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28964.json b/2021/28xxx/CVE-2021-28964.json
index f8e777b6959..4a80f500ed0 100644
--- a/2021/28xxx/CVE-2021-28964.json
+++ b/2021/28xxx/CVE-2021-28964.json
@@ -56,6 +56,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e636ce53df",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28971.json b/2021/28xxx/CVE-2021-28971.json
index ccb8accdd9d..b258c16444e 100644
--- a/2021/28xxx/CVE-2021-28971.json
+++ b/2021/28xxx/CVE-2021-28971.json
@@ -56,6 +56,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e636ce53df",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28972.json b/2021/28xxx/CVE-2021-28972.json
index 15469fc3dde..ed6bba30431 100644
--- a/2021/28xxx/CVE-2021-28972.json
+++ b/2021/28xxx/CVE-2021-28972.json
@@ -56,6 +56,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e636ce53df",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3275.json b/2021/3xxx/CVE-2021-3275.json
index 84075545dec..7e0815c22d4 100644
--- a/2021/3xxx/CVE-2021-3275.json
+++ b/2021/3xxx/CVE-2021-3275.json
@@ -66,6 +66,11 @@
                 "refsource": "FULLDISC",
                 "name": "20210326 CVE-2021-3275 : Unauthenticated Stored Cross-site Scripting in Multiple TP-Link Devices",
                 "url": "https://seclists.org/fulldisclosure/2021/Mar/67"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html",
+                "url": "http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3469.json b/2021/3xxx/CVE-2021-3469.json
new file mode 100644
index 00000000000..0c73e2faa18
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3469.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3469",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 29d485ab7dea5786e70c5292e33f95a6662f1145 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 11:13:53 -0600
Subject: [PATCH 666/845] Add CVE-2021-21403 for GHSA-8wrg-m8vm-5fvj

---
 2021/21xxx/CVE-2021-21403.json | 82 +++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21403.json b/2021/21xxx/CVE-2021-21403.json
index 4659c85def5..02654c7a4b9 100644
--- a/2021/21xxx/CVE-2021-21403.json
+++ b/2021/21xxx/CVE-2021-21403.json
@@ -1,18 +1,88 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21403",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.3.21"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "kongchuanhujiao"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In github.com/kongchuanhujiao/server before version 1.3.21 there is an authentication Bypass by Primary Weakness vulnerability. All users are impacted. This is fixed in version 1.3.21."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 7.5,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-305 Authentication Bypass by Primary Weakness"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj"
+            },
+            {
+                "name": "https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1",
+                "refsource": "MISC",
+                "url": "https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-8wrg-m8vm-5fvj",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 721f54a0b4a3ef8d62fca3f1a1622be95c1abbf0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 18:00:42 +0000
Subject: [PATCH 667/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28695.json | 56 +++++++++++++++++++++++++++----
 2021/1xxx/CVE-2021-1626.json   |  4 +--
 2021/1xxx/CVE-2021-1627.json   |  4 +--
 2021/1xxx/CVE-2021-1628.json   |  4 +--
 2021/29xxx/CVE-2021-29255.json | 61 ++++++++++++++++++++++++++++++----
 5 files changed, 111 insertions(+), 18 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28695.json b/2020/28xxx/CVE-2020-28695.json
index d309dd00a98..b69f20b13ad 100644
--- a/2020/28xxx/CVE-2020-28695.json
+++ b/2020/28xxx/CVE-2020-28695.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-28695",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-28695",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Askey Fiber Router RTF3505VW-N1 BR_SV_g000_R3505VWN1001_s32_7 devices allow Remote Code Execution and retrieval of admin credentials to log into the Dashboard or login via SSH, leading to code execution as root."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b",
+                "url": "https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b"
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1626.json b/2021/1xxx/CVE-2021-1626.json
index 942458413fc..861ae80e7e0 100644
--- a/2021/1xxx/CVE-2021-1626.json
+++ b/2021/1xxx/CVE-2021-1626.json
@@ -45,7 +45,7 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "MISC",
+                "refsource": "CONFIRM",
                 "name": "https://help.salesforce.com/articleView?id=000357382&type=1&mode=1",
                 "url": "https://help.salesforce.com/articleView?id=000357382&type=1&mode=1"
             }
@@ -55,7 +55,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "MuleSoft is aware of a Remote Code Execution vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers."
+                "value": "MuleSoft is aware of a Remote Code Execution vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. Versions affected: Mule 4.1.x and 4.2.x runtime released before February 2, 2021."
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1627.json b/2021/1xxx/CVE-2021-1627.json
index b72c3030f45..6aafaf1d952 100644
--- a/2021/1xxx/CVE-2021-1627.json
+++ b/2021/1xxx/CVE-2021-1627.json
@@ -45,7 +45,7 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "MISC",
+                "refsource": "CONFIRM",
                 "name": "https://help.salesforce.com/articleView?id=000357383&type=1&mode=1",
                 "url": "https://help.salesforce.com/articleView?id=000357383&type=1&mode=1"
             }
@@ -55,7 +55,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "MuleSoft is aware of a Server Side Request Forgery vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers."
+                "value": "MuleSoft is aware of a Server Side Request Forgery vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. This affects: Mule 3.8.x,3.9.x,4.x runtime released before February 2, 2021."
             }
         ]
     }
diff --git a/2021/1xxx/CVE-2021-1628.json b/2021/1xxx/CVE-2021-1628.json
index e6874835ec2..be6fc435b33 100644
--- a/2021/1xxx/CVE-2021-1628.json
+++ b/2021/1xxx/CVE-2021-1628.json
@@ -45,7 +45,7 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "MISC",
+                "refsource": "CONFIRM",
                 "name": "https://help.salesforce.com/articleView?id=000357384&type=1&mode=1",
                 "url": "https://help.salesforce.com/articleView?id=000357384&type=1&mode=1"
             }
@@ -55,7 +55,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "MuleSoft is aware of a XML External Entity (XXE) vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers."
+                "value": "MuleSoft is aware of a XML External Entity (XXE) vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. Affected versions: Mule 4.x runtime released before February 2, 2021."
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29255.json b/2021/29xxx/CVE-2021-29255.json
index ab4774ae44d..feeea1bc93b 100644
--- a/2021/29xxx/CVE-2021-29255.json
+++ b/2021/29xxx/CVE-2021-29255.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29255",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29255",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "MicroSeven MYM71080i-B 2.0.5 through 2.0.20 devices send admin credentials in cleartext to pnp.microseven.com TCP port 7007. An attacker on the same network as the device can capture these credentials."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://blog.microseven.com",
+                "refsource": "MISC",
+                "name": "https://blog.microseven.com"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://cybergladius.com/cve-2021-29255-vulnerability-disclosure/",
+                "url": "https://cybergladius.com/cve-2021-29255-vulnerability-disclosure/"
             }
         ]
     }

From 244d632b641e6dedf8ae07d98e642c081ded9f2d Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 19:00:39 +0000
Subject: [PATCH 668/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22886.json | 60 ++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25369.json | 85 +++++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25370.json | 85 +++++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25371.json | 85 +++++++++++++++++++++++++++++++---
 2021/25xxx/CVE-2021-25372.json | 85 +++++++++++++++++++++++++++++++---
 2021/3xxx/CVE-2021-3470.json   | 18 +++++++
 6 files changed, 391 insertions(+), 27 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3470.json

diff --git a/2021/22xxx/CVE-2021-22886.json b/2021/22xxx/CVE-2021-22886.json
index 67cfb7fea83..c69bf6a9d17 100644
--- a/2021/22xxx/CVE-2021-22886.json
+++ b/2021/22xxx/CVE-2021-22886.json
@@ -4,14 +4,68 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22886",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "support@hackerone.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Rocket.Chat ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Fixed in 3.11, 3.10.5, 3.9.7, 3.8.8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-site Scripting (XSS) - Stored (CWE-79)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://docs.rocket.chat/guides/security/security-updates",
+                "url": "https://docs.rocket.chat/guides/security/security-updates"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://hackerone.com/reports/1014459",
+                "url": "https://hackerone.com/reports/1014459"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/RocketChat/Rocket.Chat/pull/20430",
+                "url": "https://github.com/RocketChat/Rocket.Chat/pull/20430"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Rocket.Chat before 3.11, 3.10.5, 3.9.7, 3.8.8 is vulnerable to persistent cross-site scripting (XSS) using nested markdown tags allowing a remote attacker to inject arbitrary JavaScript in a message. This flaw leads to arbitrary file read and RCE on Rocket.Chat desktop app."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25369.json b/2021/25xxx/CVE-2021-25369.json
index 364b6faa0f8..91274995a50 100644
--- a/2021/25xxx/CVE-2021-25369.json
+++ b/2021/25xxx/CVE-2021-25369.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25369",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Mobile Devices",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "O(8.x), P(9.0), Q(10.0)",
+                                            "version_value": "SMR Mar-2021 Release 1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An improper access control vulnerability in sec_log file prior to SMR MAR-2021 Release 1 exposes sensitive kernel information to userspace."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.2,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/securityUpdate.smsb",
+                "url": "https://security.samsungmobile.com/securityUpdate.smsb"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com",
+                "name": "https://security.samsungmobile.com"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25370.json b/2021/25xxx/CVE-2021-25370.json
index b9652370556..d986b05c2e1 100644
--- a/2021/25xxx/CVE-2021-25370.json
+++ b/2021/25xxx/CVE-2021-25370.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25370",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Mobile Devices",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Selected O(8.X), P(9.0), Q(10.0), R(11.0) ",
+                                            "version_value": "SMR Mar-2021 Release 1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "PHYSICAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CVE-703: Improper Check or Handling of Exceptional Conditions"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/securityUpdate.smsb",
+                "url": "https://security.samsungmobile.com/securityUpdate.smsb"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com",
+                "name": "https://security.samsungmobile.com"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25371.json b/2021/25xxx/CVE-2021-25371.json
index 06758b7f940..62623d5a5b0 100644
--- a/2021/25xxx/CVE-2021-25371.json
+++ b/2021/25xxx/CVE-2021-25371.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25371",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Mobile Devices",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Q(10.0), R(11.0) devices with exynos980, exynos2100, exynos9830",
+                                            "version_value": "SMR Mar-2021 Release 1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability in DSP driver prior to SMR Mar-2021 Release 1 allows attackers load arbitrary ELF libraries inside DSP."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "PHYSICAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-912: Hidden Functionality"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/securityUpdate.smsb",
+                "url": "https://security.samsungmobile.com/securityUpdate.smsb"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com",
+                "name": "https://security.samsungmobile.com"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/25xxx/CVE-2021-25372.json b/2021/25xxx/CVE-2021-25372.json
index 3b4b3812dec..a22c7e6b602 100644
--- a/2021/25xxx/CVE-2021-25372.json
+++ b/2021/25xxx/CVE-2021-25372.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "mobile.security@samsung.com",
         "ID": "CVE-2021-25372",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Samsung Mobile Devices",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Q(10.0), R(11.0) devices with exynos980, exynos2100, exynos9830",
+                                            "version_value": "SMR Mar-2021 Release 1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Samsung Mobile"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An improper boundary check in DSP driver prior to SMR Mar-2021 Release 1 allows out of bounds memory access."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "PHYSICAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CVE-703: Improper Check or Handling of Exceptional Conditions"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.samsungmobile.com/securityUpdate.smsb",
+                "url": "https://security.samsungmobile.com/securityUpdate.smsb"
+            },
+            {
+                "refsource": "MISC",
+                "url": "https://security.samsungmobile.com",
+                "name": "https://security.samsungmobile.com"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3470.json b/2021/3xxx/CVE-2021-3470.json
new file mode 100644
index 00000000000..eba385e6521
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3470.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3470",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 84c9163936725a781d85d3d5daea03d2c46fcadc Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 13:53:47 -0600
Subject: [PATCH 669/845] Add CVE-2021-21332 for GHSA-246w-56m2-5899

---
 2021/21xxx/CVE-2021-21332.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21332.json b/2021/21xxx/CVE-2021-21332.json
index 75429b8a6ac..76893f60369 100644
--- a/2021/21xxx/CVE-2021-21332.json
+++ b/2021/21xxx/CVE-2021-21332.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21332",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Cross-site scripting (XSS) vulnerability in the password reset endpoint"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "synapse",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.27.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "matrix-org"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.27.0, the password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. This is fixed in version 1.27.0."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.9,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79 Cross-site Scripting (XSS)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/releases/tag/v1.27.0",
+                "refsource": "MISC",
+                "url": "https://github.com/matrix-org/synapse/releases/tag/v1.27.0"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/pull/9200",
+                "refsource": "MISC",
+                "url": "https://github.com/matrix-org/synapse/pull/9200"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df",
+                "refsource": "MISC",
+                "url": "https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-246w-56m2-5899",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 53e0626dedbc07644db0f1a0108c9156c0f1af85 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 13:54:58 -0600
Subject: [PATCH 670/845] Add CVE-2021-21333 for GHSA-c5f8-35qr-q4fm

---
 2021/21xxx/CVE-2021-21333.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21333.json b/2021/21xxx/CVE-2021-21333.json
index 23e1e2e9761..19780d42692 100644
--- a/2021/21xxx/CVE-2021-21333.json
+++ b/2021/21xxx/CVE-2021-21333.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21333",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "HTML injection in email and account expiry notifications"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "synapse",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.27.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "matrix-org"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.27.0, the notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. In the case of the notification for missed messages, this could allow an attacker to insert forged content into the email. The account expiry feature is not enabled by default and the HTML injection is not controllable by an attacker. This is fixed in version 1.27.0."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/releases/tag/v1.27.0",
+                "refsource": "MISC",
+                "url": "https://github.com/matrix-org/synapse/releases/tag/v1.27.0"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/pull/9200",
+                "refsource": "MISC",
+                "url": "https://github.com/matrix-org/synapse/pull/9200"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df",
+                "refsource": "MISC",
+                "url": "https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-c5f8-35qr-q4fm",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 7e8647c4c2f0c8b901310a60821e5f00b0bf1f7f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 20:00:43 +0000
Subject: [PATCH 671/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28601.json |  5 ++
 2020/28xxx/CVE-2020-28636.json |  5 ++
 2020/35xxx/CVE-2020-35628.json |  5 ++
 2020/35xxx/CVE-2020-35636.json |  5 ++
 2021/21xxx/CVE-2021-21772.json |  5 ++
 2021/22xxx/CVE-2021-22172.json | 90 ++++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22180.json | 90 ++++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22184.json | 85 ++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22194.json | 85 ++++++++++++++++++++++++++++++--
 2021/28xxx/CVE-2021-28951.json |  5 ++
 2021/28xxx/CVE-2021-28952.json |  5 ++
 2021/28xxx/CVE-2021-28964.json |  5 ++
 2021/28xxx/CVE-2021-28971.json |  5 ++
 2021/28xxx/CVE-2021-28972.json |  5 ++
 2021/29xxx/CVE-2021-29263.json | 18 +++++++
 2021/3xxx/CVE-2021-3471.json   | 18 +++++++
 16 files changed, 420 insertions(+), 16 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29263.json
 create mode 100644 2021/3xxx/CVE-2021-3471.json

diff --git a/2020/28xxx/CVE-2020-28601.json b/2020/28xxx/CVE-2020-28601.json
index 383d5b1fd80..bdc8815b94a 100644
--- a/2020/28xxx/CVE-2020-28601.json
+++ b/2020/28xxx/CVE-2020-28601.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-0d42c7cb33",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9de542ab4c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/"
             }
         ]
     },
diff --git a/2020/28xxx/CVE-2020-28636.json b/2020/28xxx/CVE-2020-28636.json
index 85d71769e22..a495d324cb7 100644
--- a/2020/28xxx/CVE-2020-28636.json
+++ b/2020/28xxx/CVE-2020-28636.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-0d42c7cb33",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9de542ab4c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/"
             }
         ]
     },
diff --git a/2020/35xxx/CVE-2020-35628.json b/2020/35xxx/CVE-2020-35628.json
index eecd414e33d..9e9f82a4b73 100644
--- a/2020/35xxx/CVE-2020-35628.json
+++ b/2020/35xxx/CVE-2020-35628.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-0d42c7cb33",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9de542ab4c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/"
             }
         ]
     },
diff --git a/2020/35xxx/CVE-2020-35636.json b/2020/35xxx/CVE-2020-35636.json
index 8fd41dff236..85ff307cae3 100644
--- a/2020/35xxx/CVE-2020-35636.json
+++ b/2020/35xxx/CVE-2020-35636.json
@@ -53,6 +53,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-0d42c7cb33",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9de542ab4c",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21772.json b/2021/21xxx/CVE-2021-21772.json
index 7422ee1ad70..310d277256d 100644
--- a/2021/21xxx/CVE-2021-21772.json
+++ b/2021/21xxx/CVE-2021-21772.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-6945629745",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMMHD2EOMIVJ7EKZTJJMX4C7E6ZRWDL/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-b73f9c96ee",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPBS642OYVA6DUKK3HZHEINVWEDZSMEU/"
             }
         ]
     },
diff --git a/2021/22xxx/CVE-2021-22172.json b/2021/22xxx/CVE-2021-22172.json
index c954631823d..9c68a482dc0 100644
--- a/2021/22xxx/CVE-2021-22172.json
+++ b/2021/22xxx/CVE-2021-22172.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22172",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=12.8, <13.6.6"
+                                        },
+                                        {
+                                            "version_value": ">=13.7.0, <13.7.6"
+                                        },
+                                        {
+                                            "version_value": ">=13.8.0, <13.8.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper authorization in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/212911",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/212911",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/833334",
+                "url": "https://hackerone.com/reports/833334",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22172.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22172.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper authorization in GitLab 12.8+ allows a guest user in a private project to view tag data that should be inaccessible on the releases page"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.2,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks [@izzsec](https://hackerone.com/izzsec?type=user) for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22180.json b/2021/22xxx/CVE-2021-22180.json
index b5225f66056..505534bb3c8 100644
--- a/2021/22xxx/CVE-2021-22180.json
+++ b/2021/22xxx/CVE-2021-22180.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22180",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.8, <13.8.4"
+                                        },
+                                        {
+                                            "version_value": ">=13.7, <13.7.7"
+                                        },
+                                        {
+                                            "version_value": ">=13.6, <13.6.7"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper access control in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/295662",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/295662",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/1064645",
+                "url": "https://hackerone.com/reports/1064645",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22180.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22180.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue has been discovered in GitLab affecting all versions starting from 13.4. Improper access control allows unauthorized users to access details on analytic pages."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.2,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22184.json b/2021/22xxx/CVE-2021-22184.json
index 551de4e0235..6c6650defbe 100644
--- a/2021/22xxx/CVE-2021-22184.json
+++ b/2021/22xxx/CVE-2021-22184.json
@@ -4,15 +4,92 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22184",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=12.8, <13.6.6"
+                                        },
+                                        {
+                                            "version_value": ">=13.7.0, <13.7.6"
+                                        },
+                                        {
+                                            "version_value": ">=13.8.0, <13.8.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Inclusion of sensitive information in log files in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/281676",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/281676",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22184.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22184.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An information disclosure issue in GitLab starting from version 12.8 allowed a user with access to the server logs to see sensitive information that wasn't properly redacted."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 6.1,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "This vulnerability has been discovered internally by the GitLab team"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22194.json b/2021/22xxx/CVE-2021-22194.json
index 5b5f43246a9..74f07adb696 100644
--- a/2021/22xxx/CVE-2021-22194.json
+++ b/2021/22xxx/CVE-2021-22194.json
@@ -4,15 +4,92 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22194",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=13.7, <13.7.8"
+                                        },
+                                        {
+                                            "version_value": ">=13.8, <13.8.5"
+                                        },
+                                        {
+                                            "version_value": ">=13.9, <13.9.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Insecure storage of sensitive information in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/262107",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/262107",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22194.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22194.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In all versions of GitLab starting from 13.7, marshalled session keys were being stored in Redis."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
+            "attackComplexity": "HIGH",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 5.6,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "This vulnerability has been discovered internally by the GitLab team"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28951.json b/2021/28xxx/CVE-2021-28951.json
index a2c74dd2ef4..6ab52746c9f 100644
--- a/2021/28xxx/CVE-2021-28951.json
+++ b/2021/28xxx/CVE-2021-28951.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e636ce53df",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-68b0dd2373",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28952.json b/2021/28xxx/CVE-2021-28952.json
index 16f0f3842d0..e451340b26c 100644
--- a/2021/28xxx/CVE-2021-28952.json
+++ b/2021/28xxx/CVE-2021-28952.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e636ce53df",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-68b0dd2373",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28964.json b/2021/28xxx/CVE-2021-28964.json
index 4a80f500ed0..6871aca13e3 100644
--- a/2021/28xxx/CVE-2021-28964.json
+++ b/2021/28xxx/CVE-2021-28964.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e636ce53df",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-68b0dd2373",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28971.json b/2021/28xxx/CVE-2021-28971.json
index b258c16444e..5956834090d 100644
--- a/2021/28xxx/CVE-2021-28971.json
+++ b/2021/28xxx/CVE-2021-28971.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e636ce53df",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-68b0dd2373",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28972.json b/2021/28xxx/CVE-2021-28972.json
index ed6bba30431..66f51bbfdc9 100644
--- a/2021/28xxx/CVE-2021-28972.json
+++ b/2021/28xxx/CVE-2021-28972.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e636ce53df",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-68b0dd2373",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29263.json b/2021/29xxx/CVE-2021-29263.json
new file mode 100644
index 00000000000..331c42aedd6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29263.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29263",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3471.json b/2021/3xxx/CVE-2021-3471.json
new file mode 100644
index 00000000000..1f59e3a01ca
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3471.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3471",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From f5fcc2f9f2792a72cf6a125d509e85a65ce12d0b Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 14:50:19 -0600
Subject: [PATCH 672/845] Add CVE-2021-21411 for GHSA-652x-m2gr-hppm

---
 2021/21xxx/CVE-2021-21411.json | 97 +++++++++++++++++++++++++++++++---
 1 file changed, 91 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21411.json b/2021/21xxx/CVE-2021-21411.json
index d2a26b7665d..aacd22527ba 100644
--- a/2021/21xxx/CVE-2021-21411.json
+++ b/2021/21xxx/CVE-2021-21411.json
@@ -1,18 +1,103 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21411",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Incorrect authorization in OAuth2-Proxy"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "oauth2-proxy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 7.0.0, < 7.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "oauth2-proxy"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "OAuth2-Proxy is an open source reverse proxy that provides authentication with Google, Github or other providers. The `--gitlab-group` flag for group-based authorization in the GitLab provider stopped working in the v7.0.0 release. Regardless of the flag settings, authorization wasn't restricted. Additionally, any authenticated users had whichever groups were set in `--gitlab-group` added to the new `X-Forwarded-Groups` header to the upstream application. While adding GitLab project based authorization support in #630, a bug was introduced where the user session's groups field was populated with the `--gitlab-group` config entries instead of pulling the individual user's group membership from the GitLab Userinfo endpoint. When the session groups where compared against the allowed groups for authorization, they matched improperly (since both lists were populated with the same data) so authorization was allowed. This impacts GitLab Provider users who relies on group membership for authorization restrictions. Any authenticated users in your GitLab environment can access your applications regardless of `--gitlab-group` membership restrictions. This is patched in v7.1.0. There is no workaround for the Group membership bug. But `--gitlab-project` can be set to use Project membership as the authorization checks instead of groups; it is not broken."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-863 Incorrect Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-652x-m2gr-hppm",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-652x-m2gr-hppm"
+            },
+            {
+                "name": "https://github.com/oauth2-proxy/oauth2-proxy/commit/0279fa7dff1752f1710707dbd1ffac839de8bbfc",
+                "refsource": "MISC",
+                "url": "https://github.com/oauth2-proxy/oauth2-proxy/commit/0279fa7dff1752f1710707dbd1ffac839de8bbfc"
+            },
+            {
+                "name": "https://docs.gitlab.com/ee/user/group/",
+                "refsource": "MISC",
+                "url": "https://docs.gitlab.com/ee/user/group/"
+            },
+            {
+                "name": "https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.1.0",
+                "refsource": "MISC",
+                "url": "https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.1.0"
+            },
+            {
+                "name": "https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7",
+                "refsource": "MISC",
+                "url": "https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-652x-m2gr-hppm",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 524e7515d71eebe3972fee9ac77b29fb32067a7a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 21:00:43 +0000
Subject: [PATCH 673/845] "-Synchronized-Data."

---
 2020/25xxx/CVE-2020-25578.json | 50 ++++++++++++++++++++++++++++++++--
 2020/25xxx/CVE-2020-25579.json | 50 ++++++++++++++++++++++++++++++++--
 2020/25xxx/CVE-2020-25580.json | 50 ++++++++++++++++++++++++++++++++--
 2020/25xxx/CVE-2020-25581.json | 50 ++++++++++++++++++++++++++++++++--
 2020/25xxx/CVE-2020-25582.json | 50 ++++++++++++++++++++++++++++++++--
 2020/7xxx/CVE-2020-7461.json   | 50 ++++++++++++++++++++++++++++++++--
 2020/7xxx/CVE-2020-7462.json   | 50 ++++++++++++++++++++++++++++++++--
 2020/7xxx/CVE-2020-7463.json   | 50 ++++++++++++++++++++++++++++++++--
 2020/7xxx/CVE-2020-7464.json   | 50 ++++++++++++++++++++++++++++++++--
 2020/7xxx/CVE-2020-7467.json   | 50 ++++++++++++++++++++++++++++++++--
 2020/7xxx/CVE-2020-7468.json   | 50 ++++++++++++++++++++++++++++++++--
 2021/21xxx/CVE-2021-21333.json | 10 +++----
 2021/21xxx/CVE-2021-21389.json |  2 +-
 2021/21xxx/CVE-2021-21411.json | 10 +++----
 14 files changed, 528 insertions(+), 44 deletions(-)

diff --git a/2020/25xxx/CVE-2020-25578.json b/2020/25xxx/CVE-2020-25578.json
index e5dc9077416..35117628d54 100644
--- a/2020/25xxx/CVE-2020-25578.json
+++ b/2020/25xxx/CVE-2020-25578.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25578",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p3, 12.1-RELEASE before p13, 11.4-RELEASE before p7"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper initialization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:01.fsdisclosure.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:01.fsdisclosure.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r368969, 11.4-STABLE before r369047, 12.2-RELEASE before p3, 12.1-RELEASE before p13 and 11.4-RELEASE before p7 several file systems were not properly initializing the d_off field of the dirent structures returned by VOP_READDIR. In particular, tmpfs(5), smbfs(5), autofs(5) and mqueuefs(5) were failing to do so. As a result, eight uninitialized kernel stack bytes may be leaked to userspace by these file systems."
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25579.json b/2020/25xxx/CVE-2020-25579.json
index 4048e9b0c8e..73c4f4745e9 100644
--- a/2020/25xxx/CVE-2020-25579.json
+++ b/2020/25xxx/CVE-2020-25579.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25579",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p3, 12.1-RELEASE before p13, 11.4-RELEASE before p7"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper initialization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:01.fsdisclosure.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:01.fsdisclosure.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r368969, 11.4-STABLE before r369047, 12.2-RELEASE before p3, 12.1-RELEASE before p13 and 11.4-RELEASE before p7 msdosfs(5) was failing to zero-fill a pair of padding fields in the dirent structure, resulting in a leak of three uninitialized bytes."
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25580.json b/2020/25xxx/CVE-2020-25580.json
index 410cdddd331..3c92e6b8b8b 100644
--- a/2020/25xxx/CVE-2020-25580.json
+++ b/2020/25xxx/CVE-2020-25580.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25580",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p4, 11.4-RELEASE before p8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Missing authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:03.pam_login_access.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:03.pam_login_access.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r369346, 11.4-STABLE before r369345, 12.2-RELEASE before p4 and 11.4-RELEASE before p8 a regression in the login.access(5) rule processor has the effect of causing rules to fail to match even when they should not. This means that rules denying access may be ignored."
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25581.json b/2020/25xxx/CVE-2020-25581.json
index 7fe7e278a0a..4c329e6bfa8 100644
--- a/2020/25xxx/CVE-2020-25581.json
+++ b/2020/25xxx/CVE-2020-25581.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25581",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p4, 11.4-RELEASE before p8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Race Condition"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:04.jail_remove.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:04.jail_remove.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r369312, 11.4-STABLE before r369313, 12.2-RELEASE before p4 and 11.4-RELEASE before p8 due to a race condition in the jail_remove(2) implementation, it may fail to kill some of the processes."
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25582.json b/2020/25xxx/CVE-2020-25582.json
index ce71252d183..416dbe7d2c0 100644
--- a/2020/25xxx/CVE-2020-25582.json
+++ b/2020/25xxx/CVE-2020-25582.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25582",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p4, 11.4-RELEASE before p8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper check for unusual conditions"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:05.jail_chdir.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:05.jail_chdir.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r369334, 11.4-STABLE before r369335, 12.2-RELEASE before p4 and 11.4-RELEASE before p8 when a process, such as jexec(8) or killall(1), calls jail_attach(2) to enter a jail, the jailed root can attach to it using ptrace(2) before the current working directory is changed."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7461.json b/2020/7xxx/CVE-2020-7461.json
index 56dd7284396..b08ef8a6a26 100644
--- a/2020/7xxx/CVE-2020-7461.json
+++ b/2020/7xxx/CVE-2020-7461.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-7461",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.1-RELEASE before p9, 11.4-RELEASE before p3, 11.3-RELEASE before p13"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Heap-based Buffer Overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:26.dhclient.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:26.dhclient.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7462.json b/2020/7xxx/CVE-2020-7462.json
index 2b908d6a8c0..d2dd7325a3f 100644
--- a/2020/7xxx/CVE-2020-7462.json
+++ b/2020/7xxx/CVE-2020-7462.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-7462",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 11.3-RELEASE before p13"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:24.ipv6.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:24.ipv6.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In 11.4-PRERELEASE before r360733 and 11.3-RELEASE before p13, improper mbuf handling in the kernel causes a use-after-free bug by sending IPv6 Hop-by-Hop options over the loopback interface. The use-after-free situation may result in unintended kernel behaviour including a kernel panic."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7463.json b/2020/7xxx/CVE-2020-7463.json
index dd9c8bdaa3a..1c411e9627d 100644
--- a/2020/7xxx/CVE-2020-7463.json
+++ b/2020/7xxx/CVE-2020-7463.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-7463",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.1-RELEASE before p9, 11.4-RELEASE before p3, 11.3-RELEASE before p13"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:25.sctp.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:25.sctp.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.1-STABLE before r364644, 11.4-STABLE before r364651, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, improper handling in the kernel causes a use-after-free bug by sending large user messages from multiple threads on the same SCTP socket. The use-after-free situation may result in unintended kernel behaviour including a kernel panic."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7464.json b/2020/7xxx/CVE-2020-7464.json
index c593df810a9..b0e32e6dd4f 100644
--- a/2020/7xxx/CVE-2020-7464.json
+++ b/2020/7xxx/CVE-2020-7464.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-7464",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.1-RELEASE before p10, 11.4-RELEASE before p4, 11.3-RELEASE before p14"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper Calculation of Buffer Size"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:27.ure.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:27.ure.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r365730, 11.4-STABLE before r365738, 12.1-RELEASE before p10, 11.4-RELEASE before p4, and 11.3-RELEASE before p14, a programming error in the ure(4) device driver caused some Realtek USB Ethernet interfaces to incorrectly report packets with more than 2048 bytes in a single USB transfer as having a length of only 2048 bytes. An adversary can exploit this to cause the driver to misinterpret part of the payload of a large packet as a separate packet, and thereby inject packets across security boundaries such as VLANs."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7467.json b/2020/7xxx/CVE-2020-7467.json
index 5f4368d22db..afae6299900 100644
--- a/2020/7xxx/CVE-2020-7467.json
+++ b/2020/7xxx/CVE-2020-7467.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-7467",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.1-RELEASE before p10, 11.4-RELEASE before p4, 11.3-RELEASE before p14"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper initialization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:29.bhyve_svm.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:29.bhyve_svm.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r365767, 11.4-STABLE before r365769, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a number of AMD virtualization instructions operate on host physical addresses, are not subject to nested page table translation, and guest use of these instructions was not trapped."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7468.json b/2020/7xxx/CVE-2020-7468.json
index 42b87c8919c..b18d4775111 100644
--- a/2020/7xxx/CVE-2020-7468.json
+++ b/2020/7xxx/CVE-2020-7468.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-7468",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.1-RELEASE before p10, 11.4-RELEASE before p4, 11.3-RELEASE before p14"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Missing authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:30.ftpd.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:30.ftpd.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r365772, 11.4-STABLE before r365773, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21333.json b/2021/21xxx/CVE-2021-21333.json
index 19780d42692..740bea787ad 100644
--- a/2021/21xxx/CVE-2021-21333.json
+++ b/2021/21xxx/CVE-2021-21333.json
@@ -69,11 +69,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm"
-            },
             {
                 "name": "https://github.com/matrix-org/synapse/releases/tag/v1.27.0",
                 "refsource": "MISC",
@@ -88,6 +83,11 @@
                 "name": "https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df",
                 "refsource": "MISC",
                 "url": "https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df"
+            },
+            {
+                "name": "https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21389.json b/2021/21xxx/CVE-2021-21389.json
index 8ec3cdc11e0..08259f3f309 100644
--- a/2021/21xxx/CVE-2021-21389.json
+++ b/2021/21xxx/CVE-2021-21389.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint.\n\nThe vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue."
+                "value": "BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue."
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21411.json b/2021/21xxx/CVE-2021-21411.json
index aacd22527ba..c0e226682ed 100644
--- a/2021/21xxx/CVE-2021-21411.json
+++ b/2021/21xxx/CVE-2021-21411.json
@@ -69,6 +69,11 @@
     },
     "references": {
         "reference_data": [
+            {
+                "name": "https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7",
+                "refsource": "MISC",
+                "url": "https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7"
+            },
             {
                 "name": "https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-652x-m2gr-hppm",
                 "refsource": "CONFIRM",
@@ -88,11 +93,6 @@
                 "name": "https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.1.0",
                 "refsource": "MISC",
                 "url": "https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.1.0"
-            },
-            {
-                "name": "https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7",
-                "refsource": "MISC",
-                "url": "https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7"
             }
         ]
     },

From 617fbbf0d118748e1a7abbfd4f87c8f6a5b0a6ab Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 15:19:23 -0600
Subject: [PATCH 674/845] Add CVE-2021-21372 for GHSA-rg9f-w24h-962p

---
 2021/21xxx/CVE-2021-21372.json | 103 +++++++++++++++++++++++++++++++--
 1 file changed, 97 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21372.json b/2021/21xxx/CVE-2021-21372.json
index 55dc8381ba6..c219109b45b 100644
--- a/2021/21xxx/CVE-2021-21372.json
+++ b/2021/21xxx/CVE-2021-21372.json
@@ -1,18 +1,109 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21372",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Nimble arbitrary code execution for specially crafted package metadata"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "security",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.2.10"
+                                        },
+                                        {
+                                            "version_value": ">= 1.4.0, < 1.4.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "nim-lang"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.3,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20 Improper Input Validation"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p"
+            },
+            {
+                "name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
+                "refsource": "MISC",
+                "url": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/"
+            },
+            {
+                "name": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130",
+                "refsource": "MISC",
+                "url": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130"
+            },
+            {
+                "name": "https://github.com/nim-lang/nimble/commit/7bd63d504a4157b8ed61a51af47fb086ee818c37",
+                "refsource": "MISC",
+                "url": "https://github.com/nim-lang/nimble/commit/7bd63d504a4157b8ed61a51af47fb086ee818c37"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-rg9f-w24h-962p",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 16a25de89d46eae935d0f0cd5f14e33b58fccdb8 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 15:20:56 -0600
Subject: [PATCH 675/845] Add CVE-2021-21373 for GHSA-8w52-r35x-rgp8

---
 2021/21xxx/CVE-2021-21373.json | 90 +++++++++++++++++++++++++++++++---
 1 file changed, 84 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21373.json b/2021/21xxx/CVE-2021-21373.json
index 463197d284c..d9a76de8a53 100644
--- a/2021/21xxx/CVE-2021-21373.json
+++ b/2021/21xxx/CVE-2021-21373.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21373",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Nimble falls back to insecure http url when fetching packages"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "security",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.2.10"
+                                        },
+                                        {
+                                            "version_value": ">= 1.4.0, < 1.4.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "nim-lang"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, \"nimble refresh\" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.\n\n\n"
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "baseScore": 7.5,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-348 Use of Less Trusted Source"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8"
+            },
+            {
+                "name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
+                "refsource": "MISC",
+                "url": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/"
+            },
+            {
+                "name": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130",
+                "refsource": "MISC",
+                "url": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-8w52-r35x-rgp8",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 95e8def5b7f0085617af5fcebbee997105ac6f81 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 15:22:37 -0600
Subject: [PATCH 676/845] Add CVE-2021-21374 for GHSA-c2wm-v66h-xhxx

---
 2021/21xxx/CVE-2021-21374.json | 111 +++++++++++++++++++++++++++++++--
 1 file changed, 105 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21374.json b/2021/21xxx/CVE-2021-21374.json
index 1d9b09c29c5..d2c3b67961a 100644
--- a/2021/21xxx/CVE-2021-21374.json
+++ b/2021/21xxx/CVE-2021-21374.json
@@ -1,18 +1,117 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21374",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Nimble fails to validate certificates due to insecure httpClient defaults"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "security",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.2.10"
+                                        },
+                                        {
+                                            "version_value": ">= 1.4.0, < 1.4.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "nim-lang"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, \"nimble refresh\" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.\n\n"
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "baseScore": 8.1,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-348 Use of Less Trusted Source"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-599: Missing Validation of OpenSSL Certificate"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx"
+            },
+            {
+                "name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
+                "refsource": "MISC",
+                "url": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/"
+            },
+            {
+                "name": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130",
+                "refsource": "MISC",
+                "url": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130"
+            },
+            {
+                "name": "https://github.com/nim-lang/Nim/pull/16940",
+                "refsource": "MISC",
+                "url": "https://github.com/nim-lang/Nim/pull/16940"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-c2wm-v66h-xhxx",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 6eb20f978693ab058957a2574907244d7ebfc1af Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Fri, 26 Mar 2021 15:39:03 -0600
Subject: [PATCH 677/845] Add CVE-2021-21396 for GHSA-qx8q-rhq2-rg4j

---
 2021/21xxx/CVE-2021-21396.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21396.json b/2021/21xxx/CVE-2021-21396.json
index 06d458cc70e..94fdaeb2bd6 100644
--- a/2021/21xxx/CVE-2021-21396.json
+++ b/2021/21xxx/CVE-2021-21396.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21396",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Bulk list client endpoint exposes too much metadata about a client"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "wire-server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 2021-02-16, < 2021-03-02"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "wireapp"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "wire-server is an open-source back end for Wire, a secure collaboration platform. In wire-server from version 2021-02-16 and before version 2021-03-02, the client metadata of all users was exposed in the `GET /users/list-clients` endpoint. The endpoint could be used by any logged in user who could request client details of any other user (no connection required) as far as they can find their User ID. The exposed metadata included id, class, type, location, time, and cookie. A user on a Wire backend could use this endpoint to find registration time and location for each device for a given list of users. As a workaround, remove `/list-clients` from nginx config. This has been fixed in version 2021-03-02."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.5,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200 Information Exposure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/wireapp/wire-server/security/advisories/GHSA-qx8q-rhq2-rg4j",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/wireapp/wire-server/security/advisories/GHSA-qx8q-rhq2-rg4j"
+            },
+            {
+                "name": "https://github.com/wireapp/wire-server/releases/tag/v2021-03-02",
+                "refsource": "MISC",
+                "url": "https://github.com/wireapp/wire-server/releases/tag/v2021-03-02"
+            },
+            {
+                "name": "https://github.com/wireapp/wire-server/commit/7ba2bf4140282557cf215e0b2c354d4d08cd3421",
+                "refsource": "MISC",
+                "url": "https://github.com/wireapp/wire-server/commit/7ba2bf4140282557cf215e0b2c354d4d08cd3421"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-qx8q-rhq2-rg4j",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 7fc82ce4b29398e5740b1d816d19ad5b00f5495d Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 22:00:43 +0000
Subject: [PATCH 678/845] "-Synchronized-Data."

---
 2019/14xxx/CVE-2019-14846.json |  2 +-
 2021/20xxx/CVE-2021-20206.json | 55 ++++++++++++++++++++++++++--
 2021/21xxx/CVE-2021-21372.json | 10 ++---
 2021/21xxx/CVE-2021-21373.json | 12 +++---
 2021/21xxx/CVE-2021-21374.json | 12 +++---
 2021/29xxx/CVE-2021-29264.json | 62 +++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29265.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29266.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29267.json | 18 +++++++++
 2021/3xxx/CVE-2021-3449.json   |  5 +++
 2021/3xxx/CVE-2021-3450.json   |  5 +++
 11 files changed, 294 insertions(+), 21 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29264.json
 create mode 100644 2021/29xxx/CVE-2021-29265.json
 create mode 100644 2021/29xxx/CVE-2021-29266.json
 create mode 100644 2021/29xxx/CVE-2021-29267.json

diff --git a/2019/14xxx/CVE-2019-14846.json b/2019/14xxx/CVE-2019-14846.json
index e0892958e7f..e4504fea8a9 100644
--- a/2019/14xxx/CVE-2019-14846.json
+++ b/2019/14xxx/CVE-2019-14846.json
@@ -113,7 +113,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Ansible, all ansible_engine-2.x versions and ansible_engine-3.x up to ansible_engine-3.5, was logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process."
+                "value": "In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process."
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20206.json b/2021/20xxx/CVE-2021-20206.json
index ece8a803efc..17aaf3b2645 100644
--- a/2021/20xxx/CVE-2021-20206.json
+++ b/2021/20xxx/CVE-2021-20206.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20206",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "containernetworking-cni",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "containernetworking/cni 0.8.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20->CWE-22"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549",
+                "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21372.json b/2021/21xxx/CVE-2021-21372.json
index c219109b45b..86ed6f7811e 100644
--- a/2021/21xxx/CVE-2021-21372.json
+++ b/2021/21xxx/CVE-2021-21372.json
@@ -80,16 +80,16 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p"
-            },
             {
                 "name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
                 "refsource": "MISC",
                 "url": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/"
             },
+            {
+                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p"
+            },
             {
                 "name": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130",
                 "refsource": "MISC",
diff --git a/2021/21xxx/CVE-2021-21373.json b/2021/21xxx/CVE-2021-21373.json
index d9a76de8a53..d1715761084 100644
--- a/2021/21xxx/CVE-2021-21373.json
+++ b/2021/21xxx/CVE-2021-21373.json
@@ -38,7 +38,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, \"nimble refresh\" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.\n\n\n"
+                "value": "Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, \"nimble refresh\" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution."
             }
         ]
     },
@@ -72,11 +72,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8"
-            },
             {
                 "name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
                 "refsource": "MISC",
@@ -86,6 +81,11 @@
                 "name": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130",
                 "refsource": "MISC",
                 "url": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130"
+            },
+            {
+                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21374.json b/2021/21xxx/CVE-2021-21374.json
index d2c3b67961a..4b17068ad55 100644
--- a/2021/21xxx/CVE-2021-21374.json
+++ b/2021/21xxx/CVE-2021-21374.json
@@ -38,7 +38,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, \"nimble refresh\" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.\n\n"
+                "value": "Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, \"nimble refresh\" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution."
             }
         ]
     },
@@ -88,11 +88,6 @@
     },
     "references": {
         "reference_data": [
-            {
-                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx",
-                "refsource": "CONFIRM",
-                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx"
-            },
             {
                 "name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
                 "refsource": "MISC",
@@ -103,6 +98,11 @@
                 "refsource": "MISC",
                 "url": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130"
             },
+            {
+                "name": "https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx"
+            },
             {
                 "name": "https://github.com/nim-lang/Nim/pull/16940",
                 "refsource": "MISC",
diff --git a/2021/29xxx/CVE-2021-29264.json b/2021/29xxx/CVE-2021-29264.json
new file mode 100644
index 00000000000..2fe2a695e70
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29264.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29264",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29265.json b/2021/29xxx/CVE-2021-29265.json
new file mode 100644
index 00000000000..0b662c017a0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29265.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29265",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9380afd6df70e24eacbdbde33afc6a3950965d22",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9380afd6df70e24eacbdbde33afc6a3950965d22"
+            },
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29266.json b/2021/29xxx/CVE-2021-29266.json
new file mode 100644
index 00000000000..5c8d3ec380b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29266.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29266",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.9. drivers/vhost/vdpa.c has a use-after-free because v->config_ctx has an invalid value upon re-opening a character device, aka CID-f6bbf0010ba0."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f6bbf0010ba004f5e90c7aefdebc0ee4bd3283b9",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f6bbf0010ba004f5e90c7aefdebc0ee4bd3283b9"
+            },
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29267.json b/2021/29xxx/CVE-2021-29267.json
new file mode 100644
index 00000000000..e4cdc4a4821
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29267.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29267",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index bd97277d594..a3907927413 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -91,6 +91,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
                 "url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 318984737ea..90331c6b81b 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -86,6 +86,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
                 "url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
             }
         ]
     }

From 14d180c001962f31baead2337fc804a5b47df6a0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 26 Mar 2021 23:00:43 +0000
Subject: [PATCH 679/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29249.json | 61 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29268.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29269.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29270.json | 18 ++++++++++
 4 files changed, 109 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29268.json
 create mode 100644 2021/29xxx/CVE-2021-29269.json
 create mode 100644 2021/29xxx/CVE-2021-29270.json

diff --git a/2021/29xxx/CVE-2021-29249.json b/2021/29xxx/CVE-2021-29249.json
index 430b0355f5b..3f0673705d6 100644
--- a/2021/29xxx/CVE-2021-29249.json
+++ b/2021/29xxx/CVE-2021-29249.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29249",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29249",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "BTCPay Server before 1.0.6.0, when the payment button is used, has a privacy vulnerability."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/btcpayserver/btcpayserver/releases",
+                "refsource": "MISC",
+                "name": "https://github.com/btcpayserver/btcpayserver/releases"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://blog.btcpayserver.org/btcpay-server-1-0-6-0/",
+                "url": "https://blog.btcpayserver.org/btcpay-server-1-0-6-0/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29268.json b/2021/29xxx/CVE-2021-29268.json
new file mode 100644
index 00000000000..3a1b1e49391
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29268.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29268",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29269.json b/2021/29xxx/CVE-2021-29269.json
new file mode 100644
index 00000000000..85a24d68be6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29269.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29269",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29270.json b/2021/29xxx/CVE-2021-29270.json
new file mode 100644
index 00000000000..1237a151324
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29270.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29270",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 491c0476f9bd8879cc73239ef571456f6d9de073 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 02:00:39 +0000
Subject: [PATCH 680/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28831.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2021/28xxx/CVE-2021-28831.json b/2021/28xxx/CVE-2021-28831.json
index 14c7ce023e2..252a224ab7d 100644
--- a/2021/28xxx/CVE-2021-28831.json
+++ b/2021/28xxx/CVE-2021-28831.json
@@ -56,6 +56,11 @@
                 "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd",
                 "refsource": "MISC",
                 "name": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-e82915eee1",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/"
             }
         ]
     },

From 5d58edd594a7b4207b3112f7eb24aebcfd75e45c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 03:00:37 +0000
Subject: [PATCH 681/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28591.json | 10 ++++++++++
 2021/26xxx/CVE-2021-26701.json | 10 ++++++++++
 2 files changed, 20 insertions(+)

diff --git a/2020/28xxx/CVE-2020-28591.json b/2020/28xxx/CVE-2020-28591.json
index 2174c8201ef..c767809cf4d 100644
--- a/2020/28xxx/CVE-2020-28591.json
+++ b/2020/28xxx/CVE-2020-28591.json
@@ -53,6 +53,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-70a78ade08",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCSYYURJTUKJSEZIPDAXK4NHRXZMHIVA/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-473e880567",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJPM24DY36EH3HFJGAXDLGFT43VZWLJ7/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-1d72d8cea2",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBEK4H23AS6TKTGU2OTMHAZZYNECQVCB/"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26701.json b/2021/26xxx/CVE-2021-26701.json
index 9d8bd94920a..98641687429 100644
--- a/2021/26xxx/CVE-2021-26701.json
+++ b/2021/26xxx/CVE-2021-26701.json
@@ -89,6 +89,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-138728e59b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-3da33cdc80",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-265a3c7cb9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/"
             }
         ]
     }

From 5d70fd6b2c7183bab90adeb4c601f085801283b3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 06:00:37 +0000
Subject: [PATCH 682/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27216.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index a4edad8475e..332bc84cf7a 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -550,6 +550,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210326 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210327 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E"
             }
         ]
     }

From 362aaea08e9020e0edad1ea642241918f6ed53e2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 11:00:38 +0000
Subject: [PATCH 683/845] "-Synchronized-Data."

---
 2018/8xxx/CVE-2018-8088.json | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json
index ed6ea51fd83..df47dd82090 100644
--- a/2018/8xxx/CVE-2018-8088.json
+++ b/2018/8xxx/CVE-2018-8088.json
@@ -286,6 +286,16 @@
                 "refsource": "MLIST",
                 "name": "[iotdb-reviews] 20210325 [GitHub] [iotdb] wangchao316 opened a new pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
                 "url": "https://lists.apache.org/thread.html/r37644f0a00aca9fbcbc21c0f9a91f927b63153ec3607be469cd515e5@%3Creviews.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210327 [GitHub] [iotdb] wangchao316 closed pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/r2d05924f903403927a2f4e78d9b1249a42f0bd09f69a7c1954d74a42@%3Creviews.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210327 [GitHub] [iotdb] wangchao316 opened a new pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/r48247c12cf652e95a01fc94ee5aa8641f3ec481235774790e53eb55e@%3Creviews.iotdb.apache.org%3E"
             }
         ]
     }

From bb98bacc8e0aec5c78f0ef70cd0ef0346fad2bb1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 18:00:36 +0000
Subject: [PATCH 684/845] "-Synchronized-Data."

---
 2011/1xxx/CVE-2011-1473.json   | 10 +++++
 2021/29xxx/CVE-2021-29271.json | 62 +++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29272.json | 67 ++++++++++++++++++++++++++++++++++
 3 files changed, 139 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29271.json
 create mode 100644 2021/29xxx/CVE-2021-29272.json

diff --git a/2011/1xxx/CVE-2011-1473.json b/2011/1xxx/CVE-2011-1473.json
index effc4411297..63e5cde4d6d 100644
--- a/2011/1xxx/CVE-2011-1473.json
+++ b/2011/1xxx/CVE-2011-1473.json
@@ -161,6 +161,16 @@
                 "refsource": "MLIST",
                 "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] vongosling merged pull request #1820: [ISSUE #1233] Fix CVE-2011-1473",
                 "url": "https://lists.apache.org/thread.html/r8680f41bcdad13c3f267cb868b45e5fb1f57df8b39d25193f7d66500@%3Cdev.rocketmq.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] mouzz commented on pull request #1820: [ISSUE #1233] Fix CVE-2011-1473",
+                "url": "https://lists.apache.org/thread.html/ra95c355827b3c96c8013ed8e0666c851581651be2524f3d28cd4fe71@%3Cdev.rocketmq.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[rocketmq-dev] 20210327 [GitHub] [rocketmq] liufeiguo commented on pull request #1820: [ISSUE #1233] Fix CVE-2011-1473",
+                "url": "https://lists.apache.org/thread.html/r13a07a09f98b2841193dbf17a47c7f09b464e0747a1d3e7298ad4c81@%3Cdev.rocketmq.apache.org%3E"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29271.json b/2021/29xxx/CVE-2021-29271.json
new file mode 100644
index 00000000000..5d3e544cbd6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29271.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29271",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "remark42 before 1.6.1 allows XSS, as demonstrated by \"Locator: Locator{URL:\" followed by an XSS payload. This is related to backend/app/store/comment.go and backend/app/store/service/service.go."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1",
+                "refsource": "MISC",
+                "name": "https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29272.json b/2021/29xxx/CVE-2021-29272.json
new file mode 100644
index 00000000000..59c9f5bb568
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29272.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29272",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the \"script\" string."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5",
+                "refsource": "MISC",
+                "name": "https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5"
+            },
+            {
+                "url": "https://vuln.ryotak.me/advisories/4.txt",
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/4.txt"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 06fc96e62666dcc258f32125c94f5b7a7f870bb0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 19:00:36 +0000
Subject: [PATCH 685/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29273.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29273.json

diff --git a/2021/29xxx/CVE-2021-29273.json b/2021/29xxx/CVE-2021-29273.json
new file mode 100644
index 00000000000..b6e35673c7c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29273.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29273",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From c14952586d0fc8dc148e5225b7455b647358e1d4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sat, 27 Mar 2021 21:00:36 +0000
Subject: [PATCH 686/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3449.json | 5 +++++
 2021/3xxx/CVE-2021-3450.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index a3907927413..dd13959a36d 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -96,6 +96,11 @@
                 "refsource": "MISC",
                 "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
                 "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 90331c6b81b..0ef9c9d2d3f 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -91,6 +91,11 @@
                 "refsource": "MISC",
                 "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
                 "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1"
             }
         ]
     }

From 9211b59f08bb5944ce2d74aa9e831a84a43b0c97 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 28 Mar 2021 00:00:36 +0000
Subject: [PATCH 687/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3449.json | 5 +++++
 2021/3xxx/CVE-2021-3450.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index dd13959a36d..ba9ccc9cfbf 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -101,6 +101,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 0ef9c9d2d3f..f2b3757afca 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -96,6 +96,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2"
             }
         ]
     }

From 53470a0fa4d4662ec5b0e5fb62d05a69b9258639 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 28 Mar 2021 01:00:37 +0000
Subject: [PATCH 688/845] "-Synchronized-Data."

---
 2018/8xxx/CVE-2018-8088.json | 15 +++++++++++++++
 1 file changed, 15 insertions(+)

diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json
index df47dd82090..e4869abe051 100644
--- a/2018/8xxx/CVE-2018-8088.json
+++ b/2018/8xxx/CVE-2018-8088.json
@@ -296,6 +296,21 @@
                 "refsource": "MLIST",
                 "name": "[iotdb-reviews] 20210327 [GitHub] [iotdb] wangchao316 opened a new pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
                 "url": "https://lists.apache.org/thread.html/r48247c12cf652e95a01fc94ee5aa8641f3ec481235774790e53eb55e@%3Creviews.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210327 [jira] [Created] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/r0f376559fd39cf1a53ac3afbc1fc5d62649dcac9916d4697445a94fa@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210327 [jira] [Updated] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/r32be21da011479df41468a62bc09d12f0d3b4e3a71679d33cb0e8c56@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-dev] 20210327 [jira] [Created] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/rf58e1bee31d66665437dde9acd9abed53f8483034b69fa9ca7cde09c@%3Cdev.zookeeper.apache.org%3E"
             }
         ]
     }

From d36f4c71b8d83c8a7f054bf03feabd6b06cd17c2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 28 Mar 2021 02:00:38 +0000
Subject: [PATCH 689/845] "-Synchronized-Data."

---
 2020/11xxx/CVE-2020-11988.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/11xxx/CVE-2020-11988.json b/2020/11xxx/CVE-2020-11988.json
index 5aa050e3dd8..7d7cf0008ad 100644
--- a/2020/11xxx/CVE-2020-11988.json
+++ b/2020/11xxx/CVE-2020-11988.json
@@ -63,6 +63,11 @@
                 "refsource": "MLIST",
                 "name": "[poi-dev] 20210308 [Bug 65166] Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)",
                 "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-aa2936e810",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33/"
             }
         ]
     },

From 08f246e6744c802de9b383d1a99d36fe8a3e0ab4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 28 Mar 2021 12:00:43 +0000
Subject: [PATCH 690/845] "-Synchronized-Data."

---
 2020/1xxx/CVE-2020-1946.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/1xxx/CVE-2020-1946.json b/2020/1xxx/CVE-2020-1946.json
index ba15b0cc8ee..9fb4ca0130e 100644
--- a/2020/1xxx/CVE-2020-1946.json
+++ b/2020/1xxx/CVE-2020-1946.json
@@ -69,6 +69,11 @@
                 "refsource": "MISC",
                 "url": "https://s.apache.org/3r1wh",
                 "name": "https://s.apache.org/3r1wh"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4879",
+                "url": "https://www.debian.org/security/2021/dsa-4879"
             }
         ]
     },

From 667791b9599f9fcf1d55dcc7f896d6f2b60214c8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 28 Mar 2021 16:00:38 +0000
Subject: [PATCH 691/845] "-Synchronized-Data."

---
 2018/8xxx/CVE-2018-8088.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json
index e4869abe051..a16fb8d2026 100644
--- a/2018/8xxx/CVE-2018-8088.json
+++ b/2018/8xxx/CVE-2018-8088.json
@@ -311,6 +311,11 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-dev] 20210327 [jira] [Created] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
                 "url": "https://lists.apache.org/thread.html/rf58e1bee31d66665437dde9acd9abed53f8483034b69fa9ca7cde09c@%3Cdev.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210328 [jira] [Commented] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/rc378b97d52856f9f3c5ced14771fed8357e4187a3a0f9a2f0515931a@%3Cissues.zookeeper.apache.org%3E"
             }
         ]
     }

From e79a98592aff54352fce4354cede4b7c2ed8cfa8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Sun, 28 Mar 2021 21:00:38 +0000
Subject: [PATCH 692/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3449.json | 5 +++++
 2021/3xxx/CVE-2021-3450.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index ba9ccc9cfbf..4836c178b1c 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index f2b3757afca..71f71b34553 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -101,6 +101,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3"
             }
         ]
     }

From ae67cf3cc449f3a497d403601f5953d105ec8fdf Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 00:00:40 +0000
Subject: [PATCH 693/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3449.json | 5 +++++
 2021/3xxx/CVE-2021-3450.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index 4836c178b1c..359e042fed3 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -111,6 +111,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 71f71b34553..29d40d4833b 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4"
             }
         ]
     }

From 2a8cc579ac877f249e49910ed12e433e23c425e7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 02:00:38 +0000
Subject: [PATCH 694/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27918.json | 5 +++++
 2021/20xxx/CVE-2021-20205.json | 5 +++++
 2021/3xxx/CVE-2021-3467.json   | 5 +++++
 3 files changed, 15 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27918.json b/2020/27xxx/CVE-2020-27918.json
index 0be79e1584a..408570141c6 100644
--- a/2020/27xxx/CVE-2020-27918.json
+++ b/2020/27xxx/CVE-2020-27918.json
@@ -166,6 +166,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-8070916f7a",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20205.json b/2021/20xxx/CVE-2021-20205.json
index 802329596fa..54c124e4d24 100644
--- a/2021/20xxx/CVE-2021-20205.json
+++ b/2021/20xxx/CVE-2021-20205.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1937385",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937385"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-7de3c2fe57",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TM3AHZEYGYFEDL6AW5RLEAJNVRWEJDFL/"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3467.json b/2021/3xxx/CVE-2021-3467.json
index db95e7b0a68..b590c19df52 100644
--- a/2021/3xxx/CVE-2021-3467.json
+++ b/2021/3xxx/CVE-2021-3467.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1942097",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942097"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2213a29364",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWAIUFNIUCGS2IMGGDTWZIUIY7BNLGKF/"
             }
         ]
     },

From 90a5376f706effabcaca4348983ddfaa8a5385d8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 03:00:38 +0000
Subject: [PATCH 695/845] "-Synchronized-Data."

---
 2018/8xxx/CVE-2018-8088.json   | 10 ++++++++++
 2020/27xxx/CVE-2020-27170.json |  5 +++++
 2020/27xxx/CVE-2020-27171.json |  5 +++++
 2021/28xxx/CVE-2021-28951.json |  5 +++++
 2021/28xxx/CVE-2021-28952.json |  5 +++++
 2021/28xxx/CVE-2021-28964.json |  5 +++++
 2021/28xxx/CVE-2021-28971.json |  5 +++++
 2021/28xxx/CVE-2021-28972.json |  5 +++++
 8 files changed, 45 insertions(+)

diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json
index a16fb8d2026..24521287ab6 100644
--- a/2018/8xxx/CVE-2018-8088.json
+++ b/2018/8xxx/CVE-2018-8088.json
@@ -316,6 +316,16 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-issues] 20210328 [jira] [Commented] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
                 "url": "https://lists.apache.org/thread.html/rc378b97d52856f9f3c5ced14771fed8357e4187a3a0f9a2f0515931a@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-reviews] 20210328 [GitHub] [iotdb] HTHou merged pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
+                "url": "https://lists.apache.org/thread.html/rfb45527bad7220ada9e30957762e1da254ce405e67cc3ddf6f3558d9@%3Creviews.iotdb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
+                "url": "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json
index 771b48c1606..a034e9a6a2b 100644
--- a/2020/27xxx/CVE-2020-27170.json
+++ b/2020/27xxx/CVE-2020-27170.json
@@ -81,6 +81,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210324 Re: [CVE-2020-27170] Protection against speculatively out-of-bounds loads in the Linux kernel can be bypassed by unprivileged local users to leak content of kernel memory",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/24/4"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json
index fb9544ec9d3..ff0de7c9ff7 100644
--- a/2020/27xxx/CVE-2020-27171.json
+++ b/2020/27xxx/CVE-2020-27171.json
@@ -81,6 +81,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210324 Re: [CVE-2020-27171] Numeric error when restricting speculative pointer arithmetic allows unprivileged local users to leak content of kernel memory",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/24/5"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28951.json b/2021/28xxx/CVE-2021-28951.json
index 6ab52746c9f..d37cf7a835b 100644
--- a/2021/28xxx/CVE-2021-28951.json
+++ b/2021/28xxx/CVE-2021-28951.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-68b0dd2373",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28952.json b/2021/28xxx/CVE-2021-28952.json
index e451340b26c..80a95f60702 100644
--- a/2021/28xxx/CVE-2021-28952.json
+++ b/2021/28xxx/CVE-2021-28952.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-68b0dd2373",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28964.json b/2021/28xxx/CVE-2021-28964.json
index 6871aca13e3..3ec73ffe00f 100644
--- a/2021/28xxx/CVE-2021-28964.json
+++ b/2021/28xxx/CVE-2021-28964.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-68b0dd2373",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28971.json b/2021/28xxx/CVE-2021-28971.json
index 5956834090d..a2966d33349 100644
--- a/2021/28xxx/CVE-2021-28971.json
+++ b/2021/28xxx/CVE-2021-28971.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-68b0dd2373",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28972.json b/2021/28xxx/CVE-2021-28972.json
index 66f51bbfdc9..b8377bdb8a6 100644
--- a/2021/28xxx/CVE-2021-28972.json
+++ b/2021/28xxx/CVE-2021-28972.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-68b0dd2373",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-9503fffad9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
             }
         ]
     }

From a0c85e2c405836bb3f93607f3e6ea8df453f19b1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 04:00:38 +0000
Subject: [PATCH 696/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29274.json | 67 ++++++++++++++++++++++++++++++++++
 1 file changed, 67 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29274.json

diff --git a/2021/29xxx/CVE-2021-29274.json b/2021/29xxx/CVE-2021-29274.json
new file mode 100644
index 00000000000..8deb7b72e22
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29274.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29274",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "Redmine before 4.0.8 and 4.1.x before 4.1.2 allows XSS because an issue's subject is mishandled in the auto complete tip."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
+                "refsource": "MISC",
+                "name": "https://www.redmine.org/projects/redmine/wiki/Security_Advisories"
+            },
+            {
+                "url": "https://www.redmine.org/issues/33846",
+                "refsource": "MISC",
+                "name": "https://www.redmine.org/issues/33846"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 1edc91df4a61148834b2a170c43563fdd661e522 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 05:00:37 +0000
Subject: [PATCH 697/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29275.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29276.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29277.json | 18 ++++++++++++++++++
 3 files changed, 54 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29275.json
 create mode 100644 2021/29xxx/CVE-2021-29276.json
 create mode 100644 2021/29xxx/CVE-2021-29277.json

diff --git a/2021/29xxx/CVE-2021-29275.json b/2021/29xxx/CVE-2021-29275.json
new file mode 100644
index 00000000000..399f3fdece8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29275.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29275",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29276.json b/2021/29xxx/CVE-2021-29276.json
new file mode 100644
index 00000000000..b756dc30164
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29276.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29276",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29277.json b/2021/29xxx/CVE-2021-29277.json
new file mode 100644
index 00000000000..55e76daa210
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29277.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29277",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From ca18f8d54f0602aafc9eb11fffc802a19c6448ea Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 06:00:39 +0000
Subject: [PATCH 698/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29274.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/29xxx/CVE-2021-29274.json b/2021/29xxx/CVE-2021-29274.json
index 8deb7b72e22..d911ceee61c 100644
--- a/2021/29xxx/CVE-2021-29274.json
+++ b/2021/29xxx/CVE-2021-29274.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Redmine before 4.0.8 and 4.1.x before 4.1.2 allows XSS because an issue's subject is mishandled in the auto complete tip."
+                "value": "Redmine 4.1.x before 4.1.2 allows XSS because an issue's subject is mishandled in the auto complete tip."
             }
         ]
     },

From e5bbdc980a17043ff193a8ab3ef0272ba023963f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 07:00:38 +0000
Subject: [PATCH 699/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29278.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29279.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29280.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29281.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29282.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29283.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29284.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29285.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29286.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29287.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29288.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29289.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29290.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29291.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29292.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29293.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29294.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29295.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29296.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29297.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29298.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29299.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29300.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29301.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29302.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29303.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29304.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29305.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29306.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29307.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29308.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29309.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29310.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29311.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29312.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29313.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29314.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29315.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29316.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29317.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29318.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29319.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29320.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29321.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29322.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29323.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29324.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29325.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29326.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29327.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29328.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29329.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29330.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29331.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29332.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29333.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29334.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29335.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29336.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29337.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29338.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29339.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29340.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29341.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29342.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29343.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29344.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29345.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29346.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29347.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29348.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29349.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29350.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29351.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29352.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29353.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29354.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29355.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29356.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29357.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29358.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29359.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29360.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29361.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29362.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29363.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29364.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29365.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29366.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29367.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29368.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29369.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29370.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29371.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29372.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29373.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29374.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29375.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29376.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29377.json | 18 ++++++++++++++++++
 100 files changed, 1800 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29278.json
 create mode 100644 2021/29xxx/CVE-2021-29279.json
 create mode 100644 2021/29xxx/CVE-2021-29280.json
 create mode 100644 2021/29xxx/CVE-2021-29281.json
 create mode 100644 2021/29xxx/CVE-2021-29282.json
 create mode 100644 2021/29xxx/CVE-2021-29283.json
 create mode 100644 2021/29xxx/CVE-2021-29284.json
 create mode 100644 2021/29xxx/CVE-2021-29285.json
 create mode 100644 2021/29xxx/CVE-2021-29286.json
 create mode 100644 2021/29xxx/CVE-2021-29287.json
 create mode 100644 2021/29xxx/CVE-2021-29288.json
 create mode 100644 2021/29xxx/CVE-2021-29289.json
 create mode 100644 2021/29xxx/CVE-2021-29290.json
 create mode 100644 2021/29xxx/CVE-2021-29291.json
 create mode 100644 2021/29xxx/CVE-2021-29292.json
 create mode 100644 2021/29xxx/CVE-2021-29293.json
 create mode 100644 2021/29xxx/CVE-2021-29294.json
 create mode 100644 2021/29xxx/CVE-2021-29295.json
 create mode 100644 2021/29xxx/CVE-2021-29296.json
 create mode 100644 2021/29xxx/CVE-2021-29297.json
 create mode 100644 2021/29xxx/CVE-2021-29298.json
 create mode 100644 2021/29xxx/CVE-2021-29299.json
 create mode 100644 2021/29xxx/CVE-2021-29300.json
 create mode 100644 2021/29xxx/CVE-2021-29301.json
 create mode 100644 2021/29xxx/CVE-2021-29302.json
 create mode 100644 2021/29xxx/CVE-2021-29303.json
 create mode 100644 2021/29xxx/CVE-2021-29304.json
 create mode 100644 2021/29xxx/CVE-2021-29305.json
 create mode 100644 2021/29xxx/CVE-2021-29306.json
 create mode 100644 2021/29xxx/CVE-2021-29307.json
 create mode 100644 2021/29xxx/CVE-2021-29308.json
 create mode 100644 2021/29xxx/CVE-2021-29309.json
 create mode 100644 2021/29xxx/CVE-2021-29310.json
 create mode 100644 2021/29xxx/CVE-2021-29311.json
 create mode 100644 2021/29xxx/CVE-2021-29312.json
 create mode 100644 2021/29xxx/CVE-2021-29313.json
 create mode 100644 2021/29xxx/CVE-2021-29314.json
 create mode 100644 2021/29xxx/CVE-2021-29315.json
 create mode 100644 2021/29xxx/CVE-2021-29316.json
 create mode 100644 2021/29xxx/CVE-2021-29317.json
 create mode 100644 2021/29xxx/CVE-2021-29318.json
 create mode 100644 2021/29xxx/CVE-2021-29319.json
 create mode 100644 2021/29xxx/CVE-2021-29320.json
 create mode 100644 2021/29xxx/CVE-2021-29321.json
 create mode 100644 2021/29xxx/CVE-2021-29322.json
 create mode 100644 2021/29xxx/CVE-2021-29323.json
 create mode 100644 2021/29xxx/CVE-2021-29324.json
 create mode 100644 2021/29xxx/CVE-2021-29325.json
 create mode 100644 2021/29xxx/CVE-2021-29326.json
 create mode 100644 2021/29xxx/CVE-2021-29327.json
 create mode 100644 2021/29xxx/CVE-2021-29328.json
 create mode 100644 2021/29xxx/CVE-2021-29329.json
 create mode 100644 2021/29xxx/CVE-2021-29330.json
 create mode 100644 2021/29xxx/CVE-2021-29331.json
 create mode 100644 2021/29xxx/CVE-2021-29332.json
 create mode 100644 2021/29xxx/CVE-2021-29333.json
 create mode 100644 2021/29xxx/CVE-2021-29334.json
 create mode 100644 2021/29xxx/CVE-2021-29335.json
 create mode 100644 2021/29xxx/CVE-2021-29336.json
 create mode 100644 2021/29xxx/CVE-2021-29337.json
 create mode 100644 2021/29xxx/CVE-2021-29338.json
 create mode 100644 2021/29xxx/CVE-2021-29339.json
 create mode 100644 2021/29xxx/CVE-2021-29340.json
 create mode 100644 2021/29xxx/CVE-2021-29341.json
 create mode 100644 2021/29xxx/CVE-2021-29342.json
 create mode 100644 2021/29xxx/CVE-2021-29343.json
 create mode 100644 2021/29xxx/CVE-2021-29344.json
 create mode 100644 2021/29xxx/CVE-2021-29345.json
 create mode 100644 2021/29xxx/CVE-2021-29346.json
 create mode 100644 2021/29xxx/CVE-2021-29347.json
 create mode 100644 2021/29xxx/CVE-2021-29348.json
 create mode 100644 2021/29xxx/CVE-2021-29349.json
 create mode 100644 2021/29xxx/CVE-2021-29350.json
 create mode 100644 2021/29xxx/CVE-2021-29351.json
 create mode 100644 2021/29xxx/CVE-2021-29352.json
 create mode 100644 2021/29xxx/CVE-2021-29353.json
 create mode 100644 2021/29xxx/CVE-2021-29354.json
 create mode 100644 2021/29xxx/CVE-2021-29355.json
 create mode 100644 2021/29xxx/CVE-2021-29356.json
 create mode 100644 2021/29xxx/CVE-2021-29357.json
 create mode 100644 2021/29xxx/CVE-2021-29358.json
 create mode 100644 2021/29xxx/CVE-2021-29359.json
 create mode 100644 2021/29xxx/CVE-2021-29360.json
 create mode 100644 2021/29xxx/CVE-2021-29361.json
 create mode 100644 2021/29xxx/CVE-2021-29362.json
 create mode 100644 2021/29xxx/CVE-2021-29363.json
 create mode 100644 2021/29xxx/CVE-2021-29364.json
 create mode 100644 2021/29xxx/CVE-2021-29365.json
 create mode 100644 2021/29xxx/CVE-2021-29366.json
 create mode 100644 2021/29xxx/CVE-2021-29367.json
 create mode 100644 2021/29xxx/CVE-2021-29368.json
 create mode 100644 2021/29xxx/CVE-2021-29369.json
 create mode 100644 2021/29xxx/CVE-2021-29370.json
 create mode 100644 2021/29xxx/CVE-2021-29371.json
 create mode 100644 2021/29xxx/CVE-2021-29372.json
 create mode 100644 2021/29xxx/CVE-2021-29373.json
 create mode 100644 2021/29xxx/CVE-2021-29374.json
 create mode 100644 2021/29xxx/CVE-2021-29375.json
 create mode 100644 2021/29xxx/CVE-2021-29376.json
 create mode 100644 2021/29xxx/CVE-2021-29377.json

diff --git a/2021/29xxx/CVE-2021-29278.json b/2021/29xxx/CVE-2021-29278.json
new file mode 100644
index 00000000000..2a0f8f92fe2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29278.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29278",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29279.json b/2021/29xxx/CVE-2021-29279.json
new file mode 100644
index 00000000000..8e34fbbf301
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29279.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29279",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29280.json b/2021/29xxx/CVE-2021-29280.json
new file mode 100644
index 00000000000..8829f84e0c5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29280.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29280",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29281.json b/2021/29xxx/CVE-2021-29281.json
new file mode 100644
index 00000000000..fc9d66c938b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29281.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29281",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29282.json b/2021/29xxx/CVE-2021-29282.json
new file mode 100644
index 00000000000..fb86131232d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29282.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29282",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29283.json b/2021/29xxx/CVE-2021-29283.json
new file mode 100644
index 00000000000..c9291acc7d9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29283.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29283",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29284.json b/2021/29xxx/CVE-2021-29284.json
new file mode 100644
index 00000000000..1fa7dcebc9e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29284.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29284",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29285.json b/2021/29xxx/CVE-2021-29285.json
new file mode 100644
index 00000000000..0f4e86616a9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29285.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29285",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29286.json b/2021/29xxx/CVE-2021-29286.json
new file mode 100644
index 00000000000..d140a680403
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29286.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29286",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29287.json b/2021/29xxx/CVE-2021-29287.json
new file mode 100644
index 00000000000..98e0727acc2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29287.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29287",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29288.json b/2021/29xxx/CVE-2021-29288.json
new file mode 100644
index 00000000000..1d8ea9a0a89
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29288.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29288",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29289.json b/2021/29xxx/CVE-2021-29289.json
new file mode 100644
index 00000000000..1590a4860e4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29289.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29289",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29290.json b/2021/29xxx/CVE-2021-29290.json
new file mode 100644
index 00000000000..76dc52ead65
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29290.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29290",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29291.json b/2021/29xxx/CVE-2021-29291.json
new file mode 100644
index 00000000000..d36ac21e318
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29291.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29291",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29292.json b/2021/29xxx/CVE-2021-29292.json
new file mode 100644
index 00000000000..9ce6119d237
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29292.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29292",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29293.json b/2021/29xxx/CVE-2021-29293.json
new file mode 100644
index 00000000000..20b2c037a59
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29293.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29293",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29294.json b/2021/29xxx/CVE-2021-29294.json
new file mode 100644
index 00000000000..a09b23b2e21
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29294.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29294",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29295.json b/2021/29xxx/CVE-2021-29295.json
new file mode 100644
index 00000000000..d600d8ba23c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29295.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29295",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29296.json b/2021/29xxx/CVE-2021-29296.json
new file mode 100644
index 00000000000..ddf8f18deb4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29296.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29296",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29297.json b/2021/29xxx/CVE-2021-29297.json
new file mode 100644
index 00000000000..3aef5e7fda5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29297.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29297",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29298.json b/2021/29xxx/CVE-2021-29298.json
new file mode 100644
index 00000000000..6c04fc4dfff
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29298.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29298",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29299.json b/2021/29xxx/CVE-2021-29299.json
new file mode 100644
index 00000000000..76afc08ac21
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29299.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29299",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29300.json b/2021/29xxx/CVE-2021-29300.json
new file mode 100644
index 00000000000..30fa6ea4ea2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29300.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29300",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29301.json b/2021/29xxx/CVE-2021-29301.json
new file mode 100644
index 00000000000..8314acc9338
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29301.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29301",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29302.json b/2021/29xxx/CVE-2021-29302.json
new file mode 100644
index 00000000000..557a1edfd48
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29302.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29302",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29303.json b/2021/29xxx/CVE-2021-29303.json
new file mode 100644
index 00000000000..937f6f2c5d7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29303.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29303",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29304.json b/2021/29xxx/CVE-2021-29304.json
new file mode 100644
index 00000000000..0a568a07859
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29304.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29304",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29305.json b/2021/29xxx/CVE-2021-29305.json
new file mode 100644
index 00000000000..15be407f21d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29305.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29305",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29306.json b/2021/29xxx/CVE-2021-29306.json
new file mode 100644
index 00000000000..baa68ddce87
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29306.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29306",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29307.json b/2021/29xxx/CVE-2021-29307.json
new file mode 100644
index 00000000000..cabac407b7f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29307.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29307",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29308.json b/2021/29xxx/CVE-2021-29308.json
new file mode 100644
index 00000000000..94e52f4c075
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29308.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29308",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29309.json b/2021/29xxx/CVE-2021-29309.json
new file mode 100644
index 00000000000..047181d1216
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29309.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29309",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29310.json b/2021/29xxx/CVE-2021-29310.json
new file mode 100644
index 00000000000..a222b4bae74
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29310.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29310",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29311.json b/2021/29xxx/CVE-2021-29311.json
new file mode 100644
index 00000000000..a68edbf83bb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29311.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29311",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29312.json b/2021/29xxx/CVE-2021-29312.json
new file mode 100644
index 00000000000..bfa0a639e51
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29312.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29312",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29313.json b/2021/29xxx/CVE-2021-29313.json
new file mode 100644
index 00000000000..1ab9fa2f831
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29313.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29313",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29314.json b/2021/29xxx/CVE-2021-29314.json
new file mode 100644
index 00000000000..4d715ba9155
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29314.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29314",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29315.json b/2021/29xxx/CVE-2021-29315.json
new file mode 100644
index 00000000000..be456045fa5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29315.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29315",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29316.json b/2021/29xxx/CVE-2021-29316.json
new file mode 100644
index 00000000000..904cacbea41
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29316.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29316",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29317.json b/2021/29xxx/CVE-2021-29317.json
new file mode 100644
index 00000000000..4a30d93a3cd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29317.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29317",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29318.json b/2021/29xxx/CVE-2021-29318.json
new file mode 100644
index 00000000000..692f04d61fa
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29318.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29318",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29319.json b/2021/29xxx/CVE-2021-29319.json
new file mode 100644
index 00000000000..6260d7840ec
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29319.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29319",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29320.json b/2021/29xxx/CVE-2021-29320.json
new file mode 100644
index 00000000000..89763914a80
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29320.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29320",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29321.json b/2021/29xxx/CVE-2021-29321.json
new file mode 100644
index 00000000000..0ba75a6809a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29321.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29321",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29322.json b/2021/29xxx/CVE-2021-29322.json
new file mode 100644
index 00000000000..de392df2999
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29322.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29322",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29323.json b/2021/29xxx/CVE-2021-29323.json
new file mode 100644
index 00000000000..7719968a477
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29323.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29323",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29324.json b/2021/29xxx/CVE-2021-29324.json
new file mode 100644
index 00000000000..2c275f7f3a2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29324.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29324",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29325.json b/2021/29xxx/CVE-2021-29325.json
new file mode 100644
index 00000000000..4517f7ee672
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29325.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29325",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29326.json b/2021/29xxx/CVE-2021-29326.json
new file mode 100644
index 00000000000..8e5a2d89a80
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29326.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29326",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29327.json b/2021/29xxx/CVE-2021-29327.json
new file mode 100644
index 00000000000..f30302a59ca
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29327.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29327",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29328.json b/2021/29xxx/CVE-2021-29328.json
new file mode 100644
index 00000000000..e6adce6420e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29328.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29328",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29329.json b/2021/29xxx/CVE-2021-29329.json
new file mode 100644
index 00000000000..5fe85933943
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29329.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29329",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29330.json b/2021/29xxx/CVE-2021-29330.json
new file mode 100644
index 00000000000..11a37cb8ff3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29330.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29330",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29331.json b/2021/29xxx/CVE-2021-29331.json
new file mode 100644
index 00000000000..2379339bd93
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29331.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29331",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29332.json b/2021/29xxx/CVE-2021-29332.json
new file mode 100644
index 00000000000..7102d39e48f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29332.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29332",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29333.json b/2021/29xxx/CVE-2021-29333.json
new file mode 100644
index 00000000000..752e43a416b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29333.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29333",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29334.json b/2021/29xxx/CVE-2021-29334.json
new file mode 100644
index 00000000000..91f93d889ed
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29334.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29334",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29335.json b/2021/29xxx/CVE-2021-29335.json
new file mode 100644
index 00000000000..2566f7ff215
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29335.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29335",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29336.json b/2021/29xxx/CVE-2021-29336.json
new file mode 100644
index 00000000000..7c4b9337839
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29336.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29336",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29337.json b/2021/29xxx/CVE-2021-29337.json
new file mode 100644
index 00000000000..5bc95a7c381
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29337.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29337",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29338.json b/2021/29xxx/CVE-2021-29338.json
new file mode 100644
index 00000000000..a62d81f6762
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29338.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29338",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29339.json b/2021/29xxx/CVE-2021-29339.json
new file mode 100644
index 00000000000..b1241cca04e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29339.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29339",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29340.json b/2021/29xxx/CVE-2021-29340.json
new file mode 100644
index 00000000000..39ecc4cbc9f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29340.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29340",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29341.json b/2021/29xxx/CVE-2021-29341.json
new file mode 100644
index 00000000000..e51ea41feb1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29341.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29341",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29342.json b/2021/29xxx/CVE-2021-29342.json
new file mode 100644
index 00000000000..21a720c94fc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29342.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29342",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29343.json b/2021/29xxx/CVE-2021-29343.json
new file mode 100644
index 00000000000..97b11558231
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29343.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29343",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29344.json b/2021/29xxx/CVE-2021-29344.json
new file mode 100644
index 00000000000..0cc4bc45f2a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29344.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29344",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29345.json b/2021/29xxx/CVE-2021-29345.json
new file mode 100644
index 00000000000..04e68a710e1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29345.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29345",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29346.json b/2021/29xxx/CVE-2021-29346.json
new file mode 100644
index 00000000000..362937829b0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29346.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29346",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29347.json b/2021/29xxx/CVE-2021-29347.json
new file mode 100644
index 00000000000..f981cfb87ef
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29347.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29347",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29348.json b/2021/29xxx/CVE-2021-29348.json
new file mode 100644
index 00000000000..b981c6bf0e1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29348.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29348",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29349.json b/2021/29xxx/CVE-2021-29349.json
new file mode 100644
index 00000000000..a37ecf55442
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29349.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29349",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29350.json b/2021/29xxx/CVE-2021-29350.json
new file mode 100644
index 00000000000..57bca53f8e0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29350.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29350",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29351.json b/2021/29xxx/CVE-2021-29351.json
new file mode 100644
index 00000000000..e76770f7601
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29351.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29351",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29352.json b/2021/29xxx/CVE-2021-29352.json
new file mode 100644
index 00000000000..4b169bad5b5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29352.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29352",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29353.json b/2021/29xxx/CVE-2021-29353.json
new file mode 100644
index 00000000000..0159b1d073e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29353.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29353",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29354.json b/2021/29xxx/CVE-2021-29354.json
new file mode 100644
index 00000000000..af7b779e47f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29354.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29354",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29355.json b/2021/29xxx/CVE-2021-29355.json
new file mode 100644
index 00000000000..98ae4f79f91
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29355.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29355",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29356.json b/2021/29xxx/CVE-2021-29356.json
new file mode 100644
index 00000000000..8193234c751
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29356.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29356",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29357.json b/2021/29xxx/CVE-2021-29357.json
new file mode 100644
index 00000000000..b0986b9540a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29357.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29357",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29358.json b/2021/29xxx/CVE-2021-29358.json
new file mode 100644
index 00000000000..9fae9407966
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29358.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29358",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29359.json b/2021/29xxx/CVE-2021-29359.json
new file mode 100644
index 00000000000..ee6f61f9c62
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29359.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29359",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29360.json b/2021/29xxx/CVE-2021-29360.json
new file mode 100644
index 00000000000..c81f6208ca2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29360.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29360",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29361.json b/2021/29xxx/CVE-2021-29361.json
new file mode 100644
index 00000000000..6a9a59a4bfc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29361.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29361",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29362.json b/2021/29xxx/CVE-2021-29362.json
new file mode 100644
index 00000000000..962cbe38383
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29362.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29362",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29363.json b/2021/29xxx/CVE-2021-29363.json
new file mode 100644
index 00000000000..df16603e64b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29363.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29363",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29364.json b/2021/29xxx/CVE-2021-29364.json
new file mode 100644
index 00000000000..efbcc8aff63
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29364.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29364",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29365.json b/2021/29xxx/CVE-2021-29365.json
new file mode 100644
index 00000000000..da03a6683e8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29365.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29365",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29366.json b/2021/29xxx/CVE-2021-29366.json
new file mode 100644
index 00000000000..75c6039267c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29366.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29366",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29367.json b/2021/29xxx/CVE-2021-29367.json
new file mode 100644
index 00000000000..318f91b8247
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29367.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29367",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29368.json b/2021/29xxx/CVE-2021-29368.json
new file mode 100644
index 00000000000..0be13b03603
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29368.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29368",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29369.json b/2021/29xxx/CVE-2021-29369.json
new file mode 100644
index 00000000000..34cf4e70837
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29369.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29369",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29370.json b/2021/29xxx/CVE-2021-29370.json
new file mode 100644
index 00000000000..a0c0fa5cccf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29370.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29370",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29371.json b/2021/29xxx/CVE-2021-29371.json
new file mode 100644
index 00000000000..0f4b60ea26e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29371.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29371",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29372.json b/2021/29xxx/CVE-2021-29372.json
new file mode 100644
index 00000000000..dbaeeb7b4a3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29372.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29372",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29373.json b/2021/29xxx/CVE-2021-29373.json
new file mode 100644
index 00000000000..ad5ca7e27a0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29373.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29373",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29374.json b/2021/29xxx/CVE-2021-29374.json
new file mode 100644
index 00000000000..239190e7911
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29374.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29374",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29375.json b/2021/29xxx/CVE-2021-29375.json
new file mode 100644
index 00000000000..9ef33c02dbd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29375.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29375",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29376.json b/2021/29xxx/CVE-2021-29376.json
new file mode 100644
index 00000000000..417f079b225
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29376.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29376",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29377.json b/2021/29xxx/CVE-2021-29377.json
new file mode 100644
index 00000000000..6e41584c7f2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29377.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29377",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From ea329eebe84eed5a5759e90f87651ed78db42f7d Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 07:00:52 +0000
Subject: [PATCH 700/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29378.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29379.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29380.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29381.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29382.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29383.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29384.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29385.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29386.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29387.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29388.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29389.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29390.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29391.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29392.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29393.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29394.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29395.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29396.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29397.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29398.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29399.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29400.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29401.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29402.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29403.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29404.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29405.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29406.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29407.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29408.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29409.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29410.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29411.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29412.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29413.json | 18 ++++++++++++++++++
 36 files changed, 648 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29378.json
 create mode 100644 2021/29xxx/CVE-2021-29379.json
 create mode 100644 2021/29xxx/CVE-2021-29380.json
 create mode 100644 2021/29xxx/CVE-2021-29381.json
 create mode 100644 2021/29xxx/CVE-2021-29382.json
 create mode 100644 2021/29xxx/CVE-2021-29383.json
 create mode 100644 2021/29xxx/CVE-2021-29384.json
 create mode 100644 2021/29xxx/CVE-2021-29385.json
 create mode 100644 2021/29xxx/CVE-2021-29386.json
 create mode 100644 2021/29xxx/CVE-2021-29387.json
 create mode 100644 2021/29xxx/CVE-2021-29388.json
 create mode 100644 2021/29xxx/CVE-2021-29389.json
 create mode 100644 2021/29xxx/CVE-2021-29390.json
 create mode 100644 2021/29xxx/CVE-2021-29391.json
 create mode 100644 2021/29xxx/CVE-2021-29392.json
 create mode 100644 2021/29xxx/CVE-2021-29393.json
 create mode 100644 2021/29xxx/CVE-2021-29394.json
 create mode 100644 2021/29xxx/CVE-2021-29395.json
 create mode 100644 2021/29xxx/CVE-2021-29396.json
 create mode 100644 2021/29xxx/CVE-2021-29397.json
 create mode 100644 2021/29xxx/CVE-2021-29398.json
 create mode 100644 2021/29xxx/CVE-2021-29399.json
 create mode 100644 2021/29xxx/CVE-2021-29400.json
 create mode 100644 2021/29xxx/CVE-2021-29401.json
 create mode 100644 2021/29xxx/CVE-2021-29402.json
 create mode 100644 2021/29xxx/CVE-2021-29403.json
 create mode 100644 2021/29xxx/CVE-2021-29404.json
 create mode 100644 2021/29xxx/CVE-2021-29405.json
 create mode 100644 2021/29xxx/CVE-2021-29406.json
 create mode 100644 2021/29xxx/CVE-2021-29407.json
 create mode 100644 2021/29xxx/CVE-2021-29408.json
 create mode 100644 2021/29xxx/CVE-2021-29409.json
 create mode 100644 2021/29xxx/CVE-2021-29410.json
 create mode 100644 2021/29xxx/CVE-2021-29411.json
 create mode 100644 2021/29xxx/CVE-2021-29412.json
 create mode 100644 2021/29xxx/CVE-2021-29413.json

diff --git a/2021/29xxx/CVE-2021-29378.json b/2021/29xxx/CVE-2021-29378.json
new file mode 100644
index 00000000000..bf3d432b860
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29378.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29378",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29379.json b/2021/29xxx/CVE-2021-29379.json
new file mode 100644
index 00000000000..19664dc737c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29379.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29379",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29380.json b/2021/29xxx/CVE-2021-29380.json
new file mode 100644
index 00000000000..cdf5dbd1ff4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29380.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29380",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29381.json b/2021/29xxx/CVE-2021-29381.json
new file mode 100644
index 00000000000..5995795b2ac
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29381.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29381",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29382.json b/2021/29xxx/CVE-2021-29382.json
new file mode 100644
index 00000000000..be50ff19af3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29382.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29382",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29383.json b/2021/29xxx/CVE-2021-29383.json
new file mode 100644
index 00000000000..77cb1e2d8ae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29383.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29383",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29384.json b/2021/29xxx/CVE-2021-29384.json
new file mode 100644
index 00000000000..64fc53108da
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29384.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29384",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29385.json b/2021/29xxx/CVE-2021-29385.json
new file mode 100644
index 00000000000..152fcf05578
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29385.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29385",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29386.json b/2021/29xxx/CVE-2021-29386.json
new file mode 100644
index 00000000000..bfa757f9bf1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29386.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29386",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29387.json b/2021/29xxx/CVE-2021-29387.json
new file mode 100644
index 00000000000..486a8e0cee9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29387.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29387",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29388.json b/2021/29xxx/CVE-2021-29388.json
new file mode 100644
index 00000000000..ca4b3a9e5b3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29388.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29388",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29389.json b/2021/29xxx/CVE-2021-29389.json
new file mode 100644
index 00000000000..c11875073ce
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29389.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29389",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29390.json b/2021/29xxx/CVE-2021-29390.json
new file mode 100644
index 00000000000..d66c82344d5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29390.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29390",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29391.json b/2021/29xxx/CVE-2021-29391.json
new file mode 100644
index 00000000000..aad202c7981
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29391.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29391",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29392.json b/2021/29xxx/CVE-2021-29392.json
new file mode 100644
index 00000000000..634961ce2d3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29392.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29392",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29393.json b/2021/29xxx/CVE-2021-29393.json
new file mode 100644
index 00000000000..1bd423a8c4e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29393.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29393",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29394.json b/2021/29xxx/CVE-2021-29394.json
new file mode 100644
index 00000000000..eade3149c18
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29394.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29394",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29395.json b/2021/29xxx/CVE-2021-29395.json
new file mode 100644
index 00000000000..9117d65367c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29395.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29395",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29396.json b/2021/29xxx/CVE-2021-29396.json
new file mode 100644
index 00000000000..e5be75dde50
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29396.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29396",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29397.json b/2021/29xxx/CVE-2021-29397.json
new file mode 100644
index 00000000000..9bd6d240147
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29397.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29397",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29398.json b/2021/29xxx/CVE-2021-29398.json
new file mode 100644
index 00000000000..bb192cc6eb3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29398.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29398",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29399.json b/2021/29xxx/CVE-2021-29399.json
new file mode 100644
index 00000000000..2998cc71b74
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29399.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29399",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29400.json b/2021/29xxx/CVE-2021-29400.json
new file mode 100644
index 00000000000..ddd0ed8927d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29400.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29400",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29401.json b/2021/29xxx/CVE-2021-29401.json
new file mode 100644
index 00000000000..9efcf66b47d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29401.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29401",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29402.json b/2021/29xxx/CVE-2021-29402.json
new file mode 100644
index 00000000000..0e6cb53261f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29402.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29402",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29403.json b/2021/29xxx/CVE-2021-29403.json
new file mode 100644
index 00000000000..c5f13e0e583
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29403.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29403",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29404.json b/2021/29xxx/CVE-2021-29404.json
new file mode 100644
index 00000000000..692973dd3a8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29404.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29404",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29405.json b/2021/29xxx/CVE-2021-29405.json
new file mode 100644
index 00000000000..ea817e000b3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29405.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29405",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29406.json b/2021/29xxx/CVE-2021-29406.json
new file mode 100644
index 00000000000..6b81080c2bb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29406.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29406",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29407.json b/2021/29xxx/CVE-2021-29407.json
new file mode 100644
index 00000000000..719fe16018e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29407.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29407",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29408.json b/2021/29xxx/CVE-2021-29408.json
new file mode 100644
index 00000000000..887be39aac8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29408.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29408",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29409.json b/2021/29xxx/CVE-2021-29409.json
new file mode 100644
index 00000000000..01aa9e5dd10
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29409.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29409",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29410.json b/2021/29xxx/CVE-2021-29410.json
new file mode 100644
index 00000000000..9345f4de169
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29410.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29410",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29411.json b/2021/29xxx/CVE-2021-29411.json
new file mode 100644
index 00000000000..41f994d1d30
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29411.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29411",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29412.json b/2021/29xxx/CVE-2021-29412.json
new file mode 100644
index 00000000000..bce6ab4b80c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29412.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29412",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29413.json b/2021/29xxx/CVE-2021-29413.json
new file mode 100644
index 00000000000..26624665250
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29413.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29413",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 4f9c0ef977fcdddf80f12a36433f2788012a0525 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 09:00:37 +0000
Subject: [PATCH 701/845] "-Synchronized-Data."

---
 2016/2xxx/CVE-2016-2170.json   | 5 +++++
 2021/26xxx/CVE-2021-26295.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2016/2xxx/CVE-2016-2170.json b/2016/2xxx/CVE-2016-2170.json
index 5611c107190..2994dc95a1a 100644
--- a/2016/2xxx/CVE-2016-2170.json
+++ b/2016/2xxx/CVE-2016-2170.json
@@ -101,6 +101,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-dev] 20210325 Re: Comment out the SOAP and HTTP engines?",
                 "url": "https://lists.apache.org/thread.html/reccf8c8a58337ce7c035495d3d82fbc549e97036a9789a2a7d9cccf6@%3Cdev.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-dev] 20210329 Re: Comment out the SOAP and HTTP engines?",
+                "url": "https://lists.apache.org/thread.html/rec5e9fdcdca13099cfb29f632333f44ad1dd60d90f67b90434e4467a@%3Cdev.ofbiz.apache.org%3E"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index ca7be26fad7..f5595a7af8d 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -84,6 +84,11 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-dev] 20210325 Re: Comment out the SOAP and HTTP engines?",
                 "url": "https://lists.apache.org/thread.html/reccf8c8a58337ce7c035495d3d82fbc549e97036a9789a2a7d9cccf6@%3Cdev.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-dev] 20210329 Re: Comment out the SOAP and HTTP engines?",
+                "url": "https://lists.apache.org/thread.html/rec5e9fdcdca13099cfb29f632333f44ad1dd60d90f67b90434e4467a@%3Cdev.ofbiz.apache.org%3E"
             }
         ]
     },

From e636d325995616c69cfa55d08b9846ff1e656e36 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 10:00:37 +0000
Subject: [PATCH 702/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3472.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/3xxx/CVE-2021-3472.json

diff --git a/2021/3xxx/CVE-2021-3472.json b/2021/3xxx/CVE-2021-3472.json
new file mode 100644
index 00000000000..fb8151b36c2
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3472.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3472",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 54043139e9fd4bcd5885e21116fe598fae515060 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 12:00:42 +0000
Subject: [PATCH 703/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 43d86d58dbf..1dbb4691127 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -144,6 +144,11 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210325 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[turbine-commits] 20210329 svn commit: r1888167 - /turbine/core/trunk/pom.xml",
+                "url": "https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7@%3Ccommits.turbine.apache.org%3E"
             }
         ]
     },

From df6a697b37ed5aa923c4b4575c8967a09b5b6be0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 13:00:36 +0000
Subject: [PATCH 704/845] "-Synchronized-Data."

---
 2016/2xxx/CVE-2016-2170.json   | 10 ++++++
 2021/26xxx/CVE-2021-26295.json | 10 ++++++
 2021/28xxx/CVE-2021-28936.json | 66 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28937.json | 61 +++++++++++++++++++++++++++----
 4 files changed, 135 insertions(+), 12 deletions(-)

diff --git a/2016/2xxx/CVE-2016-2170.json b/2016/2xxx/CVE-2016-2170.json
index 2994dc95a1a..44209aab8eb 100644
--- a/2016/2xxx/CVE-2016-2170.json
+++ b/2016/2xxx/CVE-2016-2170.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-dev] 20210329 Re: Comment out the SOAP and HTTP engines?",
                 "url": "https://lists.apache.org/thread.html/rec5e9fdcdca13099cfb29f632333f44ad1dd60d90f67b90434e4467a@%3Cdev.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
+                "url": "https://lists.apache.org/thread.html/rc9bd0d3d794dc370bc70585960841868cb29b92dcc80552b84ca2599@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-6942) Comment out RMI related code because of the Java deserialization issue [CVE-2016-2170]",
+                "url": "https://lists.apache.org/thread.html/r3ee005dd767cd83f522719423f5e7dd316f168ddbd1dc51a13d4e244@%3Cnotifications.ofbiz.apache.org%3E"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26295.json b/2021/26xxx/CVE-2021-26295.json
index f5595a7af8d..46fcefb7fd0 100644
--- a/2021/26xxx/CVE-2021-26295.json
+++ b/2021/26xxx/CVE-2021-26295.json
@@ -89,6 +89,16 @@
                 "refsource": "MLIST",
                 "name": "[ofbiz-dev] 20210329 Re: Comment out the SOAP and HTTP engines?",
                 "url": "https://lists.apache.org/thread.html/rec5e9fdcdca13099cfb29f632333f44ad1dd60d90f67b90434e4467a@%3Cdev.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
+                "url": "https://lists.apache.org/thread.html/rc9bd0d3d794dc370bc70585960841868cb29b92dcc80552b84ca2599@%3Cnotifications.ofbiz.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-6942) Comment out RMI related code because of the Java deserialization issue [CVE-2016-2170]",
+                "url": "https://lists.apache.org/thread.html/r3ee005dd767cd83f522719423f5e7dd316f168ddbd1dc51a13d4e244@%3Cnotifications.ofbiz.apache.org%3E"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28936.json b/2021/28xxx/CVE-2021-28936.json
index 3907393d7d0..443f88014d2 100644
--- a/2021/28xxx/CVE-2021-28936.json
+++ b/2021/28xxx/CVE-2021-28936.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28936",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28936",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990",
+                "url": "https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990"
+            },
+            {
+                "url": "http://acexy.com",
+                "refsource": "MISC",
+                "name": "http://acexy.com"
+            },
+            {
+                "url": "http://wireless-n.com",
+                "refsource": "MISC",
+                "name": "http://wireless-n.com"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28937.json b/2021/28xxx/CVE-2021-28937.json
index e796ada7f72..c6664ffa648 100644
--- a/2021/28xxx/CVE-2021-28937.json
+++ b/2021/28xxx/CVE-2021-28937.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28937",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28937",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990",
+                "url": "https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990"
+            },
+            {
+                "url": "http://acexy.com",
+                "refsource": "MISC",
+                "name": "http://acexy.com"
             }
         ]
     }

From 28294d3d5fb895edbe983fc42e6b2013458332d9 Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Mon, 29 Mar 2021 16:13:52 +0300
Subject: [PATCH 705/845] Adds CVE-2021-23358

---
 2021/23xxx/CVE-2021-23358.json | 104 +++++++++++++++++++++++++++++++--
 1 file changed, 100 insertions(+), 4 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23358.json b/2021/23xxx/CVE-2021-23358.json
index 66ba7168097..c5034df27ce 100644
--- a/2021/23xxx/CVE-2021-23358.json
+++ b/2021/23xxx/CVE-2021-23358.json
@@ -3,16 +3,112 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-29T13:13:50.579077Z",
         "ID": "CVE-2021-23358",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Arbitrary Code Execution"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "underscore",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "1.13.0-0"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "1.13.0-2"
+                                        },
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "1.3.2"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "1.12.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Arbitrary Code Execution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.\r\n\r\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
+            "baseScore": 9.8,
+            "baseSeverity": "CRITICAL",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "NONE",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "availabilityImpact": "HIGH"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Alessio Della Libera (@d3lla)"
+        }
+    ]
 }
\ No newline at end of file

From aad90ca7f2d530cf9bcb14c9ac6741ece4f64bd3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 14:00:40 +0000
Subject: [PATCH 706/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21290.json |  5 +++++
 2021/21xxx/CVE-2021-21295.json |  5 +++++
 2021/23xxx/CVE-2021-23358.json | 27 ++++++++++++++++-----------
 2021/3xxx/CVE-2021-3473.json   | 18 ++++++++++++++++++
 4 files changed, 44 insertions(+), 11 deletions(-)
 create mode 100644 2021/3xxx/CVE-2021-3473.json

diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json
index 54f774e2500..52a60e9d7d0 100644
--- a/2021/21xxx/CVE-2021-21290.json
+++ b/2021/21xxx/CVE-2021-21290.json
@@ -176,6 +176,11 @@
                 "refsource": "MLIST",
                 "name": "[ranger-dev] 20210317 [jira] [Assigned] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290",
+                "url": "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index e012501433f..32cf254e845 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -113,6 +113,11 @@
                 "refsource": "MISC",
                 "name": "https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E",
                 "url": "https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290",
+                "url": "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E"
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23358.json b/2021/23xxx/CVE-2021-23358.json
index c5034df27ce..1072afa2f40 100644
--- a/2021/23xxx/CVE-2021-23358.json
+++ b/2021/23xxx/CVE-2021-23358.json
@@ -60,24 +60,29 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984",
+                "name": "https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503",
+                "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504",
+                "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505",
+                "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71"
+                "refsource": "MISC",
+                "url": "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71",
+                "name": "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71"
             }
         ]
     },
@@ -85,7 +90,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.\r\n\r\n"
+                "value": "The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized."
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3473.json b/2021/3xxx/CVE-2021-3473.json
new file mode 100644
index 00000000000..dcd5fa7f2e2
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3473.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3473",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From c49f64920779b058b136a7d22cef5435df603673 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 16:00:41 +0000
Subject: [PATCH 707/845] "-Synchronized-Data."

---
 2019/5xxx/CVE-2019-5317.json   | 73 +++++++++++++++++++++++---
 2020/7xxx/CVE-2020-7850.json   | 93 +++++++++++++++++++++++++++++++---
 2021/21xxx/CVE-2021-21727.json | 50 ++++++++++++++++--
 2021/27xxx/CVE-2021-27352.json | 76 ++++++++++++++++++++++++---
 2021/29xxx/CVE-2021-29267.json | 61 +++++++++++++++++++---
 5 files changed, 325 insertions(+), 28 deletions(-)

diff --git a/2019/5xxx/CVE-2019-5317.json b/2019/5xxx/CVE-2019-5317.json
index 23f8e7bab45..73decb5a6f7 100644
--- a/2019/5xxx/CVE-2019-5317.json
+++ b/2019/5xxx/CVE-2019-5317.json
@@ -1,17 +1,76 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2019-5317",
-        "STATE": "RESERVED"
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-5317",
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.15 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.4.x: 8.4.0.5 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.2 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "local authentication bypass"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A local authentication bypass vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x: 6.5.4.15 and below; Aruba Instant 8.3.x: 8.3.0.11 and below; Aruba Instant 8.4.x: 8.4.0.5 and below; Aruba Instant 8.5.x: 8.5.0.6 and below; Aruba Instant 8.6.x: 8.6.0.2 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2020/7xxx/CVE-2020-7850.json b/2020/7xxx/CVE-2020-7850.json
index 40126b2100d..858fe96ed88 100644
--- a/2020/7xxx/CVE-2020-7850.json
+++ b/2020/7xxx/CVE-2020-7850.json
@@ -1,18 +1,99 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "vuln@krcert.or.kr",
         "ID": "CVE-2020-7850",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Douzone ActiveX File Download and Execution Vulnerability"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "NBBDownloader.ocx",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "x86, x64",
+                                            "version_affected": "<=",
+                                            "version_name": "1.0.0.13",
+                                            "version_value": "1.0.0.12"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "DOUZONE ICT GROUP."
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "NBBDownloader.ocx ActiveX Control in Groupware contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the activex method. A remote attacker could induce a user to access a crafted web page, causing damage such as malicious code infection."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-88 Argument Injection or Modification"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35982",
+                "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35982"
+            },
+            {
+                "refsource": "MISC",
+                "url": "http://help.neobizbox.com/",
+                "name": "http://help.neobizbox.com/"
+            }
+        ]
+    },
+    "solution": [
+        {
+            "lang": "eng",
+            "value": "Update software over NBBDownloader.ocx ActiveX Control 1.0.0.13 version or higher."
+        }
+    ],
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/21xxx/CVE-2021-21727.json b/2021/21xxx/CVE-2021-21727.json
index 0a792df3ac6..55eda3fecbc 100644
--- a/2021/21xxx/CVE-2021-21727.json
+++ b/2021/21xxx/CVE-2021-21727.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21727",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@zte.com.cn",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ""
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014744",
+                "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014744"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A ZTE product has a DoS vulnerability. A remote attacker can amplify traffic by sending carefully constructed IPv6 packets to the affected devices, which eventually leads to device denial of service. This affects:"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27352.json b/2021/27xxx/CVE-2021-27352.json
index deaae05f2b0..f02c3759549 100644
--- a/2021/27xxx/CVE-2021-27352.json
+++ b/2021/27xxx/CVE-2021-27352.json
@@ -1,17 +1,81 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27352",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27352",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An open redirect vulnerability in Ilch CMS version 2.1.42 allows attackers to redirect users to an attacker's site after a successful login."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://drive.google.com/file/d/1kSDlPASBCgJEINxTSIsjMWrU4u4T5XCc/view?usp=sharing",
+                "refsource": "MISC",
+                "name": "https://drive.google.com/file/d/1kSDlPASBCgJEINxTSIsjMWrU4u4T5XCc/view?usp=sharing"
+            },
+            {
+                "url": "https://s1.demo.opensourcecms.com/ilch/",
+                "refsource": "MISC",
+                "name": "https://s1.demo.opensourcecms.com/ilch/"
+            },
+            {
+                "url": "https://www.ilch.de/",
+                "refsource": "MISC",
+                "name": "https://www.ilch.de/"
+            },
+            {
+                "url": "https://www.opensourcecms.com/ilch/",
+                "refsource": "MISC",
+                "name": "https://www.opensourcecms.com/ilch/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/xoffense/POC/blob/main/Ilch%202.1.42%20Open%20redirect",
+                "url": "https://github.com/xoffense/POC/blob/main/Ilch%202.1.42%20Open%20redirect"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29267.json b/2021/29xxx/CVE-2021-29267.json
index e4cdc4a4821..94524e7dd05 100644
--- a/2021/29xxx/CVE-2021-29267.json
+++ b/2021/29xxx/CVE-2021-29267.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29267",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29267",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leveraging the api/Files/Attachment URI to attack help-desk staff via the chatbot feature."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://sherlockim.ae",
+                "refsource": "MISC",
+                "name": "https://sherlockim.ae"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/Security-AVS/CVE-2021-29267",
+                "url": "https://github.com/Security-AVS/CVE-2021-29267"
             }
         ]
     }

From 3bc68d43958869f383c6e19b1ea318f934da86f7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 17:00:38 +0000
Subject: [PATCH 708/845] "-Synchronized-Data."

---
 2017/15xxx/CVE-2017-15950.json |  5 +++
 2020/25xxx/CVE-2020-25217.json | 56 ++++++++++++++++++++++++++++++----
 2020/25xxx/CVE-2020-25218.json | 56 ++++++++++++++++++++++++++++++----
 2020/27xxx/CVE-2020-27216.json |  5 +++
 2021/21xxx/CVE-2021-21290.json |  5 +++
 2021/21xxx/CVE-2021-21295.json |  5 +++
 2021/3xxx/CVE-2021-3111.json   |  5 +++
 7 files changed, 125 insertions(+), 12 deletions(-)

diff --git a/2017/15xxx/CVE-2017-15950.json b/2017/15xxx/CVE-2017-15950.json
index 6d21fd6c5fe..d542aded78e 100644
--- a/2017/15xxx/CVE-2017-15950.json
+++ b/2017/15xxx/CVE-2017-15950.json
@@ -56,6 +56,11 @@
                 "name": "http://seclists.org/fulldisclosure/2017/Oct/64",
                 "refsource": "MISC",
                 "url": "http://seclists.org/fulldisclosure/2017/Oct/64"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html",
+                "url": "http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html"
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25217.json b/2020/25xxx/CVE-2020-25217.json
index ffec157839b..d4c7a9a2243 100644
--- a/2020/25xxx/CVE-2020-25217.json
+++ b/2020/25xxx/CVE-2020-25217.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-25217",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-25217",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allows Command Injection as root in its administrative web interface."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0001/FEYE-2021-0001.md",
+                "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0001/FEYE-2021-0001.md"
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25218.json b/2020/25xxx/CVE-2020-25218.json
index 786fcd3446e..3d1856d73fd 100644
--- a/2020/25xxx/CVE-2020-25218.json
+++ b/2020/25xxx/CVE-2020-25218.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-25218",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-25218",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allow Authentication Bypass in its administrative web interface."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0002/FEYE-2021-0002.md",
+                "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0002/FEYE-2021-0002.md"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index 332bc84cf7a..f2a25afba16 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -555,6 +555,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210327 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210329 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json
index 52a60e9d7d0..49c31f9dc3c 100644
--- a/2021/21xxx/CVE-2021-21290.json
+++ b/2021/21xxx/CVE-2021-21290.json
@@ -181,6 +181,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290",
                 "url": "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final",
+                "url": "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 32cf254e845..a977b595779 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -118,6 +118,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290",
                 "url": "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final",
+                "url": "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3111.json b/2021/3xxx/CVE-2021-3111.json
index 64e34254688..5bf9c114a75 100644
--- a/2021/3xxx/CVE-2021-3111.json
+++ b/2021/3xxx/CVE-2021-3111.json
@@ -71,6 +71,11 @@
                 "refsource": "MISC",
                 "name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes",
                 "url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html",
+                "url": "http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html"
             }
         ]
     }

From fc43c9a57b58c28131f9612ff890d2295a1d9a63 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 18:00:39 +0000
Subject: [PATCH 709/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28670.json | 56 +++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28957.json |  7 +++-
 2021/29xxx/CVE-2021-29414.json | 18 +++++++++
 2021/29xxx/CVE-2021-29415.json | 18 +++++++++
 2021/29xxx/CVE-2021-29416.json | 67 ++++++++++++++++++++++++++++++++++
 5 files changed, 159 insertions(+), 7 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29414.json
 create mode 100644 2021/29xxx/CVE-2021-29415.json
 create mode 100644 2021/29xxx/CVE-2021-29416.json

diff --git a/2021/28xxx/CVE-2021-28670.json b/2021/28xxx/CVE-2021-28670.json
index df202de7d95..081b06add6a 100644
--- a/2021/28xxx/CVE-2021-28670.json
+++ b/2021/28xxx/CVE-2021-28670.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28670",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28670",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Xerox AltaLink B8045/B8090 before 103.008.030.32000, C8030/C8035 before 103.001.030.32000, C8045/C8055 before 103.002.030.32000 and C8070 before 103.003.030.32000 allow unauthorized users, by leveraging the Scan To Mailbox feature, to delete arbitrary files from the disk."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/12/cert_Security_Mini_Bulletin_XRX20X_for_ALB80xx-C80xxv.pdf",
+                "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/12/cert_Security_Mini_Bulletin_XRX20X_for_ALB80xx-C80xxv.pdf"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28957.json b/2021/28xxx/CVE-2021-28957.json
index 14ab665121f..0560c896f8c 100644
--- a/2021/28xxx/CVE-2021-28957.json
+++ b/2021/28xxx/CVE-2021-28957.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "lxml 4.6.2 allows XSS. It places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute."
+                "value": "An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3."
             }
         ]
     },
@@ -66,6 +66,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210324 [SECURITY] [DLA 2606-1] lxml security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999",
+                "url": "https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29414.json b/2021/29xxx/CVE-2021-29414.json
new file mode 100644
index 00000000000..e42fb245109
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29414.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29414",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29415.json b/2021/29xxx/CVE-2021-29415.json
new file mode 100644
index 00000000000..5b65872b66c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29415.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29415",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29416.json b/2021/29xxx/CVE-2021-29416.json
new file mode 100644
index 00000000000..531706be4dd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29416.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29416",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in PortSwigger Burp Suite before 2021.2. During viewing of a malicious request, it can be manipulated into issuing a request that does not respect its upstream proxy configuration. This could leak NetNTLM hashes on Windows systems that fail to block outbound SMB."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://hackerone.com/reports/1054382",
+                "refsource": "MISC",
+                "name": "https://hackerone.com/reports/1054382"
+            },
+            {
+                "url": "https://portswigger.net/burp/releases/professional-community-2020-12?requestededition=professional",
+                "refsource": "MISC",
+                "name": "https://portswigger.net/burp/releases/professional-community-2020-12?requestededition=professional"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 85e7b4edfd6deac3cbcce7ba5f8b750bd366f573 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 18:00:53 +0000
Subject: [PATCH 710/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27927.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/27xxx/CVE-2021-27927.json b/2021/27xxx/CVE-2021-27927.json
index cee03d6669d..f4b4ba1c6b8 100644
--- a/2021/27xxx/CVE-2021-27927.json
+++ b/2021/27xxx/CVE-2021-27927.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "In Zabbix before 4.0.28rc1, 5.x before 5.0.8rc1, 5.1.x and 5.2.x before 5.2.4rc1, and 5.3.x and 5.4.x before 5.4.0alpha1, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method."
+                "value": "In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges."
             }
         ]
     },

From f4617f8715c3a84768aa94baf5de7eb7d9fa03b8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 19:00:37 +0000
Subject: [PATCH 711/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29417.json | 72 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29418.json | 18 +++++++++
 2021/29xxx/CVE-2021-29419.json | 18 +++++++++
 2021/29xxx/CVE-2021-29420.json | 18 +++++++++
 2021/29xxx/CVE-2021-29421.json | 18 +++++++++
 5 files changed, 144 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29417.json
 create mode 100644 2021/29xxx/CVE-2021-29418.json
 create mode 100644 2021/29xxx/CVE-2021-29419.json
 create mode 100644 2021/29xxx/CVE-2021-29420.json
 create mode 100644 2021/29xxx/CVE-2021-29421.json

diff --git a/2021/29xxx/CVE-2021-29417.json b/2021/29xxx/CVE-2021-29417.json
new file mode 100644
index 00000000000..2194607ad90
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29417.json
@@ -0,0 +1,72 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29417",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "gitjacker before 0.1.0 allows remote attackers to execute arbitrary code via a crafted .git directory because of directory traversal."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://vuln.ryotak.me/advisories/5.txt",
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/5.txt"
+            },
+            {
+                "url": "https://github.com/liamg/gitjacker/releases/tag/v0.1.0",
+                "refsource": "MISC",
+                "name": "https://github.com/liamg/gitjacker/releases/tag/v0.1.0"
+            },
+            {
+                "url": "https://github.com/liamg/gitjacker/compare/v0.0.3...v0.1.0",
+                "refsource": "MISC",
+                "name": "https://github.com/liamg/gitjacker/compare/v0.0.3...v0.1.0"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29418.json b/2021/29xxx/CVE-2021-29418.json
new file mode 100644
index 00000000000..8f0873b0442
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29418.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29418",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29419.json b/2021/29xxx/CVE-2021-29419.json
new file mode 100644
index 00000000000..03519a18e8a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29419.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29419",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29420.json b/2021/29xxx/CVE-2021-29420.json
new file mode 100644
index 00000000000..8ba127186df
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29420.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29420",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29421.json b/2021/29xxx/CVE-2021-29421.json
new file mode 100644
index 00000000000..cb8bbd2be50
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29421.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29421",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From edf7695f60942a8fbd35cd963a072f80eb9fe207 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 20:00:37 +0000
Subject: [PATCH 712/845] "-Synchronized-Data."

---
 2020/24xxx/CVE-2020-24635.json | 62 ++++++++++++++++++++++++++++++--
 2020/24xxx/CVE-2020-24636.json | 62 ++++++++++++++++++++++++++++++--
 2020/25xxx/CVE-2020-25577.json | 50 ++++++++++++++++++++++++--
 2020/25xxx/CVE-2020-25583.json | 50 ++++++++++++++++++++++++--
 2020/35xxx/CVE-2020-35137.json | 66 ++++++++++++++++++++++++++++++----
 2020/35xxx/CVE-2020-35138.json | 66 ++++++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25143.json | 56 +++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25144.json | 62 ++++++++++++++++++++++++++++++--
 2021/26xxx/CVE-2021-26714.json | 56 +++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28668.json | 56 +++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28669.json | 56 +++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28673.json | 56 +++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29422.json | 18 ++++++++++
 2021/3xxx/CVE-2021-3391.json   | 66 ++++++++++++++++++++++++++++++----
 2021/3xxx/CVE-2021-3474.json   | 18 ++++++++++
 2021/3xxx/CVE-2021-3475.json   | 18 ++++++++++
 2021/3xxx/CVE-2021-3476.json   | 18 ++++++++++
 17 files changed, 776 insertions(+), 60 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29422.json
 create mode 100644 2021/3xxx/CVE-2021-3474.json
 create mode 100644 2021/3xxx/CVE-2021-3475.json
 create mode 100644 2021/3xxx/CVE-2021-3476.json

diff --git a/2020/24xxx/CVE-2020-24635.json b/2020/24xxx/CVE-2020-24635.json
index 86893555112..d13eb0caca8 100644
--- a/2020/24xxx/CVE-2020-24635.json
+++ b/2020/24xxx/CVE-2020-24635.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-24635",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.13 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.10 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.5 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.0.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote execution of arbitrary commands"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2020/24xxx/CVE-2020-24636.json b/2020/24xxx/CVE-2020-24636.json
index d0ffc63d097..d57f53bbc61 100644
--- a/2020/24xxx/CVE-2020-24636.json
+++ b/2020/24xxx/CVE-2020-24636.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-24636",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.13 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.10 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.5 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.0.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote execution of arbitrary commands"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25577.json b/2020/25xxx/CVE-2020-25577.json
index e0a3eaf1c5f..a74ee504274 100644
--- a/2020/25xxx/CVE-2020-25577.json
+++ b/2020/25xxx/CVE-2020-25577.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25577",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p1, 12.1-RELEASE before p11, 11.4-RELEASE before p5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:32.rtsold.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:32.rtsold.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r368250, 11.4-STABLE before r368253, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 rtsold(8) does not verify that the RDNSS option does not extend past the end of the received packet before processing its contents. While the kernel currently ignores such malformed packets, it passes them to userspace programs. Any programs expecting the kernel to do validation may be vulnerable to an overflow."
             }
         ]
     }
diff --git a/2020/25xxx/CVE-2020-25583.json b/2020/25xxx/CVE-2020-25583.json
index 1eaec2974d2..dbc8d7c474a 100644
--- a/2020/25xxx/CVE-2020-25583.json
+++ b/2020/25xxx/CVE-2020-25583.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-25583",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secteam@freebsd.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "FreeBSD",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "FreeBSD 12.2-RELEASE before p1, 12.1-RELEASE before p11, 11.4-RELEASE before p5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Out-of-bounds write"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:32.rtsold.asc",
+                "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:32.rtsold.asc"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In FreeBSD 12.2-STABLE before r368250, 11.4-STABLE before r368253, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 when processing a DNSSL option, rtsold(8) decodes domain name labels per an encoding specified in RFC 1035 in which the first octet of each label contains the label's length. rtsold(8) did not validate label lengths correctly and could overflow the destination buffer."
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35137.json b/2020/35xxx/CVE-2020-35137.json
index 35bb2b40c0c..cb400a4dfb8 100644
--- a/2020/35xxx/CVE-2020-35137.json
+++ b/2020/35xxx/CVE-2020-35137.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-35137",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-35137",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded API key, used to communicate with the MobileIron SaaS discovery API, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in com/mobileiron/registration/RegisterActivity.java and can be used for api/v1/gateway/customers/servers requests."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US",
+                "refsource": "MISC",
+                "name": "https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration",
+                "url": "https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/optiv/rustyIron",
+                "url": "https://github.com/optiv/rustyIron"
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35138.json b/2020/35xxx/CVE-2020-35138.json
index ad5bb26afea..2a06da52d37 100644
--- a/2020/35xxx/CVE-2020-35138.json
+++ b/2020/35xxx/CVE-2020-35138.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-35138",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-35138",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The keys is in the com/mobileiron/common/utils/C4928m.java file."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US",
+                "refsource": "MISC",
+                "name": "https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration",
+                "url": "https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/optiv/rustyIron",
+                "url": "https://github.com/optiv/rustyIron"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25143.json b/2021/25xxx/CVE-2021-25143.json
index 33da52ecef1..038693ece14 100644
--- a/2021/25xxx/CVE-2021-25143.json
+++ b/2021/25xxx/CVE-2021-25143.json
@@ -4,14 +4,64 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25143",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.12 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.9 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.4 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote denial of service (dos)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote denial of service (dos) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.9 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25144.json b/2021/25xxx/CVE-2021-25144.json
index 83276290c61..7cb19c92783 100644
--- a/2021/25xxx/CVE-2021-25144.json
+++ b/2021/25xxx/CVE-2021-25144.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25144",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.16 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.12 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.2 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote buffer overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.6 and below; Aruba Instant 8.6.x: 8.6.0.2 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26714.json b/2021/26xxx/CVE-2021-26714.json
index d94e7b4e7cc..479d1bbbe2b 100644
--- a/2021/26xxx/CVE-2021-26714.json
+++ b/2021/26xxx/CVE-2021-26714.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26714",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26714",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The Enterprise License Manager portal in Mitel MiContact Center Enterprise before 9.4 could allow a user to access restricted files and folders due to insufficient access control. A successful exploit could allow an attacker to view and modify application data via Directory Traversal."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0003",
+                "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0003"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28668.json b/2021/28xxx/CVE-2021-28668.json
index ae2c3411bf2..42cedd93ae2 100644
--- a/2021/28xxx/CVE-2021-28668.json
+++ b/2021/28xxx/CVE-2021-28668.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28668",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28668",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Xerox AltaLink B80xx before 103.008.020.23120, C8030/C8035 before 103.001.020.23120, C8045/C8055 before 103.002.020.23120 and C8070 before 103.003.020.23120 has several SQL injection vulnerabilities."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/09/cert_Security_Mini_Bulletin_XRX20R_for_ALB80xx-C80xx-2.pdf",
+                "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/09/cert_Security_Mini_Bulletin_XRX20R_for_ALB80xx-C80xx-2.pdf"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28669.json b/2021/28xxx/CVE-2021-28669.json
index d947d41a654..8f15592e2a3 100644
--- a/2021/28xxx/CVE-2021-28669.json
+++ b/2021/28xxx/CVE-2021-28669.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28669",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28669",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Xerox AltaLink B80xx before 103.008.020.23120, C8030/C8035 before 103.001.020.23120, C8045/C8055 before 103.002.020.23120 and C8070 before 103.003.020.23120 provide the ability to set configuration attributes without administrative rights."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/09/cert_Security_Mini_Bulletin_XRX20R_for_ALB80xx-C80xx-2.pdf",
+                "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/09/cert_Security_Mini_Bulletin_XRX20R_for_ALB80xx-C80xx-2.pdf"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28673.json b/2021/28xxx/CVE-2021-28673.json
index 07ca33b3e76..2ae14c55328 100644
--- a/2021/28xxx/CVE-2021-28673.json
+++ b/2021/28xxx/CVE-2021-28673.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28673",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28673",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands in the Web User Interface."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf",
+                "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29422.json b/2021/29xxx/CVE-2021-29422.json
new file mode 100644
index 00000000000..68c36205d02
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29422.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29422",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3391.json b/2021/3xxx/CVE-2021-3391.json
index 8a1b43d06db..047ec1a6d8a 100644
--- a/2021/3xxx/CVE-2021-3391.json
+++ b/2021/3xxx/CVE-2021-3391.json
@@ -1,17 +1,71 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-3391",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-3391",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "MobileIron Mobile@Work through 2021-03-22 allows attackers to distinguish among valid, disabled, and nonexistent user accounts by observing the number of failed login attempts needed to produce a Lockout error message"
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
+                "refsource": "MISC",
+                "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration",
+                "url": "https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/optiv/rustyIron",
+                "url": "https://github.com/optiv/rustyIron"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3474.json b/2021/3xxx/CVE-2021-3474.json
new file mode 100644
index 00000000000..245363c2f3e
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3474.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3474",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3475.json b/2021/3xxx/CVE-2021-3475.json
new file mode 100644
index 00000000000..676e852ccfa
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3475.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3475",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3476.json b/2021/3xxx/CVE-2021-3476.json
new file mode 100644
index 00000000000..fbe722edc6e
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3476.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3476",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 18eb09596a74a3b413e912626e2c92215b4877dd Mon Sep 17 00:00:00 2001
From: zdi-team 
Date: Mon, 29 Mar 2021 15:49:10 -0500
Subject: [PATCH 713/845] ZDI assigns the following CVEs:

M  2021/27xxx/CVE-2021-27272.json
M  2021/27xxx/CVE-2021-27273.json
M  2021/27xxx/CVE-2021-27274.json
M  2021/27xxx/CVE-2021-27275.json
M  2021/27xxx/CVE-2021-27276.json
---
 2021/27xxx/CVE-2021-27272.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27273.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27274.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27275.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27276.json | 84 +++++++++++++++++++++++++++-------
 5 files changed, 340 insertions(+), 80 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27272.json b/2021/27xxx/CVE-2021-27272.json
index f1806bf7b3c..a09cbde1bf7 100644
--- a/2021/27xxx/CVE-2021-27272.json
+++ b/2021/27xxx/CVE-2021-27272.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27272",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27272",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "ProSAFE Network Management System",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "1.6.0.26"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "NETGEAR"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "rgod",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the ReportTemplateController class. When parsing the path parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12123."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-355/"
+      },
+      {
+        "url": "https://kb.netgear.com/000062723/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0537"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27273.json b/2021/27xxx/CVE-2021-27273.json
index 1c93e619fe9..49f9527bc4c 100644
--- a/2021/27xxx/CVE-2021-27273.json
+++ b/2021/27xxx/CVE-2021-27273.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27273",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27273",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "ProSAFE Network Management System",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "1.6.0.26"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "NETGEAR"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "rgod",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the SettingConfigController class. When parsing the fileName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12121."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-356/"
+      },
+      {
+        "url": "https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27274.json b/2021/27xxx/CVE-2021-27274.json
index 1e047c125e1..64afc5f0432 100644
--- a/2021/27xxx/CVE-2021-27274.json
+++ b/2021/27xxx/CVE-2021-27274.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27274",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27274",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "ProSAFE Network Management System",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "1.6.0.26"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "NETGEAR"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "rgod",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the MFileUploadController class.  The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12124."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-357/"
+      },
+      {
+        "url": "https://kb.netgear.com/000062688/Security-Advisory-for-Pre-Authentication-Command-Injection-on-NMS300-PSV-2020-0560"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27275.json b/2021/27xxx/CVE-2021-27275.json
index 5e10edfcb1a..c884700c7bd 100644
--- a/2021/27xxx/CVE-2021-27275.json
+++ b/2021/27xxx/CVE-2021-27275.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27275",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27275",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "ProSAFE Network Management System",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "1.6.0.26"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "NETGEAR"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "rgod",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to disclose sensitive information and delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the ConfigFileController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information or to create a denial-of-service condition on the system. Was ZDI-CAN-12125."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-358/"
+      },
+      {
+        "url": "https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27276.json b/2021/27xxx/CVE-2021-27276.json
index c7c775e75f3..b31a6c29f76 100644
--- a/2021/27xxx/CVE-2021-27276.json
+++ b/2021/27xxx/CVE-2021-27276.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27276",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27276",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "ProSAFE Network Management System",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "1.6.0.26"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "NETGEAR"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "rgod",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-359/"
+      },
+      {
+        "url": "https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
+      "version": "3.0"
+    }
+  }
+}

From 5726ce28fb7e26dfcc1ec8b6a19f8623ef347a27 Mon Sep 17 00:00:00 2001
From: zdi-team 
Date: Mon, 29 Mar 2021 16:00:15 -0500
Subject: [PATCH 714/845] ZDI assigns the following CVEs:

M  2021/27xxx/CVE-2021-27239.json
M  2021/27xxx/CVE-2021-27240.json
M  2021/27xxx/CVE-2021-27241.json
M  2021/27xxx/CVE-2021-27242.json
M  2021/27xxx/CVE-2021-27243.json
M  2021/27xxx/CVE-2021-27244.json
M  2021/27xxx/CVE-2021-27245.json
---
 2021/27xxx/CVE-2021-27239.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27240.json | 81 +++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27241.json | 81 +++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27242.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27243.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27244.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27245.json | 81 +++++++++++++++++++++++++-------
 7 files changed, 467 insertions(+), 112 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27239.json b/2021/27xxx/CVE-2021-27239.json
index adb5add6569..518b15817a4 100644
--- a/2021/27xxx/CVE-2021-27239.json
+++ b/2021/27xxx/CVE-2021-27239.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27239",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27239",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Multiple Routers",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "firmware version 1.0.4.98"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "NETGEAR"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Anonymous",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-121: Stack-based Buffer Overflow"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-206/"
+      },
+      {
+        "url": "https://kb.netgear.com/000062820/Security-Advisory-for-Stack-based-Buffer-Overflow-Remote-Code-Execution-Vulnerability-on-Some-Routers-PSV-2020-0432"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27240.json b/2021/27xxx/CVE-2021-27240.json
index 73e039237eb..7848addd58e 100644
--- a/2021/27xxx/CVE-2021-27240.json
+++ b/2021/27xxx/CVE-2021-27240.json
@@ -1,18 +1,67 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27240",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27240",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Patch Manager",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "2020.2.1"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "SolarWinds"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Harrison Neal",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. Was ZDI-CAN-12009."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-502: Deserialization of Untrusted Data"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-207/"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27241.json b/2021/27xxx/CVE-2021-27241.json
index fe8ec3b2195..64d7d962303 100644
--- a/2021/27xxx/CVE-2021-27241.json
+++ b/2021/27xxx/CVE-2021-27241.json
@@ -1,18 +1,67 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27241",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27241",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Premium Security",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "20.8.2429 (Build 20.8.5653.561)"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Avast"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Abdelhamid Naceri",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-208/"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27242.json b/2021/27xxx/CVE-2021-27242.json
index f1c8e9eb2e3..7385f11b153 100644
--- a/2021/27xxx/CVE-2021-27242.json
+++ b/2021/27xxx/CVE-2021-27242.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27242",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27242",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Desktop",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "16.0.1-48919"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Parallels"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Ezrak1e",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. Was ZDI-CAN-11926."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-209/"
+      },
+      {
+        "url": "https://kb.parallels.com/en/125013"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27243.json b/2021/27xxx/CVE-2021-27243.json
index 0d004773b4f..7c697d32f7e 100644
--- a/2021/27xxx/CVE-2021-27243.json
+++ b/2021/27xxx/CVE-2021-27243.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27243",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27243",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Desktop",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "16.0.1-48919"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Parallels"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Ezrak1e",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11924."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-190: Integer Overflow or Wraparound"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-210/"
+      },
+      {
+        "url": "https://kb.parallels.com/en/125013"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27244.json b/2021/27xxx/CVE-2021-27244.json
index 9806ac00b30..df9eec25c5e 100644
--- a/2021/27xxx/CVE-2021-27244.json
+++ b/2021/27xxx/CVE-2021-27244.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27244",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27244",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Desktop",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "16.0.1-48919"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Parallels"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Ezrak1e",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-211/"
+      },
+      {
+        "url": "https://kb.parallels.com/en/125013"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27245.json b/2021/27xxx/CVE-2021-27245.json
index a8048077a87..7f80d4ca6d2 100644
--- a/2021/27xxx/CVE-2021-27245.json
+++ b/2021/27xxx/CVE-2021-27245.json
@@ -1,18 +1,67 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27245",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27245",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Archer A7",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "TP-Link"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-12309."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-693: Protection Mechanism Failure"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-214/"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}

From ed535758877a387fcba78ad422e1e4bd9ef05087 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 21:00:42 +0000
Subject: [PATCH 715/845] "-Synchronized-Data."

---
 2021/27xxx/CVE-2021-27272.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27273.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27274.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27275.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27276.json | 132 +++++++++++++++++----------------
 2021/28xxx/CVE-2021-28671.json |  56 ++++++++++++--
 2021/28xxx/CVE-2021-28672.json |  56 ++++++++++++--
 7 files changed, 440 insertions(+), 332 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27272.json b/2021/27xxx/CVE-2021-27272.json
index a09cbde1bf7..e95307f8e6e 100644
--- a/2021/27xxx/CVE-2021-27272.json
+++ b/2021/27xxx/CVE-2021-27272.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27272",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "ProSAFE Network Management System",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "1.6.0.26"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27272",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ProSAFE Network Management System",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.6.0.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "NETGEAR"
                 }
-              }
             ]
-          },
-          "vendor_name": "NETGEAR"
         }
-      ]
-    }
-  },
-  "credit": "rgod",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the ReportTemplateController class. When parsing the path parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12123."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
-          }
+    },
+    "credit": "rgod",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ReportTemplateController class. When parsing the path parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12123."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-355/"
-      },
-      {
-        "url": "https://kb.netgear.com/000062723/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0537"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000062723/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0537",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000062723/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0537"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-355/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-355/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27273.json b/2021/27xxx/CVE-2021-27273.json
index 49f9527bc4c..1f8fb4acd70 100644
--- a/2021/27xxx/CVE-2021-27273.json
+++ b/2021/27xxx/CVE-2021-27273.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27273",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "ProSAFE Network Management System",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "1.6.0.26"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27273",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ProSAFE Network Management System",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.6.0.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "NETGEAR"
                 }
-              }
             ]
-          },
-          "vendor_name": "NETGEAR"
         }
-      ]
-    }
-  },
-  "credit": "rgod",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the SettingConfigController class. When parsing the fileName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12121."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
-          }
+    },
+    "credit": "rgod",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SettingConfigController class. When parsing the fileName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12121."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-356/"
-      },
-      {
-        "url": "https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-356/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-356/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27274.json b/2021/27xxx/CVE-2021-27274.json
index 64afc5f0432..ae53d44085e 100644
--- a/2021/27xxx/CVE-2021-27274.json
+++ b/2021/27xxx/CVE-2021-27274.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27274",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "ProSAFE Network Management System",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "1.6.0.26"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27274",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ProSAFE Network Management System",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.6.0.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "NETGEAR"
                 }
-              }
             ]
-          },
-          "vendor_name": "NETGEAR"
         }
-      ]
-    }
-  },
-  "credit": "rgod",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the MFileUploadController class.  The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12124."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
-          }
+    },
+    "credit": "rgod",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MFileUploadController class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12124."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-357/"
-      },
-      {
-        "url": "https://kb.netgear.com/000062688/Security-Advisory-for-Pre-Authentication-Command-Injection-on-NMS300-PSV-2020-0560"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000062688/Security-Advisory-for-Pre-Authentication-Command-Injection-on-NMS300-PSV-2020-0560",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000062688/Security-Advisory-for-Pre-Authentication-Command-Injection-on-NMS300-PSV-2020-0560"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-357/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-357/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27275.json b/2021/27xxx/CVE-2021-27275.json
index c884700c7bd..9ea42ae4ef0 100644
--- a/2021/27xxx/CVE-2021-27275.json
+++ b/2021/27xxx/CVE-2021-27275.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27275",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "ProSAFE Network Management System",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "1.6.0.26"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27275",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ProSAFE Network Management System",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.6.0.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "NETGEAR"
                 }
-              }
             ]
-          },
-          "vendor_name": "NETGEAR"
         }
-      ]
-    }
-  },
-  "credit": "rgod",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to disclose sensitive information and delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the ConfigFileController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information or to create a denial-of-service condition on the system. Was ZDI-CAN-12125."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
-          }
+    },
+    "credit": "rgod",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to disclose sensitive information and delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ConfigFileController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information or to create a denial-of-service condition on the system. Was ZDI-CAN-12125."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-358/"
-      },
-      {
-        "url": "https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-358/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-358/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27276.json b/2021/27xxx/CVE-2021-27276.json
index b31a6c29f76..75a0a48838a 100644
--- a/2021/27xxx/CVE-2021-27276.json
+++ b/2021/27xxx/CVE-2021-27276.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27276",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "ProSAFE Network Management System",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "1.6.0.26"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27276",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ProSAFE Network Management System",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.6.0.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "NETGEAR"
                 }
-              }
             ]
-          },
-          "vendor_name": "NETGEAR"
         }
-      ]
-    }
-  },
-  "credit": "rgod",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
-          }
+    },
+    "credit": "rgod",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-359/"
-      },
-      {
-        "url": "https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-359/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-359/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28671.json b/2021/28xxx/CVE-2021-28671.json
index 128f51a6f02..eb9b405b93c 100644
--- a/2021/28xxx/CVE-2021-28671.json
+++ b/2021/28xxx/CVE-2021-28671.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28671",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28671",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf",
+                "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28672.json b/2021/28xxx/CVE-2021-28672.json
index 57176a3f9c5..16a74c12c86 100644
--- a/2021/28xxx/CVE-2021-28672.json
+++ b/2021/28xxx/CVE-2021-28672.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28672",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28672",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf",
+                "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
             }
         ]
     }

From 449539b4ea02dfb2632d3c9dde10dd36cdc8f7be Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 22:00:42 +0000
Subject: [PATCH 716/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22493.json |  58 ++-------------
 2021/27xxx/CVE-2021-27239.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27240.json | 124 ++++++++++++++++---------------
 2021/27xxx/CVE-2021-27241.json | 124 ++++++++++++++++---------------
 2021/27xxx/CVE-2021-27242.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27243.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27244.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27245.json | 124 ++++++++++++++++---------------
 8 files changed, 468 insertions(+), 490 deletions(-)

diff --git a/2021/22xxx/CVE-2021-22493.json b/2021/22xxx/CVE-2021-22493.json
index 25836b5d1e5..4f951c637cc 100644
--- a/2021/22xxx/CVE-2021-22493.json
+++ b/2021/22xxx/CVE-2021-22493.json
@@ -1,61 +1,17 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2021-22493",
-        "STATE": "PUBLIC"
-    },
-    "affects": {
-        "vendor": {
-            "vendor_data": [
-                {
-                    "product": {
-                        "product_data": [
-                            {
-                                "product_name": "n/a",
-                                "version": {
-                                    "version_data": [
-                                        {
-                                            "version_value": "n/a"
-                                        }
-                                    ]
-                                }
-                            }
-                        ]
-                    },
-                    "vendor_name": "n/a"
-                }
-            ]
-        }
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-22493",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "REJECT"
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The quram library allows attackers to execute arbitrary code or cause a denial of service (memory corruption) during dng decoding. The Samsung ID is SVE-2020-18811 (January 2021)."
-            }
-        ]
-    },
-    "problemtype": {
-        "problemtype_data": [
-            {
-                "description": [
-                    {
-                        "lang": "eng",
-                        "value": "n/a"
-                    }
-                ]
-            }
-        ]
-    },
-    "references": {
-        "reference_data": [
-            {
-                "url": "https://security.samsungmobile.com/securityUpdate.smsb",
-                "refsource": "MISC",
-                "name": "https://security.samsungmobile.com/securityUpdate.smsb"
+                "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-25346. Reason: This candidate is a duplicate of CVE-2021-25346. Notes: All CVE users should reference CVE-2021-25346 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27239.json b/2021/27xxx/CVE-2021-27239.json
index 518b15817a4..bf754902bf9 100644
--- a/2021/27xxx/CVE-2021-27239.json
+++ b/2021/27xxx/CVE-2021-27239.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27239",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Multiple Routers",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "firmware version 1.0.4.98"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27239",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Multiple Routers",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "firmware version 1.0.4.98"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "NETGEAR"
                 }
-              }
             ]
-          },
-          "vendor_name": "NETGEAR"
         }
-      ]
-    }
-  },
-  "credit": "Anonymous",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-121: Stack-based Buffer Overflow"
-          }
+    },
+    "credit": "Anonymous",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-206/"
-      },
-      {
-        "url": "https://kb.netgear.com/000062820/Security-Advisory-for-Stack-based-Buffer-Overflow-Remote-Code-Execution-Vulnerability-on-Some-Routers-PSV-2020-0432"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-121: Stack-based Buffer Overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-206/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-206/"
+            },
+            {
+                "url": "https://kb.netgear.com/000062820/Security-Advisory-for-Stack-based-Buffer-Overflow-Remote-Code-Execution-Vulnerability-on-Some-Routers-PSV-2020-0432",
+                "refsource": "MISC",
+                "name": "https://kb.netgear.com/000062820/Security-Advisory-for-Stack-based-Buffer-Overflow-Remote-Code-Execution-Vulnerability-on-Some-Routers-PSV-2020-0432"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27240.json b/2021/27xxx/CVE-2021-27240.json
index 7848addd58e..fcd74fd10b3 100644
--- a/2021/27xxx/CVE-2021-27240.json
+++ b/2021/27xxx/CVE-2021-27240.json
@@ -1,67 +1,69 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27240",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Patch Manager",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "2020.2.1"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27240",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Patch Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "2020.2.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "SolarWinds"
                 }
-              }
             ]
-          },
-          "vendor_name": "SolarWinds"
         }
-      ]
-    }
-  },
-  "credit": "Harrison Neal",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. Was ZDI-CAN-12009."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-502: Deserialization of Untrusted Data"
-          }
+    },
+    "credit": "Harrison Neal",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. Was ZDI-CAN-12009."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-207/"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-502: Deserialization of Untrusted Data"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-207/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-207/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27241.json b/2021/27xxx/CVE-2021-27241.json
index 64d7d962303..e440686bdfc 100644
--- a/2021/27xxx/CVE-2021-27241.json
+++ b/2021/27xxx/CVE-2021-27241.json
@@ -1,67 +1,69 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27241",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Premium Security",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "20.8.2429 (Build 20.8.5653.561)"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27241",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Premium Security",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "20.8.2429 (Build 20.8.5653.561)"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Avast"
                 }
-              }
             ]
-          },
-          "vendor_name": "Avast"
         }
-      ]
-    }
-  },
-  "credit": "Abdelhamid Naceri",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')"
-          }
+    },
+    "credit": "Abdelhamid Naceri",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-208/"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-208/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-208/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27242.json b/2021/27xxx/CVE-2021-27242.json
index 7385f11b153..aedc961ff65 100644
--- a/2021/27xxx/CVE-2021-27242.json
+++ b/2021/27xxx/CVE-2021-27242.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27242",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Desktop",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "16.0.1-48919"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27242",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Desktop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.1-48919"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Parallels"
                 }
-              }
             ]
-          },
-          "vendor_name": "Parallels"
         }
-      ]
-    }
-  },
-  "credit": "Ezrak1e",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. Was ZDI-CAN-11926."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
-          }
+    },
+    "credit": "Ezrak1e",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. Was ZDI-CAN-11926."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-209/"
-      },
-      {
-        "url": "https://kb.parallels.com/en/125013"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.parallels.com/en/125013",
+                "refsource": "MISC",
+                "name": "https://kb.parallels.com/en/125013"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-209/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-209/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27243.json b/2021/27xxx/CVE-2021-27243.json
index 7c697d32f7e..1ecb5d53fc1 100644
--- a/2021/27xxx/CVE-2021-27243.json
+++ b/2021/27xxx/CVE-2021-27243.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27243",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Desktop",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "16.0.1-48919"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27243",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Desktop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.1-48919"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Parallels"
                 }
-              }
             ]
-          },
-          "vendor_name": "Parallels"
         }
-      ]
-    }
-  },
-  "credit": "Ezrak1e",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11924."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-190: Integer Overflow or Wraparound"
-          }
+    },
+    "credit": "Ezrak1e",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11924."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-210/"
-      },
-      {
-        "url": "https://kb.parallels.com/en/125013"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-190: Integer Overflow or Wraparound"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.parallels.com/en/125013",
+                "refsource": "MISC",
+                "name": "https://kb.parallels.com/en/125013"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-210/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-210/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27244.json b/2021/27xxx/CVE-2021-27244.json
index df9eec25c5e..e52177b5497 100644
--- a/2021/27xxx/CVE-2021-27244.json
+++ b/2021/27xxx/CVE-2021-27244.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27244",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Desktop",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "16.0.1-48919"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27244",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Desktop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.1-48919"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Parallels"
                 }
-              }
             ]
-          },
-          "vendor_name": "Parallels"
         }
-      ]
-    }
-  },
-  "credit": "Ezrak1e",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Ezrak1e",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-211/"
-      },
-      {
-        "url": "https://kb.parallels.com/en/125013"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://kb.parallels.com/en/125013",
+                "refsource": "MISC",
+                "name": "https://kb.parallels.com/en/125013"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-211/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-211/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27245.json b/2021/27xxx/CVE-2021-27245.json
index 7f80d4ca6d2..d6d8d8aa7df 100644
--- a/2021/27xxx/CVE-2021-27245.json
+++ b/2021/27xxx/CVE-2021-27245.json
@@ -1,67 +1,69 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27245",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "Archer A7",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27245",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Archer A7",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "TP-Link"
                 }
-              }
             ]
-          },
-          "vendor_name": "TP-Link"
         }
-      ]
-    }
-  },
-  "credit": "Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-12309."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-693: Protection Mechanism Failure"
-          }
+    },
+    "credit": "Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-12309."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-214/"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-693: Protection Mechanism Failure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-214/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-214/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file

From cb91715a778eddaf20440100581d651de831b845 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Mon, 29 Mar 2021 23:00:39 +0000
Subject: [PATCH 717/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29423.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29423.json

diff --git a/2021/29xxx/CVE-2021-29423.json b/2021/29xxx/CVE-2021-29423.json
new file mode 100644
index 00000000000..75cd5eef14c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29423.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29423",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 5cfe1ceb2fda0a9166c42d26175b0cb5dadec43a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 00:00:38 +0000
Subject: [PATCH 718/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27918.json |  5 +++
 2021/25xxx/CVE-2021-25145.json | 65 ++++++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25148.json | 59 ++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25149.json | 62 ++++++++++++++++++++++++++++++--
 2021/27xxx/CVE-2021-27291.json |  5 +++
 2021/28xxx/CVE-2021-28957.json |  5 +++
 2021/29xxx/CVE-2021-29424.json | 18 ++++++++++
 7 files changed, 210 insertions(+), 9 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29424.json

diff --git a/2020/27xxx/CVE-2020-27918.json b/2020/27xxx/CVE-2020-27918.json
index 408570141c6..d162a6466a9 100644
--- a/2020/27xxx/CVE-2020-27918.json
+++ b/2020/27xxx/CVE-2020-27918.json
@@ -171,6 +171,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-8070916f7a",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW/"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4877",
+                "url": "https://www.debian.org/security/2021/dsa-4877"
             }
         ]
     },
diff --git a/2021/25xxx/CVE-2021-25145.json b/2021/25xxx/CVE-2021-25145.json
index 730abe2a8c5..59dd937883b 100644
--- a/2021/25xxx/CVE-2021-25145.json
+++ b/2021/25xxx/CVE-2021-25145.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25145",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.10 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.5 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.0.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote unauthorized disclosure of information"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote unauthorized disclosure of information vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25148.json b/2021/25xxx/CVE-2021-25148.json
index 69eb055b167..65f906c21f1 100644
--- a/2021/25xxx/CVE-2021-25148.json
+++ b/2021/25xxx/CVE-2021-25148.json
@@ -4,14 +4,67 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25148",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.13 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.10 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.4 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary file modification"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25149.json b/2021/25xxx/CVE-2021-25149.json
index 3d22fc94987..836731830a3 100644
--- a/2021/25xxx/CVE-2021-25149.json
+++ b/2021/25xxx/CVE-2021-25149.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25149",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.16 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.12 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.2 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote buffer overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.6 and below; Aruba Instant 8.6.x: 8.6.0.2 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27291.json b/2021/27xxx/CVE-2021-27291.json
index 1726a3a43df..f0217cf1bc4 100644
--- a/2021/27xxx/CVE-2021-27291.json
+++ b/2021/27xxx/CVE-2021-27291.json
@@ -66,6 +66,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4878",
+                "url": "https://www.debian.org/security/2021/dsa-4878"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28957.json b/2021/28xxx/CVE-2021-28957.json
index 0560c896f8c..2ff74107fcb 100644
--- a/2021/28xxx/CVE-2021-28957.json
+++ b/2021/28xxx/CVE-2021-28957.json
@@ -71,6 +71,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999",
                 "url": "https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4880",
+                "url": "https://www.debian.org/security/2021/dsa-4880"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29424.json b/2021/29xxx/CVE-2021-29424.json
new file mode 100644
index 00000000000..ed80850ec95
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29424.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29424",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 6c9ceb2ca64d42bbd0f0abf93fc1db3aeec51996 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 01:00:39 +0000
Subject: [PATCH 719/845] "-Synchronized-Data."

---
 2021/25xxx/CVE-2021-25146.json | 62 ++++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25150.json | 59 ++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25155.json | 65 ++++++++++++++++++++++++++++++++--
 3 files changed, 177 insertions(+), 9 deletions(-)

diff --git a/2021/25xxx/CVE-2021-25146.json b/2021/25xxx/CVE-2021-25146.json
index 5333570c357..4affd429ba4 100644
--- a/2021/25xxx/CVE-2021-25146.json
+++ b/2021/25xxx/CVE-2021-25146.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25146",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.13 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.10 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.5 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.0.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote execution of arbitrary commands"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25150.json b/2021/25xxx/CVE-2021-25150.json
index 75a5cb89d8c..285b4fc7129 100644
--- a/2021/25xxx/CVE-2021-25150.json
+++ b/2021/25xxx/CVE-2021-25150.json
@@ -4,14 +4,67 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25150",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.13 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.10 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.4 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote execution of arbitrary commands"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25155.json b/2021/25xxx/CVE-2021-25155.json
index 776ab13841a..447f58bdb88 100644
--- a/2021/25xxx/CVE-2021-25155.json
+++ b/2021/25xxx/CVE-2021-25155.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25155",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary file modification"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.6 and below; Aruba Instant 8.7.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }

From 3e737218d22862b9046a7ffaed17d3ce05647115 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 02:00:38 +0000
Subject: [PATCH 720/845] "-Synchronized-Data."

---
 2018/1xxx/CVE-2018-1107.json   | 63 ++++++++++++++++++++++++++----
 2018/1xxx/CVE-2018-1109.json   | 63 ++++++++++++++++++++++++++----
 2018/1xxx/CVE-2018-1110.json   | 63 ++++++++++++++++++++++++++----
 2019/19xxx/CVE-2019-19785.json |  5 +++
 2019/19xxx/CVE-2019-19786.json |  5 +++
 2019/19xxx/CVE-2019-19787.json |  5 +++
 2019/5xxx/CVE-2019-5319.json   | 70 ++++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20271.json |  5 +++
 2021/25xxx/CVE-2021-25156.json | 65 +++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25157.json | 65 +++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25158.json | 62 ++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25159.json | 65 +++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25160.json | 65 +++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25161.json | 65 +++++++++++++++++++++++++++++--
 2021/25xxx/CVE-2021-25162.json | 65 +++++++++++++++++++++++++++++--
 15 files changed, 682 insertions(+), 49 deletions(-)

diff --git a/2018/1xxx/CVE-2018-1107.json b/2018/1xxx/CVE-2018-1107.json
index d186f2bc270..5b48ab761ed 100644
--- a/2018/1xxx/CVE-2018-1107.json
+++ b/2018/1xxx/CVE-2018-1107.json
@@ -1,17 +1,66 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2018-1107",
-        "STATE": "RESERVED"
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2018-1107",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "nodejs-is-my-json-valid",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "is-myjson-valid 2.17.2, is-myjson-valid 1.4.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1546357",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546357"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://snyk.io/vuln/npm:is-my-json-valid:20180214",
+                "url": "https://snyk.io/vuln/npm:is-my-json-valid:20180214"
+            }
+        ]
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated."
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1109.json b/2018/1xxx/CVE-2018-1109.json
index 819db8e8f3b..10170270cc0 100644
--- a/2018/1xxx/CVE-2018-1109.json
+++ b/2018/1xxx/CVE-2018-1109.json
@@ -1,17 +1,66 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2018-1109",
-        "STATE": "RESERVED"
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2018-1109",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "nodejs-braces",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "braces 2.3.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-185->CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1547272",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547272"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://snyk.io/vuln/npm:braces:20180219",
+                "url": "https://snyk.io/vuln/npm:braces:20180219"
+            }
+        ]
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks."
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1110.json b/2018/1xxx/CVE-2018-1110.json
index 95aeb4927cd..5c32fb9578b 100644
--- a/2018/1xxx/CVE-2018-1110.json
+++ b/2018/1xxx/CVE-2018-1110.json
@@ -1,17 +1,66 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2018-1110",
-        "STATE": "RESERVED"
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2018-1110",
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "knot-resolver",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Knot Resolver 2.3.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1944328",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944328"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.knot-resolver.cz/2018-04-23-knot-resolver-2.3.0.html",
+                "url": "https://www.knot-resolver.cz/2018-04-23-knot-resolver-2.3.0.html"
+            }
+        ]
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service."
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19785.json b/2019/19xxx/CVE-2019-19785.json
index 142d9cb042d..ea2a4da242b 100644
--- a/2019/19xxx/CVE-2019-19785.json
+++ b/2019/19xxx/CVE-2019-19785.json
@@ -56,6 +56,11 @@
                 "url": "https://sourceforge.net/p/atasm/bugs/8/",
                 "refsource": "MISC",
                 "name": "https://sourceforge.net/p/atasm/bugs/8/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-681b6ea532",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJYUV3PKSIGBZGJ6PXAGTT2LW6HLPMS/"
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19786.json b/2019/19xxx/CVE-2019-19786.json
index 38c75cf73c7..cfb9a742379 100644
--- a/2019/19xxx/CVE-2019-19786.json
+++ b/2019/19xxx/CVE-2019-19786.json
@@ -56,6 +56,11 @@
                 "url": "https://sourceforge.net/p/atasm/bugs/9/",
                 "refsource": "MISC",
                 "name": "https://sourceforge.net/p/atasm/bugs/9/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-681b6ea532",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJYUV3PKSIGBZGJ6PXAGTT2LW6HLPMS/"
             }
         ]
     }
diff --git a/2019/19xxx/CVE-2019-19787.json b/2019/19xxx/CVE-2019-19787.json
index 0f1f40535c1..e68b9e77192 100644
--- a/2019/19xxx/CVE-2019-19787.json
+++ b/2019/19xxx/CVE-2019-19787.json
@@ -56,6 +56,11 @@
                 "url": "https://sourceforge.net/p/atasm/bugs/10/",
                 "refsource": "MISC",
                 "name": "https://sourceforge.net/p/atasm/bugs/10/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-681b6ea532",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJYUV3PKSIGBZGJ6PXAGTT2LW6HLPMS/"
             }
         ]
     }
diff --git a/2019/5xxx/CVE-2019-5319.json b/2019/5xxx/CVE-2019-5319.json
index b260a1af03d..8cd42e65559 100644
--- a/2019/5xxx/CVE-2019-5319.json
+++ b/2019/5xxx/CVE-2019-5319.json
@@ -1,17 +1,73 @@
 {
-    "CVE_data_meta": {
-        "ASSIGNER": "cve@mitre.org",
-        "ID": "CVE-2019-5319",
-        "STATE": "RESERVED"
-    },
-    "data_format": "MITRE",
     "data_type": "CVE",
+    "data_format": "MITRE",
     "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2019-5319",
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.16 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.12 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.2 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote buffer overflow"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
+    },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.6 and below; Aruba Instant 8.6.x: 8.6.0.2 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20271.json b/2021/20xxx/CVE-2021-20271.json
index dcdab06f601..6d7d9df2572 100644
--- a/2021/20xxx/CVE-2021-20271.json
+++ b/2021/20xxx/CVE-2021-20271.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21",
                 "url": "https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2383d950fd",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
             }
         ]
     },
diff --git a/2021/25xxx/CVE-2021-25156.json b/2021/25xxx/CVE-2021-25156.json
index 2bb5b4345fb..79a04d9837e 100644
--- a/2021/25xxx/CVE-2021-25156.json
+++ b/2021/25xxx/CVE-2021-25156.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25156",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary directory create"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary directory create vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.6 and below; Aruba Instant 8.7.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25157.json b/2021/25xxx/CVE-2021-25157.json
index 5ca5eecb3e9..08686837013 100644
--- a/2021/25xxx/CVE-2021-25157.json
+++ b/2021/25xxx/CVE-2021-25157.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25157",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.6 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.0 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary file read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.6 and below; Aruba Instant 8.7.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25158.json b/2021/25xxx/CVE-2021-25158.json
index bb7ce7ed052..34833a30177 100644
--- a/2021/25xxx/CVE-2021-25158.json
+++ b/2021/25xxx/CVE-2021-25158.json
@@ -4,14 +4,70 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25158",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.7 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.1 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary file read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25159.json b/2021/25xxx/CVE-2021-25159.json
index 56a7bc3139f..b4a0dd5f5f9 100644
--- a/2021/25xxx/CVE-2021-25159.json
+++ b/2021/25xxx/CVE-2021-25159.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25159",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.7 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.1 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary file modification"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25160.json b/2021/25xxx/CVE-2021-25160.json
index 926eecd0ae1..6cbbec39d3f 100644
--- a/2021/25xxx/CVE-2021-25160.json
+++ b/2021/25xxx/CVE-2021-25160.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25160",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.7 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.1 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote arbitrary file modification"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25161.json b/2021/25xxx/CVE-2021-25161.json
index 64e34fe67e4..535482e3e10 100644
--- a/2021/25xxx/CVE-2021-25161.json
+++ b/2021/25xxx/CVE-2021-25161.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25161",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.7 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.1 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote cross-site scripting (xss)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote cross-site scripting (xss) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25162.json b/2021/25xxx/CVE-2021-25162.json
index 7437a6df035..543e83ab966 100644
--- a/2021/25xxx/CVE-2021-25162.json
+++ b/2021/25xxx/CVE-2021-25162.json
@@ -4,14 +4,73 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25162",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Aruba Instant Access Points",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.6.x: 8.6.0.7 and below"
+                                        },
+                                        {
+                                            "version_value": "Aruba Instant 8.7.x: 8.7.1.1 and below"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote execution of arbitrary commands"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
+                "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
             }
         ]
     }

From c690107dd0e45a08cfa0620d2cb2eca975d76777 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 03:00:38 +0000
Subject: [PATCH 721/845] "-Synchronized-Data."

---
 2020/19xxx/CVE-2020-19639.json | 56 +++++++++++++++++++++++++++----
 2020/19xxx/CVE-2020-19640.json | 56 +++++++++++++++++++++++++++----
 2020/19xxx/CVE-2020-19641.json | 56 +++++++++++++++++++++++++++----
 2020/19xxx/CVE-2020-19642.json | 56 +++++++++++++++++++++++++++----
 2020/19xxx/CVE-2020-19643.json | 56 +++++++++++++++++++++++++++----
 2020/20xxx/CVE-2020-20545.json | 61 ++++++++++++++++++++++++++++++----
 6 files changed, 305 insertions(+), 36 deletions(-)

diff --git a/2020/19xxx/CVE-2020-19639.json b/2020/19xxx/CVE-2020-19639.json
index ca293a0e1e8..9e88893620c 100644
--- a/2020/19xxx/CVE-2020-19639.json
+++ b/2020/19xxx/CVE-2020-19639.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19639",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19639",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Request Forgery (CSRF) vulnerability in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B, via all fields to WebUI."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://xn--sb-lka.org/cve/INSMA.txt",
+                "refsource": "MISC",
+                "name": "https://xn--sb-lka.org/cve/INSMA.txt"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19640.json b/2020/19xxx/CVE-2020-19640.json
index e5ab7449fbf..87dd5f17687 100644
--- a/2020/19xxx/CVE-2020-19640.json
+++ b/2020/19xxx/CVE-2020-19640.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19640",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19640",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. An unauthenticated attacker can reboot the device causing a Denial of Service, via a hidden reboot command to '/media/?action=cmd'."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://xn--sb-lka.org/cve/INSMA.txt",
+                "refsource": "MISC",
+                "name": "https://xn--sb-lka.org/cve/INSMA.txt"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19641.json b/2020/19xxx/CVE-2020-19641.json
index 0a563839a5e..22ba064d345 100644
--- a/2020/19xxx/CVE-2020-19641.json
+++ b/2020/19xxx/CVE-2020-19641.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19641",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19641",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. Authenticated attackers with the \"Operator\" Privilege can gain admin privileges via a crafted request to '/goform/formUserMng'."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://xn--sb-lka.org/cve/INSMA.txt",
+                "refsource": "MISC",
+                "name": "https://xn--sb-lka.org/cve/INSMA.txt"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19642.json b/2020/19xxx/CVE-2020-19642.json
index ee4f009ec5f..dd04e791dd6 100644
--- a/2020/19xxx/CVE-2020-19642.json
+++ b/2020/19xxx/CVE-2020-19642.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19642",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19642",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. A local attacker can execute arbitrary code via editing the 'recdata.db' file to call a specially crafted GoAhead ASP-file on the SD card."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://xn--sb-lka.org/cve/INSMA.txt",
+                "refsource": "MISC",
+                "name": "https://xn--sb-lka.org/cve/INSMA.txt"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19643.json b/2020/19xxx/CVE-2020-19643.json
index 8c654cf64c7..f243ae188f7 100644
--- a/2020/19xxx/CVE-2020-19643.json
+++ b/2020/19xxx/CVE-2020-19643.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19643",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19643",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B via all fields in the FTP settings page to the \"goform/formSetFtpCfg\" settings page."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://xn--sb-lka.org/cve/INSMA.txt",
+                "refsource": "MISC",
+                "name": "https://xn--sb-lka.org/cve/INSMA.txt"
             }
         ]
     }
diff --git a/2020/20xxx/CVE-2020-20545.json b/2020/20xxx/CVE-2020-20545.json
index de376356742..e937035c2d8 100644
--- a/2020/20xxx/CVE-2020-20545.json
+++ b/2020/20xxx/CVE-2020-20545.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-20545",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-20545",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross-Site Scripting (XSS) vulnerability in Zhiyuan G6 Government Collaboration System V6.1SP1, via the 'method' parameter to 'seeyon/hrSalary.do'."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "http://note.youdao.com/noteshare?id=51d8946722c0304b5bfd72da03eaf013&sub=BDBAD6EDD2C941C18AB57141313AB5FE",
+                "refsource": "MISC",
+                "name": "http://note.youdao.com/noteshare?id=51d8946722c0304b5bfd72da03eaf013&sub=BDBAD6EDD2C941C18AB57141313AB5FE"
+            },
+            {
+                "url": "http://note.youdao.com/noteshare?id=29f908204968a79233c1c0c80a59f8ff&sub=AFA8E81AA31C4482974869C5DFE07033",
+                "refsource": "MISC",
+                "name": "http://note.youdao.com/noteshare?id=29f908204968a79233c1c0c80a59f8ff&sub=AFA8E81AA31C4482974869C5DFE07033"
             }
         ]
     }

From b8a5470a435dbd2a845e7d54d592da9a00f38eea Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 04:00:37 +0000
Subject: [PATCH 722/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21290.json | 5 +++++
 2021/21xxx/CVE-2021-21295.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json
index 49c31f9dc3c..feb39ddc4b9 100644
--- a/2021/21xxx/CVE-2021-21290.json
+++ b/2021/21xxx/CVE-2021-21290.json
@@ -186,6 +186,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final",
                 "url": "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] merlimat closed issue #10071: CVE-2021-21295 & CVE-2021-21290",
+                "url": "https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index a977b595779..2f936d07473 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -123,6 +123,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final",
                 "url": "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] merlimat closed issue #10071: CVE-2021-21295 & CVE-2021-21290",
+                "url": "https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E"
             }
         ]
     },

From 2dd306e022c42b14ad69a3006d845cd31f774349 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 07:00:37 +0000
Subject: [PATCH 723/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29376.json | 61 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29418.json | 61 ++++++++++++++++++++++++++++++----
 2 files changed, 110 insertions(+), 12 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29376.json b/2021/29xxx/CVE-2021-29376.json
index 417f079b225..be9e0fbfb2d 100644
--- a/2021/29xxx/CVE-2021-29376.json
+++ b/2021/29xxx/CVE-2021-29376.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29376",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29376",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "ircII before 20210314 allows remote attackers to cause a denial of service (segmentation fault and client crash, disconnecting the victim from an IRC server) via a crafted CTCP UTC message."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/24/2",
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/24/2"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://www.eterna.com.au/ircii/",
+                "url": "http://www.eterna.com.au/ircii/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29418.json b/2021/29xxx/CVE-2021-29418.json
index 8f0873b0442..c910a2d3a84 100644
--- a/2021/29xxx/CVE-2021-29418.json
+++ b/2021/29xxx/CVE-2021-29418.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29418",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29418",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4",
+                "refsource": "MISC",
+                "name": "https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/6.txt",
+                "url": "https://vuln.ryotak.me/advisories/6.txt"
             }
         ]
     }

From bed9c89f23c8542943cd0a23d8ffa3873972d1d7 Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Tue, 30 Mar 2021 08:49:13 +0100
Subject: [PATCH 724/845] Add CVE-2021-26919

---
 2021/26xxx/CVE-2021-26919.json | 81 ++++++++++++++++++++++++++++++----
 1 file changed, 73 insertions(+), 8 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26919.json b/2021/26xxx/CVE-2021-26919.json
index 127fd6c24f2..a58b98b4ddc 100644
--- a/2021/26xxx/CVE-2021-26919.json
+++ b/2021/26xxx/CVE-2021-26919.json
@@ -1,18 +1,83 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-26919",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Apache Druid Authenticated users can execute arbitrary code from malicious MySQL database systems."
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache Druid",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_name": "Apache Druid",
+                                            "version_value": "0.20.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "This issue was discovered by fantasyC4t from the Ant FG Security Lab."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes.  This issue was addressed in Apache Druid 0.20.2"
             }
         ]
-    }
-}
\ No newline at end of file
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Remote code execution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
+    },
+    "work_around": [
+        {
+            "lang": "eng",
+            "value": "Users should upgrade to Druid 0.20.2 and enable new Druid configurations to mitigate vulnerable MySQL JDBC properties.\nWhenever possible, network access to cluster machines should be restricted to trusted hosts only.\nEnsure that users have the minimum set of Druid permissions necessary, and are not granted access to functionality that they do not require."
+        }
+    ]
+}

From 092b5dbf6eb6eeb1b3828e7cc888067793877b18 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 08:00:40 +0000
Subject: [PATCH 725/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26919.json | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26919.json b/2021/26xxx/CVE-2021-26919.json
index a58b98b4ddc..20213c15a80 100644
--- a/2021/26xxx/CVE-2021-26919.json
+++ b/2021/26xxx/CVE-2021-26919.json
@@ -43,7 +43,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes.  This issue was addressed in Apache Druid 0.20.2"
+                "value": "Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2"
             }
         ]
     },
@@ -66,8 +66,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E"
+                "refsource": "MISC",
+                "url": "https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E",
+                "name": "https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E"
             }
         ]
     },
@@ -80,4 +81,4 @@
             "value": "Users should upgrade to Druid 0.20.2 and enable new Druid configurations to mitigate vulnerable MySQL JDBC properties.\nWhenever possible, network access to cluster machines should be restricted to trusted hosts only.\nEnsure that users have the minimum set of Druid permissions necessary, and are not granted access to functionality that they do not require."
         }
     ]
-}
+}
\ No newline at end of file

From e548b5a336882d5fb2d119540afa63cde2505c36 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 10:00:38 +0000
Subject: [PATCH 726/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29425.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29425.json

diff --git a/2021/29xxx/CVE-2021-29425.json b/2021/29xxx/CVE-2021-29425.json
new file mode 100644
index 00000000000..a25e287671f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29425.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29425",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 198ed9eb408bc1fc54f136560fb8cc2e3461acc3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 11:00:38 +0000
Subject: [PATCH 727/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21290.json | 5 +++++
 2021/21xxx/CVE-2021-21295.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json
index feb39ddc4b9..2166849d1a8 100644
--- a/2021/21xxx/CVE-2021-21290.json
+++ b/2021/21xxx/CVE-2021-21290.json
@@ -191,6 +191,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] merlimat closed issue #10071: CVE-2021-21295 & CVE-2021-21290",
                 "url": "https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[bookkeeper-issues] 20210330 [GitHub] [bookkeeper] eolivelli opened a new issue #2669: Update Netty to 4.1.60.final",
+                "url": "https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 2f936d07473..97829cbce01 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -128,6 +128,11 @@
                 "refsource": "MLIST",
                 "name": "[pulsar-commits] 20210329 [GitHub] [pulsar] merlimat closed issue #10071: CVE-2021-21295 & CVE-2021-21290",
                 "url": "https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[bookkeeper-issues] 20210330 [GitHub] [bookkeeper] eolivelli opened a new issue #2669: Update Netty to 4.1.60.final",
+                "url": "https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E"
             }
         ]
     },

From 20c7cde78d5dda13a19bff122b7ff383a623cecf Mon Sep 17 00:00:00 2001
From: Daniel Beck 
Date: Tue, 30 Mar 2021 13:04:17 +0200
Subject: [PATCH 728/845] Add CVEs for 2021-03-30 Jenkins security advisory

---
 2021/21xxx/CVE-2021-21628.json | 56 +++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21629.json | 56 +++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21630.json | 56 +++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21631.json | 56 +++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21632.json | 60 ++++++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21633.json | 60 ++++++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21634.json | 56 +++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21635.json | 56 +++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21636.json | 60 ++++++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21637.json | 60 ++++++++++++++++++++++++++++++----
 2021/21xxx/CVE-2021-21638.json | 60 ++++++++++++++++++++++++++++++----
 11 files changed, 570 insertions(+), 66 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21628.json b/2021/21xxx/CVE-2021-21628.json
index 26f2ddabe9c..d63357d774f 100644
--- a/2021/21xxx/CVE-2021-21628.json
+++ b/2021/21xxx/CVE-2021-21628.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21628",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Build With Parameters Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.5",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21629.json b/2021/21xxx/CVE-2021-21629.json
index 93cc2825c41..a50a9461cda 100644
--- a/2021/21xxx/CVE-2021-21629.json
+++ b/2021/21xxx/CVE-2021-21629.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21629",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Build With Parameters Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.5",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-352: Cross-Site Request Forgery (CSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2257",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2257",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21630.json b/2021/21xxx/CVE-2021-21630.json
index ab4efe55583..402b2fb9fc4 100644
--- a/2021/21xxx/CVE-2021-21630.json
+++ b/2021/21xxx/CVE-2021-21630.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21630",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Extra Columns Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.22",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21631.json b/2021/21xxx/CVE-2021-21631.json
index b919210e659..e5b2dff0acd 100644
--- a/2021/21xxx/CVE-2021-21631.json
+++ b/2021/21xxx/CVE-2021-21631.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21631",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Cloud Statistics Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "0.26",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-862: Missing Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2246",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2246",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21632.json b/2021/21xxx/CVE-2021-21632.json
index 623ce0c2443..3a9872420af 100644
--- a/2021/21xxx/CVE-2021-21632.json
+++ b/2021/21xxx/CVE-2021-21632.json
@@ -1,17 +1,65 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21632",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins OWASP Dependency-Track Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.1.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "3.1.0",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-862: Missing Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21633.json b/2021/21xxx/CVE-2021-21633.json
index 59b28eeda90..fbe0743a1a9 100644
--- a/2021/21xxx/CVE-2021-21633.json
+++ b/2021/21xxx/CVE-2021-21633.json
@@ -1,17 +1,65 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21633",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins OWASP Dependency-Track Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.1.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "3.1.0",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-352: Cross-Site Request Forgery (CSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21634.json b/2021/21xxx/CVE-2021-21634.json
index 0a812151b26..eb4c49aba5b 100644
--- a/2021/21xxx/CVE-2021-21634.json
+++ b/2021/21xxx/CVE-2021-21634.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21634",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Jabber (XMPP) notifier and control Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.41",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-256: Unprotected Storage of Credentials"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2162",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2162",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21635.json b/2021/21xxx/CVE-2021-21635.json
index 1ccf45ed85f..1fbc514f192 100644
--- a/2021/21xxx/CVE-2021-21635.json
+++ b/2021/21xxx/CVE-2021-21635.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21635",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins REST List Parameter Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "1.3.0",
+                                            "version_affected": "<="
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2261",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2261",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21636.json b/2021/21xxx/CVE-2021-21636.json
index bcfb6f2c80f..277ed0c1197 100644
--- a/2021/21xxx/CVE-2021-21636.json
+++ b/2021/21xxx/CVE-2021-21636.json
@@ -1,17 +1,65 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21636",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Team Foundation Server Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.157.1",
+                                            "version_affected": "<="
+                                        },
+                                        {
+                                            "version_value": "5.157.1",
+                                            "version_affected": "?>"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-862: Missing Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(1)",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(1)",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21637.json b/2021/21xxx/CVE-2021-21637.json
index 812d83f9edb..0312134d5e4 100644
--- a/2021/21xxx/CVE-2021-21637.json
+++ b/2021/21xxx/CVE-2021-21637.json
@@ -1,17 +1,65 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21637",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Team Foundation Server Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.157.1",
+                                            "version_affected": "<="
+                                        },
+                                        {
+                                            "version_value": "5.157.1",
+                                            "version_affected": "?>"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-862: Missing Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
+                "refsource": "CONFIRM"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21638.json b/2021/21xxx/CVE-2021-21638.json
index e9591c09305..f03cfebfddc 100644
--- a/2021/21xxx/CVE-2021-21638.json
+++ b/2021/21xxx/CVE-2021-21638.json
@@ -1,17 +1,65 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21638",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Jenkins project",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jenkins Team Foundation Server Plugin",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.157.1",
+                                            "version_affected": "<="
+                                        },
+                                        {
+                                            "version_value": "5.157.1",
+                                            "version_affected": "?>"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-352: Cross-Site Request Forgery (CSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
+                "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
+                "refsource": "CONFIRM"
             }
         ]
     }

From 9939a0b4a34f445121832b45f3573bfb7a2fe903 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:00:47 +0000
Subject: [PATCH 729/845] "-Synchronized-Data."

---
 2002/0xxx/CVE-2002-0661.json   | 15 +++++++++++++++
 2002/0xxx/CVE-2002-0840.json   | 20 ++++++++++++++++++++
 2002/1xxx/CVE-2002-1156.json   | 15 +++++++++++++++
 2002/1xxx/CVE-2002-1592.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0134.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0189.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0192.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0245.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0254.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0789.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0748.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0751.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0786.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0809.json   | 25 +++++++++++++++++++++++++
 2005/2xxx/CVE-2005-2088.json   | 25 +++++++++++++++++++++++++
 2005/2xxx/CVE-2005-2491.json   | 25 +++++++++++++++++++++++++
 2005/2xxx/CVE-2005-2728.json   | 20 ++++++++++++++++++++
 2005/2xxx/CVE-2005-2970.json   | 20 ++++++++++++++++++++
 2005/3xxx/CVE-2005-3357.json   | 20 ++++++++++++++++++++
 2006/3xxx/CVE-2006-3747.json   | 25 +++++++++++++++++++++++++
 2006/3xxx/CVE-2006-3918.json   | 15 +++++++++++++++
 2007/1xxx/CVE-2007-1862.json   | 15 +++++++++++++++
 2007/3xxx/CVE-2007-3304.json   | 30 ++++++++++++++++++++++++++++++
 2007/3xxx/CVE-2007-3847.json   | 25 +++++++++++++++++++++++++
 2008/0xxx/CVE-2008-0005.json   | 30 ++++++++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3094.json   | 30 ++++++++++++++++++++++++++++++
 2010/0xxx/CVE-2010-0425.json   | 30 ++++++++++++++++++++++++++++++
 2010/1xxx/CVE-2010-1452.json   | 25 +++++++++++++++++++++++++
 2010/1xxx/CVE-2010-1623.json   | 25 +++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3192.json   | 25 +++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3368.json   | 30 ++++++++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3607.json   | 25 +++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0031.json   | 25 +++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0053.json   | 25 +++++++++++++++++++++++++
 2013/1xxx/CVE-2013-1862.json   | 25 +++++++++++++++++++++++++
 2013/6xxx/CVE-2013-6438.json   | 20 ++++++++++++++++++++
 2014/0xxx/CVE-2014-0098.json   | 20 ++++++++++++++++++++
 2014/0xxx/CVE-2014-0117.json   | 15 +++++++++++++++
 2014/3xxx/CVE-2014-3583.json   | 15 +++++++++++++++
 2014/8xxx/CVE-2014-8109.json   | 15 +++++++++++++++
 2015/3xxx/CVE-2015-3185.json   | 15 +++++++++++++++
 2016/4xxx/CVE-2016-4979.json   | 10 ++++++++++
 2016/8xxx/CVE-2016-8743.json   | 15 +++++++++++++++
 2017/15xxx/CVE-2017-15710.json | 15 +++++++++++++++
 2017/3xxx/CVE-2017-3169.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7668.json   | 15 +++++++++++++++
 2017/9xxx/CVE-2017-9798.json   | 15 +++++++++++++++
 2018/11xxx/CVE-2018-11763.json | 15 +++++++++++++++
 2018/17xxx/CVE-2018-17189.json | 15 +++++++++++++++
 2018/17xxx/CVE-2018-17199.json | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1283.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1301.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1302.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1303.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1312.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1333.json   | 10 ++++++++++
 2018/8xxx/CVE-2018-8011.json   | 15 +++++++++++++++
 2019/0xxx/CVE-2019-0190.json   | 10 ++++++++++
 2019/0xxx/CVE-2019-0196.json   | 15 +++++++++++++++
 2019/0xxx/CVE-2019-0197.json   | 15 +++++++++++++++
 2019/0xxx/CVE-2019-0211.json   | 10 ++++++++++
 2019/0xxx/CVE-2019-0215.json   | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10081.json | 10 ++++++++++
 2019/10xxx/CVE-2019-10082.json | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10092.json | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10097.json | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10098.json | 15 +++++++++++++++
 2020/11xxx/CVE-2020-11984.json | 10 ++++++++++
 2020/1xxx/CVE-2020-1927.json   | 20 ++++++++++++++++++++
 2020/1xxx/CVE-2020-1934.json   | 20 ++++++++++++++++++++
 2021/21xxx/CVE-2021-21628.json |  3 ++-
 2021/21xxx/CVE-2021-21629.json |  3 ++-
 2021/21xxx/CVE-2021-21630.json |  3 ++-
 2021/21xxx/CVE-2021-21631.json |  3 ++-
 2021/21xxx/CVE-2021-21632.json |  3 ++-
 2021/21xxx/CVE-2021-21633.json |  3 ++-
 2021/21xxx/CVE-2021-21634.json |  3 ++-
 2021/21xxx/CVE-2021-21635.json |  3 ++-
 2021/21xxx/CVE-2021-21636.json |  3 ++-
 2021/21xxx/CVE-2021-21637.json |  3 ++-
 2021/21xxx/CVE-2021-21638.json |  3 ++-
 2021/29xxx/CVE-2021-29098.json | 12 +++++++++++-
 82 files changed, 1373 insertions(+), 12 deletions(-)

diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index a3727fedc5f..04115e25a84 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -96,6 +96,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 3f03a3832be..62511b95ca8 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -191,6 +191,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index c4640179bc3..07929d2eb61 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -101,6 +101,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index c90b5933340..2227830478c 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -91,6 +91,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index a2f9bff1ac2..5c2ae226e0f 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -86,6 +86,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 725ac175038..1f83050a43e 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -111,6 +111,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index 8baefa91a42..7281a90c38d 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -106,6 +106,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 8c33b5182e4..4319ed12410 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -121,6 +121,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 07e8cb7023c..50243803d64 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -91,6 +91,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index 1972d8b450e..dbf9cbfac82 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -141,6 +141,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index 035c2a52906..9363d444e20 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -111,6 +111,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index 398c12cf64b..fa491c94aa2 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -116,6 +116,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index af83f88f608..cecf6e0039d 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -111,6 +111,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index 5b9ff4e3063..c5cda0a063c 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -111,6 +111,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index 669665e43b5..21391773b2d 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -316,6 +316,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index f2f86c75cfc..c69a559594b 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -361,6 +361,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 81c3e0ece38..24855d639c3 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -276,6 +276,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 9919d67f5ce..01e9f12aebd 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -151,6 +151,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index 9fafa36fde1..327ad87353e 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -341,6 +341,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index d45526eda02..d5aaef6767a 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -476,6 +476,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index 8a122a7e12e..ab109489f85 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -301,6 +301,21 @@
                 "name": "22140",
                 "refsource": "SECUNIA",
                 "url": "http://secunia.com/advisories/22140"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index 46c04bce071..968e5a9796a 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -151,6 +151,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 46ceb460134..93fe56dfc7a 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -441,6 +441,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index 597e85b1b9c..9ee32ed72f7 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -396,6 +396,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 27ccba7fb61..384573eafca 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -316,6 +316,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index de1d5374d18..99407c04909 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -201,6 +201,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 0c1afe3abad..4b67b96952c 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -196,6 +196,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index e34109b2c46..09f59674257 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -206,6 +206,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index c5afde0456c..546ac3c92b7 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -281,6 +281,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 328f48aa2d7..57da8b5e3ac 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -381,6 +381,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index e5b18e48ea0..a056d7ae11d 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -266,6 +266,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index d704b7e6463..ef635fccd80 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -241,6 +241,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index 5efc5d75796..3003f1367fe 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -216,6 +216,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index 58114cda117..76cdaee34bb 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -231,6 +231,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 28dc798ef56..52f913861bf 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -211,6 +211,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index c9674127823..85cd345d50a 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -246,6 +246,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 4b03826ecb3..e8efe7ea9c8 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -261,6 +261,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index 95fa6bee56c..2646e7fc6c8 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -131,6 +131,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index 24f51efa3d6..9f0221a427e 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index 612ede4ff8c..d6d5cb41f60 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 6edea9da50a..1ea08a0845d 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -176,6 +176,21 @@
                 "refsource": "CONFIRM",
                 "name": "https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73",
                 "url": "https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index a90eb7c90c1..c2deb56b367 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index b719a08a0ad..e5b28f5c4b3 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -172,6 +172,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 2e48da46af0..51b91c5400c 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -153,6 +153,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index f90a8240896..8d062999afe 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -199,6 +199,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index b40d018e29c..998a21ca2e7 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -169,6 +169,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 83c74603381..2f3c4d1850e 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -276,6 +276,21 @@
                 "refsource": "MISC",
                 "name": "https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a",
                 "url": "https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 747d0d772ae..174143c7dbe 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -142,6 +142,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 4c1f4f37f7b..48d85fa09c2 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -162,6 +162,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index e94a8356749..af815922275 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -152,6 +152,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index a7a0d55d78f..4a531b1f307 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -137,6 +137,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index 1bab9d5ba1d..6eec31b351b 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -147,6 +147,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 3cffc8c88f7..18ee245c707 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -122,6 +122,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index 5bf00132f2d..1b939740d78 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -137,6 +137,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 2f7d15695a0..17ec5bb0b55 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -152,6 +152,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index f064d635e25..a801cf06c2f 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 584b920ea39..81287146f38 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -101,6 +101,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 387b2d2a576..633de2f2768 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -102,6 +102,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index 3ac5cd9d984..5d1ff963c56 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -183,6 +183,21 @@
                 "url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 90551238c07..2faa53d35c1 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -153,6 +153,21 @@
                 "url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 75f3aa44706..042257e4ba2 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -258,6 +258,16 @@
                 "url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 135a164af2e..84f85c88a7e 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -151,6 +151,21 @@
                 "url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 6fe778619d8..2d6efe1bcb9 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -108,6 +108,16 @@
                 "refsource": "CONFIRM",
                 "name": "https://support.f5.com/csp/article/K84341091?utm_source=f5support&utm_medium=RSS",
                 "url": "https://support.f5.com/csp/article/K84341091?utm_source=f5support&utm_medium=RSS"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index a1265185cd9..ac6403611d2 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -73,6 +73,21 @@
                 "refsource": "MISC",
                 "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
                 "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 25d172a280e..2305431dc22 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -173,6 +173,21 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20200808 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow",
                 "url": "http://www.openwall.com/lists/oss-security/2020/08/08/9"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index 31bf0bc267e..b22c1a1b27b 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -83,6 +83,21 @@
                 "url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index eb0ced48b45..050b3ddfd1f 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -83,6 +83,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200420 svn commit: r1876764 - /httpd/httpd/branches/2.4.x/CHANGES",
                 "url": "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 750f47073b8..55e663b26bd 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -148,6 +148,16 @@
                 "url": "https://www.oracle.com/security-alerts/cpujan2021.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpujan2021.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index d7813a48a28..7e150a98a98 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -113,6 +113,26 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2020-0d3d3f5072",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 45f5af411a4..17df50a3f1f 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -98,6 +98,26 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2020-0d3d3f5072",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21628.json b/2021/21xxx/CVE-2021-21628.json
index d63357d774f..048f5a9abbe 100644
--- a/2021/21xxx/CVE-2021-21628.json
+++ b/2021/21xxx/CVE-2021-21628.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21628",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21629.json b/2021/21xxx/CVE-2021-21629.json
index a50a9461cda..e516db96ff5 100644
--- a/2021/21xxx/CVE-2021-21629.json
+++ b/2021/21xxx/CVE-2021-21629.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21629",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21630.json b/2021/21xxx/CVE-2021-21630.json
index 402b2fb9fc4..7377a4117cc 100644
--- a/2021/21xxx/CVE-2021-21630.json
+++ b/2021/21xxx/CVE-2021-21630.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21630",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21631.json b/2021/21xxx/CVE-2021-21631.json
index e5b2dff0acd..a41271faeec 100644
--- a/2021/21xxx/CVE-2021-21631.json
+++ b/2021/21xxx/CVE-2021-21631.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21631",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21632.json b/2021/21xxx/CVE-2021-21632.json
index 3a9872420af..f21ef5ae06b 100644
--- a/2021/21xxx/CVE-2021-21632.json
+++ b/2021/21xxx/CVE-2021-21632.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21632",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21633.json b/2021/21xxx/CVE-2021-21633.json
index fbe0743a1a9..b981d1cdb39 100644
--- a/2021/21xxx/CVE-2021-21633.json
+++ b/2021/21xxx/CVE-2021-21633.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21633",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21634.json b/2021/21xxx/CVE-2021-21634.json
index eb4c49aba5b..04aff293357 100644
--- a/2021/21xxx/CVE-2021-21634.json
+++ b/2021/21xxx/CVE-2021-21634.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21634",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21635.json b/2021/21xxx/CVE-2021-21635.json
index 1fbc514f192..6e988228ea0 100644
--- a/2021/21xxx/CVE-2021-21635.json
+++ b/2021/21xxx/CVE-2021-21635.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21635",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21636.json b/2021/21xxx/CVE-2021-21636.json
index 277ed0c1197..5b51bdde299 100644
--- a/2021/21xxx/CVE-2021-21636.json
+++ b/2021/21xxx/CVE-2021-21636.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21636",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21637.json b/2021/21xxx/CVE-2021-21637.json
index 0312134d5e4..b218da98727 100644
--- a/2021/21xxx/CVE-2021-21637.json
+++ b/2021/21xxx/CVE-2021-21637.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21637",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/21xxx/CVE-2021-21638.json b/2021/21xxx/CVE-2021-21638.json
index f03cfebfddc..c122a9c289d 100644
--- a/2021/21xxx/CVE-2021-21638.json
+++ b/2021/21xxx/CVE-2021-21638.json
@@ -1,7 +1,8 @@
 {
     "CVE_data_meta": {
         "ID": "CVE-2021-21638",
-        "ASSIGNER": "jenkinsci-cert@googlegroups.com"
+        "ASSIGNER": "jenkinsci-cert@googlegroups.com",
+        "STATE": "PUBLIC"
     },
     "affects": {
         "vendor": {
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 09806196082..7a7c7c6d28c 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -156,10 +156,20 @@
                 "name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
                 "refsource": "CONFIRM",
                 "url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
             }
         ]
     },
     "source": {
         "discovery": "EXTERNAL"
     }
-}
+}
\ No newline at end of file

From 4d18bc028b5279c208df50643a3c4971d11947fd Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:01:04 +0000
Subject: [PATCH 730/845] "-Synchronized-Data."

---
 2002/0xxx/CVE-2002-0392.json   | 20 ++++++++++++++++++++
 2002/0xxx/CVE-2002-0654.json   | 15 +++++++++++++++
 2002/1xxx/CVE-2002-1593.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0016.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0020.json   | 30 ++++++++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0132.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0253.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0542.json   | 30 ++++++++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0113.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0174.json   | 30 ++++++++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0488.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0493.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0747.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0811.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0885.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0942.json   | 25 +++++++++++++++++++++++++
 2004/1xxx/CVE-2004-1834.json   | 25 +++++++++++++++++++++++++
 2005/1xxx/CVE-2005-1268.json   | 25 +++++++++++++++++++++++++
 2005/3xxx/CVE-2005-3352.json   | 25 +++++++++++++++++++++++++
 2006/5xxx/CVE-2006-5752.json   | 30 ++++++++++++++++++++++++++++++
 2007/1xxx/CVE-2007-1863.json   | 20 ++++++++++++++++++++
 2007/5xxx/CVE-2007-5000.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6388.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6420.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6421.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6422.json   | 10 ++++++++++
 2008/0xxx/CVE-2008-0005.json   | 20 --------------------
 2008/0xxx/CVE-2008-0456.json   | 10 ++++++++++
 2008/2xxx/CVE-2008-2364.json   | 30 ++++++++++++++++++++++++++++++
 2008/2xxx/CVE-2008-2939.json   | 10 ++++++++++
 2009/0xxx/CVE-2009-0023.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1191.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1195.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1890.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1891.json   | 30 ++++++++++++++++++++++++++++++
 2009/2xxx/CVE-2009-2412.json   | 30 ++++++++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3095.json   | 30 ++++++++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3560.json   | 30 ++++++++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3720.json   | 30 ++++++++++++++++++++++++++++++
 2010/0xxx/CVE-2010-0434.json   | 25 +++++++++++++++++++++++++
 2011/0xxx/CVE-2011-0419.json   | 25 +++++++++++++++++++++++++
 2013/4xxx/CVE-2013-4352.json   | 10 ++++++++++
 2013/5xxx/CVE-2013-5704.json   | 20 ++++++++++++++++++++
 2013/6xxx/CVE-2013-6438.json   | 10 ----------
 2014/0xxx/CVE-2014-0098.json   | 10 ----------
 2014/0xxx/CVE-2014-0117.json   |  5 -----
 2014/0xxx/CVE-2014-0118.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0226.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0231.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3523.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3581.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3583.json   |  5 -----
 2014/8xxx/CVE-2014-8109.json   |  5 -----
 2015/0xxx/CVE-2015-0228.json   | 10 ++++++++++
 2015/0xxx/CVE-2015-0253.json   | 15 +++++++++++++++
 2015/3xxx/CVE-2015-3183.json   | 10 ++++++++++
 2015/3xxx/CVE-2015-3185.json   |  5 -----
 2016/0xxx/CVE-2016-0736.json   | 10 ++++++++++
 2016/1xxx/CVE-2016-1546.json   | 10 ++++++++++
 2016/2xxx/CVE-2016-2161.json   | 10 ++++++++++
 2016/4xxx/CVE-2016-4975.json   | 15 +++++++++++++++
 2016/5xxx/CVE-2016-5387.json   | 15 +++++++++++++++
 2016/8xxx/CVE-2016-8740.json   | 10 ++++++++++
 2017/15xxx/CVE-2017-15715.json | 15 +++++++++++++++
 2017/3xxx/CVE-2017-3167.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7659.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9788.json   | 15 +++++++++++++++
 2017/9xxx/CVE-2017-9789.json   | 20 ++++++++++++++++++++
 2018/17xxx/CVE-2018-17189.json | 10 ----------
 2018/1xxx/CVE-2018-1302.json   |  5 +++++
 2018/1xxx/CVE-2018-1303.json   |  5 +++++
 2018/1xxx/CVE-2018-1312.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1333.json   |  5 +++++
 2019/0xxx/CVE-2019-0190.json   |  5 +++++
 2019/0xxx/CVE-2019-0211.json   |  5 +++++
 2019/0xxx/CVE-2019-0217.json   | 15 +++++++++++++++
 2019/0xxx/CVE-2019-0220.json   | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/9xxx/CVE-2019-9517.json   | 15 +++++++++++++++
 2020/11xxx/CVE-2020-11984.json | 10 ++++++++++
 2020/11xxx/CVE-2020-11985.json | 15 +++++++++++++++
 2020/11xxx/CVE-2020-11993.json | 20 ++++++++++++++++++++
 2020/9xxx/CVE-2020-9490.json   | 20 ++++++++++++++++++++
 83 files changed, 1280 insertions(+), 70 deletions(-)

diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index ace6898d6fe..95d1d6843ac 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -241,6 +241,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index 56aad482573..6e987afc14a 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -101,6 +101,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index 6f18038633a..f46842b6acb 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -96,6 +96,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index 9e03d4a2456..f935a45a032 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -106,6 +106,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 45ff96d0cd7..b24e36cc40b 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -191,6 +191,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index a54a27c0879..2193ff68018 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -146,6 +146,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 4fa63834d24..bc0d07f5889 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -91,6 +91,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 9f212012c43..e15e5c75832 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -271,6 +271,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index fa786a833ec..728c2ce9a29 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -151,6 +151,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index fc2ad2087ed..edda3a4bd0a 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -171,6 +171,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index 9b0f3f57dcb..c5d2e1415c3 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -166,6 +166,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index 3f30e8a6fb5..74dc01700d8 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -131,6 +131,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index 8f93ac14eac..ed27497c3ca 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -136,6 +136,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index 2050b0dcbb7..296cc1019e1 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -106,6 +106,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index aa13a450ec8..f2048e0aa11 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -161,6 +161,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index 29a460f230c..4a0b74f7449 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -141,6 +141,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 21ed84eb524..10711a9e565 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -131,6 +131,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index 04bc5928d51..be5d649361c 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -171,6 +171,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index f166bf3ebee..19fb90fae71 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -431,6 +431,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 22b00b36e77..b433fea2c03 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -386,6 +386,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 6d24eba532a..86fc44eea3c 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -321,6 +321,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 95285930286..27dbe0f2199 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -491,6 +491,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index cd93d15fee4..f36954e0a08 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -461,6 +461,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index b058d3e75a1..c7717cb6d19 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -171,6 +171,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index e9acb717ec1..4c8ffa4c5ca 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -186,6 +186,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 3ad16b0f1af..e8ecb44a060 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -176,6 +176,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 384573eafca..6defb3a31bf 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -326,26 +326,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index f52db5b15c6..a1cd60f6f7f 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index b1e0fcb0b8a..95a5ea5d193 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -341,6 +341,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index b4524e52901..c713a804e2a 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -311,6 +311,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index 272bf76f307..404ad190072 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -286,6 +286,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 48361023e4c..a2f00d9df8b 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -171,6 +171,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index b5af358d8d6..fc9b447da7c 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -236,6 +236,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index c4f81cf6ca4..bb781385257 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -251,6 +251,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 3176e509e3e..266468effe2 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -271,6 +271,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index fa871eca236..4ea7dd35b70 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -246,6 +246,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 13e053a4113..dfc0a659714 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -196,6 +196,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 344efe56f13..17a4ca72673 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -281,6 +281,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index bff9dbb01a9..8fd85fd03d8 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -446,6 +446,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index f3a1953b313..0ec8901bba4 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -281,6 +281,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index ce789d3c441..fd1d63dcc0b 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -306,6 +306,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 0a76a5f33db..a76ce416de4 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -91,6 +91,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index 2fbda77981e..605a12eb733 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -246,6 +246,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 85cd345d50a..65fee071b5b 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -256,16 +256,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index e8efe7ea9c8..0addea30559 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -271,16 +271,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index 2646e7fc6c8..f831a7190dd 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -141,11 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index 98749d689ce..ed1007b4e34 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -216,6 +216,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index dc729288885..7ad470789b3 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -261,6 +261,16 @@
                 "refsource": "MISC",
                 "name": "https://www.povonsec.com/apache-2-4-7-exploit/",
                 "url": "https://www.povonsec.com/apache-2-4-7-exploit/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index a73579737eb..53c28f0ab1d 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -231,6 +231,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index bcdf8697f31..745afc2d6a3 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index 3833f2e84d3..61171647a2d 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index 9f0221a427e..fec56e628bc 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index d6d5cb41f60..ecefdea7c64 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index e98269d193a..fac45cfb216 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -151,6 +151,16 @@
                 "refsource": "CONFIRM",
                 "name": "https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410",
                 "url": "https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index 78186ad1c76..8788c0badc8 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -141,6 +141,21 @@
                 "refsource": "CONFIRM",
                 "name": "https://github.com/apache/httpd/commit/be0f5335e3e73eb63253b050fdc23f252f5c8ae3",
                 "url": "https://github.com/apache/httpd/commit/be0f5335e3e73eb63253b050fdc23f252f5c8ae3"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index e43b6fee94e..872e8c545d4 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -271,6 +271,16 @@
                 "refsource": "CONFIRM",
                 "name": "https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6",
                 "url": "https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 1ea08a0845d..2cc52f883dd 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -186,11 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index 5c2549cc5c1..5b285ba83df 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -147,6 +147,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index 766bcdaf990..f5093bdc474 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -116,6 +116,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 248b2681d2f..1d70e1832f0 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -142,6 +142,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index b3c8e30c872..27b67df4d1c 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -134,6 +134,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index d77e7bdfb3b..03b9d7c12c5 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -256,6 +256,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index 4e653195ea6..a70bcad7edb 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index a083a780106..9116957a3ff 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -142,6 +142,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index c3127da34de..6a2b5e741d2 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -194,6 +194,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index ec1ad585b88..78db0065459 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -121,6 +121,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index c48e4742649..c3f0b34a894 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -220,6 +220,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index ab242d596ee..c72721be995 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -112,6 +112,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 48d85fa09c2..b243198a7d1 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -167,16 +167,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 18ee245c707..f1262ba621c 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -132,6 +132,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index 1b939740d78..e864f54d8bd 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -147,6 +147,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 17ec5bb0b55..10ad814795c 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -162,6 +162,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index a801cf06c2f..b93c45f5eed 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -141,6 +141,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 633de2f2768..0bff3e76ba3 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -112,6 +112,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 042257e4ba2..68c6e1f1796 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -268,6 +268,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 3aa466fda92..84fec150a63 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -198,6 +198,21 @@
                 "url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index 2cdc9d25dbd..fcd5944465e 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -193,6 +193,21 @@
                 "refsource": "CONFIRM",
                 "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
                 "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 2d6efe1bcb9..898b41b8409 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -118,6 +118,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index 07c7a25ba6c..462bdfbfa9a 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -273,6 +273,21 @@
                 "url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                 "refsource": "MISC",
                 "name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 55e663b26bd..8f9fabb84c7 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -158,6 +158,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index f9c5ae191cd..90902ae0982 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -73,6 +73,21 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20200827-0002/",
                 "url": "https://security.netapp.com/advisory/ntap-20200827-0002/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index 2d92da60411..9a9a024f704 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -123,6 +123,26 @@
                 "refsource": "MISC",
                 "name": "http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html",
                 "url": "http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index b56c50b3c4b..627b149c8cb 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -123,6 +123,26 @@
                 "refsource": "MISC",
                 "name": "http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html",
                 "url": "http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 8352b422142b91e6f6717b7172a6e040069685ad Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:01:20 +0000
Subject: [PATCH 731/845] "-Synchronized-Data."

---
 2001/1xxx/CVE-2001-1342.json   |  5 +++++
 2002/0xxx/CVE-2002-0654.json   | 10 ----------
 2002/0xxx/CVE-2002-0661.json   | 10 ----------
 2002/0xxx/CVE-2002-0840.json   | 15 ---------------
 2002/1xxx/CVE-2002-1592.json   | 15 ---------------
 2002/1xxx/CVE-2002-1593.json   | 15 ---------------
 2003/0xxx/CVE-2003-0016.json   | 15 ---------------
 2003/0xxx/CVE-2003-0017.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0020.json   | 20 --------------------
 2003/0xxx/CVE-2003-0083.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0132.json   | 15 ---------------
 2003/0xxx/CVE-2003-0134.json   | 15 ---------------
 2003/0xxx/CVE-2003-0189.json   | 15 ---------------
 2003/0xxx/CVE-2003-0192.json   | 15 ---------------
 2003/0xxx/CVE-2003-0245.json   | 15 ---------------
 2003/0xxx/CVE-2003-0253.json   | 15 ---------------
 2003/0xxx/CVE-2003-0254.json   | 15 ---------------
 2003/0xxx/CVE-2003-0460.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0542.json   | 20 --------------------
 2003/0xxx/CVE-2003-0789.json   | 15 ---------------
 2003/0xxx/CVE-2003-0987.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0993.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0113.json   | 15 ---------------
 2004/0xxx/CVE-2004-0751.json   | 20 --------------------
 2004/0xxx/CVE-2004-0885.json   | 20 --------------------
 2005/2xxx/CVE-2005-2700.json   |  5 +++++
 2005/2xxx/CVE-2005-2728.json   | 15 ---------------
 2005/3xxx/CVE-2005-3357.json   | 15 ---------------
 2008/0xxx/CVE-2008-0005.json   |  5 -----
 2008/0xxx/CVE-2008-0455.json   | 15 +++++++++++++++
 2008/2xxx/CVE-2008-2364.json   | 20 --------------------
 2008/2xxx/CVE-2008-2939.json   |  5 -----
 2009/1xxx/CVE-2009-1891.json   | 20 --------------------
 2010/0xxx/CVE-2010-0010.json   |  5 +++++
 2010/0xxx/CVE-2010-0434.json   | 10 ----------
 2010/1xxx/CVE-2010-1452.json   | 20 --------------------
 2011/0xxx/CVE-2011-0419.json   | 10 ----------
 2011/3xxx/CVE-2011-3368.json   | 10 ----------
 2011/4xxx/CVE-2011-4317.json   | 20 ++++++++++++++++++++
 2012/0xxx/CVE-2012-0021.json   | 20 ++++++++++++++++++++
 2012/0xxx/CVE-2012-0031.json   |  5 +++++
 2012/0xxx/CVE-2012-0053.json   |  5 +++++
 2012/0xxx/CVE-2012-0883.json   | 20 ++++++++++++++++++++
 2012/2xxx/CVE-2012-2687.json   | 20 ++++++++++++++++++++
 2012/3xxx/CVE-2012-3499.json   | 20 ++++++++++++++++++++
 2012/3xxx/CVE-2012-3502.json   | 15 +++++++++++++++
 2012/4xxx/CVE-2012-4557.json   | 20 ++++++++++++++++++++
 2012/4xxx/CVE-2012-4558.json   | 20 ++++++++++++++++++++
 2013/1xxx/CVE-2013-1862.json   |  5 +++++
 2013/1xxx/CVE-2013-1896.json   | 20 ++++++++++++++++++++
 2013/2xxx/CVE-2013-2249.json   | 15 +++++++++++++++
 2013/4xxx/CVE-2013-4352.json   |  5 +++++
 2013/5xxx/CVE-2013-5704.json   |  5 +++++
 2013/6xxx/CVE-2013-6438.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0098.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0117.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0118.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0226.json   |  5 -----
 2014/0xxx/CVE-2014-0231.json   | 15 +++++++++++++++
 2014/3xxx/CVE-2014-3523.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3581.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3583.json   | 10 ++++++++++
 2014/8xxx/CVE-2014-8109.json   | 10 ++++++++++
 2015/0xxx/CVE-2015-0228.json   | 10 ++++++++++
 2015/0xxx/CVE-2015-0253.json   |  5 +++++
 2015/3xxx/CVE-2015-3183.json   | 15 +++++++++++++++
 2016/0xxx/CVE-2016-0736.json   |  5 -----
 2017/3xxx/CVE-2017-3169.json   | 10 ++++++++++
 2017/7xxx/CVE-2017-7659.json   | 10 ++++++++++
 2017/7xxx/CVE-2017-7668.json   | 10 ++++++++++
 2017/7xxx/CVE-2017-7679.json   | 25 +++++++++++++++++++++++++
 2017/9xxx/CVE-2017-9788.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9789.json   | 15 ---------------
 2017/9xxx/CVE-2017-9798.json   | 10 ----------
 2018/11xxx/CVE-2018-11763.json | 10 ++++++++++
 2018/1xxx/CVE-2018-1283.json   | 10 ----------
 2018/1xxx/CVE-2018-1301.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1302.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1303.json   | 10 ++++++++++
 2019/10xxx/CVE-2019-10082.json | 10 ----------
 2020/11xxx/CVE-2020-11984.json |  5 -----
 2020/1xxx/CVE-2020-1927.json   |  5 -----
 2020/1xxx/CVE-2020-1934.json   |  5 -----
 2021/29xxx/CVE-2021-29097.json | 27 ++++++++++++++++++++++++++-
 2021/29xxx/CVE-2021-29098.json |  5 -----
 85 files changed, 566 insertions(+), 501 deletions(-)

diff --git a/2001/1xxx/CVE-2001-1342.json b/2001/1xxx/CVE-2001-1342.json
index 6f524512e68..fd877af0334 100644
--- a/2001/1xxx/CVE-2001-1342.json
+++ b/2001/1xxx/CVE-2001-1342.json
@@ -81,6 +81,11 @@
                 "name": "http://bugs.apache.org/index.cgi/full/7522",
                 "refsource": "CONFIRM",
                 "url": "http://bugs.apache.org/index.cgi/full/7522"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index 6e987afc14a..de451dbc690 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -106,16 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index 04115e25a84..8f44ac2bc70 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -101,16 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 62511b95ca8..1d489649fc1 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -196,21 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index 2227830478c..f753ba3e3de 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index f46842b6acb..4aa963d0e1b 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -106,21 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index f935a45a032..b21fb6d2176 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 592fe4f06bf..94438de9209 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -76,6 +76,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index b24e36cc40b..49d5e258ce9 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -201,26 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 5ccd175c986..ae6703034c7 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 2193ff68018..591aa0927d8 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index 5c2ae226e0f..a8ba3c36e29 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -96,21 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 1f83050a43e..bc67ee88988 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index 7281a90c38d..ed978fae924 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 4319ed12410..802ee3ac5f3 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -131,21 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index bc0d07f5889..248b67efa25 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 50243803d64..a686e486bfa 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index 2663dfef813..2563a8fe440 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -61,6 +61,16 @@
                 "name": "VU#694428",
                 "refsource": "CERT-VN",
                 "url": "http://www.kb.cert.org/vuls/id/694428"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index e15e5c75832..6c6f9aa522f 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index dbf9cbfac82..d2d19bf41eb 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index 49455cc83c6..298047c13c4 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -136,6 +136,16 @@
                 "name": "GLSA-200405-22",
                 "refsource": "GENTOO",
                 "url": "http://security.gentoo.org/glsa/glsa-200405-22.xml"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index 88d23d05d41..edcba885b9a 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -126,6 +126,16 @@
                 "name": "oval:org.mitre.oval:def:4670",
                 "refsource": "OVAL",
                 "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4670"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 728c2ce9a29..2a77f406c40 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -161,21 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index fa491c94aa2..a9d398eb9d6 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -121,26 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index f2048e0aa11..f58f45f9417 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -166,26 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index 6dcad8064d2..a93774458e3 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -336,6 +336,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 24855d639c3..6650ab075a3 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -281,21 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index 327ad87353e..990dfd369a6 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -346,21 +346,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 6defb3a31bf..8c339344ec1 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -321,11 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index c81d9640ba4..8672fbc141a 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -151,6 +151,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 95a5ea5d193..50a71681e43 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -351,26 +351,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index c713a804e2a..5092de501d9 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -316,11 +316,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 266468effe2..573874ff165 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 13e6ddf1f0a..2d9a1317903 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -136,6 +136,11 @@
                 "name": "ADV-2010-1001",
                 "refsource": "VUPEN",
                 "url": "http://www.vupen.com/english/advisories/2010/1001"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index 0ec8901bba4..e67f7f6888c 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -296,16 +296,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index 09f59674257..ac3699d7cef 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -211,26 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index fd1d63dcc0b..cae64b4b6cd 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -321,16 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index a056d7ae11d..00e7d8b9f0c 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -286,16 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index ce1ad2e7b10..0d9d083c3fa 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -181,6 +181,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index ae4387469d1..267170a7581 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -161,6 +161,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index 3003f1367fe..c031ca2f6ce 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -241,6 +241,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index 76cdaee34bb..d2d6ef1ce4a 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -256,6 +256,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index 89caa40075b..a38add02117 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -176,6 +176,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index c82135c3d88..449d8cc0c3f 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -211,6 +211,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 79056e5ca7a..3c644916ef9 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -206,6 +206,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index 7fd783498fc..3220ef9c985 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -91,6 +91,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index db008b05ce2..79424f864e5 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -121,6 +121,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index badaeca7a48..fb84273be06 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -176,6 +176,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 52f913861bf..5171a85a618 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -236,6 +236,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index c37e8f648cb..84e04ca91ec 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -196,6 +196,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index 2c5e4899fc5..da62abb2f4c 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -96,6 +96,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index a76ce416de4..9e842b18c36 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -101,6 +101,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index 605a12eb733..b979f80ce6f 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -266,6 +266,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 65fee071b5b..25518513fa0 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -256,6 +256,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 0addea30559..0750d1ba95f 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -271,6 +271,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index f831a7190dd..15995d0c045 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index ed1007b4e34..a53bd575a8b 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -226,6 +226,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index 7ad470789b3..df1e2f6b5c9 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -266,11 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index 53c28f0ab1d..6ae7dbb3863 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -241,6 +241,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 745afc2d6a3..01641bc40c1 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -116,6 +116,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index 61171647a2d..dad38851624 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -156,6 +156,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index fec56e628bc..d83c4b71c79 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index ecefdea7c64..5ce1af78b43 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index fac45cfb216..90b3211c5c4 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -161,6 +161,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index 8788c0badc8..9e1002bd763 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -156,6 +156,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index 872e8c545d4..ce90bcde8cf 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -281,6 +281,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index 5b285ba83df..758f6fbc91d 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -152,11 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 8d062999afe..5ebe95ddb08 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -214,6 +214,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index 78db0065459..01c77cda418 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 998a21ca2e7..9a325e8352a 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -184,6 +184,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index afb871edcce..4db523e52cb 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -204,6 +204,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index c3f0b34a894..3633df23593 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -235,6 +235,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index c72721be995..7ee91f35cc8 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -117,21 +117,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 2f3c4d1850e..feb4b6faa2e 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -281,16 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 174143c7dbe..07d229598d2 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -157,6 +157,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 4a531b1f307..19e84ef79df 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -142,16 +142,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index 6eec31b351b..df7e26b952c 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -162,6 +162,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index f1262ba621c..eed62dfc44a 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -137,6 +137,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index e864f54d8bd..c80423d9945 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -152,6 +152,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index ac6403611d2..08c4a0a0c8d 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -78,16 +78,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 8f9fabb84c7..9b1850271fd 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -163,11 +163,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 7e150a98a98..5ceac293627 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -128,11 +128,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 17df50a3f1f..4af2d5a7369 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -113,11 +113,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 5f89da6e617..8dda1d9d453 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -152,10 +152,35 @@
                 "name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
                 "refsource": "CONFIRM",
                 "url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
             }
         ]
     },
     "source": {
         "discovery": "EXTERNAL"
     }
-}
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 7a7c7c6d28c..449062d70d7 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -161,11 +161,6 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
             }
         ]
     },

From d69932a540afdca9e113a80da61b340999f827e5 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:01:36 +0000
Subject: [PATCH 732/845] "-Synchronized-Data."

---
 2000/0xxx/CVE-2000-0505.json   | 10 ++++++++++
 2000/1xxx/CVE-2000-1206.json   |  5 +++++
 2001/1xxx/CVE-2001-1342.json   |  5 +++++
 2003/0xxx/CVE-2003-0020.json   |  5 -----
 2003/0xxx/CVE-2003-0083.json   |  5 +++++
 2003/0xxx/CVE-2003-0254.json   |  5 -----
 2004/0xxx/CVE-2004-0174.json   | 20 --------------------
 2004/0xxx/CVE-2004-0488.json   | 15 ---------------
 2004/0xxx/CVE-2004-0492.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0493.json   | 15 ---------------
 2004/0xxx/CVE-2004-0747.json   | 15 ---------------
 2004/0xxx/CVE-2004-0748.json   | 20 --------------------
 2004/0xxx/CVE-2004-0751.json   |  5 +++++
 2004/0xxx/CVE-2004-0786.json   | 15 ---------------
 2004/0xxx/CVE-2004-0809.json   | 15 ---------------
 2004/0xxx/CVE-2004-0811.json   | 15 ---------------
 2004/0xxx/CVE-2004-0885.json   |  5 +++++
 2004/0xxx/CVE-2004-0940.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0942.json   | 15 ---------------
 2004/1xxx/CVE-2004-1834.json   | 15 ---------------
 2005/1xxx/CVE-2005-1268.json   | 15 ---------------
 2005/2xxx/CVE-2005-2088.json   | 15 ---------------
 2005/2xxx/CVE-2005-2491.json   | 15 ---------------
 2005/2xxx/CVE-2005-2700.json   | 20 ++++++++++++++++++++
 2005/2xxx/CVE-2005-2970.json   |  5 +++++
 2005/3xxx/CVE-2005-3352.json   |  5 +++++
 2006/3xxx/CVE-2006-3747.json   |  5 +++++
 2006/3xxx/CVE-2006-3918.json   |  5 +++++
 2006/5xxx/CVE-2006-5752.json   |  5 +++++
 2007/1xxx/CVE-2007-1863.json   |  5 +++++
 2007/3xxx/CVE-2007-3847.json   |  5 +++++
 2007/5xxx/CVE-2007-5000.json   | 15 +++++++++++++++
 2007/6xxx/CVE-2007-6388.json   |  5 +++++
 2007/6xxx/CVE-2007-6420.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6421.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6422.json   |  5 -----
 2008/0xxx/CVE-2008-0005.json   | 15 +++++++++++++++
 2008/0xxx/CVE-2008-0456.json   | 10 ++++++++++
 2008/2xxx/CVE-2008-2364.json   | 10 ++++++++++
 2008/2xxx/CVE-2008-2939.json   | 15 +++++++++++++++
 2009/0xxx/CVE-2009-0023.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1191.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1195.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1890.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1891.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1955.json   |  5 +++++
 2009/1xxx/CVE-2009-1956.json   |  5 +++++
 2010/0xxx/CVE-2010-0408.json   |  5 +++++
 2010/1xxx/CVE-2010-1452.json   | 10 ++++++++++
 2010/1xxx/CVE-2010-1623.json   | 20 --------------------
 2010/2xxx/CVE-2010-2068.json   | 15 +++++++++++++++
 2010/2xxx/CVE-2010-2791.json   | 15 +++++++++++++++
 2011/3xxx/CVE-2011-3192.json   | 10 ----------
 2011/3xxx/CVE-2011-3348.json   | 15 +++++++++++++++
 2011/3xxx/CVE-2011-3607.json   | 10 ----------
 2012/2xxx/CVE-2012-2687.json   |  5 -----
 2012/3xxx/CVE-2012-3499.json   |  5 -----
 2013/5xxx/CVE-2013-5704.json   | 20 --------------------
 2014/0xxx/CVE-2014-0231.json   | 20 --------------------
 2016/2xxx/CVE-2016-2161.json   |  5 -----
 2016/4xxx/CVE-2016-4975.json   | 10 ----------
 2017/15xxx/CVE-2017-15715.json | 10 ----------
 2017/3xxx/CVE-2017-3167.json   | 10 ----------
 2017/9xxx/CVE-2017-9788.json   | 20 --------------------
 2018/17xxx/CVE-2018-17199.json |  5 +++++
 2018/8xxx/CVE-2018-8011.json   |  5 +++++
 2019/0xxx/CVE-2019-0190.json   |  5 +++++
 2019/0xxx/CVE-2019-0196.json   | 10 ----------
 2019/0xxx/CVE-2019-0197.json   |  5 +++++
 2019/0xxx/CVE-2019-0211.json   |  5 +++++
 2019/0xxx/CVE-2019-0215.json   |  5 +++++
 2019/0xxx/CVE-2019-0217.json   |  5 +++++
 2019/0xxx/CVE-2019-0220.json   |  5 +++++
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/10xxx/CVE-2019-10082.json | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10092.json |  5 +++++
 2019/10xxx/CVE-2019-10097.json |  5 +++++
 2019/10xxx/CVE-2019-10098.json |  5 +++++
 2019/9xxx/CVE-2019-9517.json   |  5 +++++
 2020/11xxx/CVE-2020-11984.json | 10 ++++++++++
 2020/11xxx/CVE-2020-11985.json |  5 +++++
 2020/11xxx/CVE-2020-11993.json |  5 -----
 2020/9xxx/CVE-2020-9490.json   |  5 -----
 2021/29xxx/CVE-2021-29097.json | 10 ++++++++++
 84 files changed, 430 insertions(+), 385 deletions(-)

diff --git a/2000/0xxx/CVE-2000-0505.json b/2000/0xxx/CVE-2000-0505.json
index eb42d4ae76e..affb2e4b344 100644
--- a/2000/0xxx/CVE-2000-0505.json
+++ b/2000/0xxx/CVE-2000-0505.json
@@ -66,6 +66,16 @@
                 "name": "1284",
                 "refsource": "BID",
                 "url": "http://www.securityfocus.com/bid/1284"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1206.json b/2000/1xxx/CVE-2000-1206.json
index bbe1d4680f8..d8fdbf29beb 100644
--- a/2000/1xxx/CVE-2000-1206.json
+++ b/2000/1xxx/CVE-2000-1206.json
@@ -56,6 +56,11 @@
                 "name": "http://www.apacheweek.com/issues/00-01-07#status",
                 "refsource": "CONFIRM",
                 "url": "http://www.apacheweek.com/issues/00-01-07#status"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/1xxx/CVE-2001-1342.json b/2001/1xxx/CVE-2001-1342.json
index fd877af0334..7f7fa8dd05a 100644
--- a/2001/1xxx/CVE-2001-1342.json
+++ b/2001/1xxx/CVE-2001-1342.json
@@ -86,6 +86,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 49d5e258ce9..57fd7cdd6f0 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -196,11 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index ae6703034c7..84b59a2b496 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -116,6 +116,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index a686e486bfa..931354c42a6 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index edda3a4bd0a..ef574658c0e 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -181,26 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index c5d2e1415c3..f5ef2b8305a 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -176,21 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 6ed7cc78723..1ab73d1ebd7 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -141,6 +141,16 @@
                 "name": "apache-modproxy-contentlength-bo(16387)",
                 "refsource": "XF",
                 "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16387"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index 74dc01700d8..f85c9d23291 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index ed27497c3ca..e5f79263938 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index 9363d444e20..ace756938e3 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -116,26 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index a9d398eb9d6..29d92a51f7b 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index cecf6e0039d..6efc0937c96 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index c5cda0a063c..e139a46ddc2 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index 296cc1019e1..ff17438d5a4 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index f58f45f9417..497474d3c4a 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -166,6 +166,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index aa6c7515990..4e8e12e53be 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -121,6 +121,21 @@
                 "name": "ADV-2006-0789",
                 "refsource": "VUPEN",
                 "url": "http://www.vupen.com/english/advisories/2006/0789"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index 4a0b74f7449..193d0104bc4 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 10711a9e565..10aedae087b 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index be5d649361c..efc38abaecd 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -181,21 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index 21391773b2d..2cedb9b2869 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -326,21 +326,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index c69a559594b..a14dbe0c423 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -371,21 +371,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index a93774458e3..c7a16d739b5 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -341,6 +341,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 01e9f12aebd..5691cf0497e 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -171,6 +171,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 19fb90fae71..70b06364463 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -456,6 +456,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index d5aaef6767a..813662a40fc 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -501,6 +501,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index ab109489f85..cd608d8b95a 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -316,6 +316,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index b433fea2c03..11d167b06d7 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -416,6 +416,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 86fc44eea3c..9dd786b3b48 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -341,6 +341,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index 9ee32ed72f7..efd43945a14 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -421,6 +421,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 27dbe0f2199..986bb9f8bfe 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -501,6 +501,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index f36954e0a08..0f7dd31437b 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -471,6 +471,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index c7717cb6d19..fa121d87f38 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -181,6 +181,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index 4c8ffa4c5ca..dcee4e94f2d 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -196,6 +196,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index e8ecb44a060..724f3bf9aec 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -181,11 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 8c339344ec1..88643781716 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -321,6 +321,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index a1cd60f6f7f..9398e2fb746 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 50a71681e43..7fb08ca34e7 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -351,6 +351,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index 5092de501d9..1706b8c2d1d 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -316,6 +316,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index 404ad190072..d012abf66dd 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -296,6 +296,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index a2f00d9df8b..35c5ef610ed 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -181,6 +181,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index fc9b447da7c..3cb74abf021 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -246,6 +246,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index bb781385257..9981cefe172 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -261,6 +261,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 573874ff165..f0adaaa2158 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -281,6 +281,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index f15e36ba4d0..afa725d04b8 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -306,6 +306,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index 8388eebee93..b0cc0056614 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -266,6 +266,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index 9fe74ca5a09..ac4f2edc021 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -236,6 +236,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index ac3699d7cef..56c91d530b0 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -211,6 +211,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index 546ac3c92b7..69970b30f70 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -286,26 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index a863c7558b6..c20eb2e885a 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -206,6 +206,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 6173759d325..7777ca453fa 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -101,6 +101,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 57da8b5e3ac..725a29489d3 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -396,16 +396,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index 082f0be3b09..c3016665c34 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -171,6 +171,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index ef635fccd80..06c1485b089 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -256,16 +256,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 449d8cc0c3f..e65ad97cf43 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -226,11 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 3c644916ef9..2c6c995e945 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -221,11 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index b979f80ce6f..64e1d53a7e9 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -251,26 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index 6ae7dbb3863..0d0118ae286 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -236,26 +236,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 1d70e1832f0..5dec23f143d 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -147,11 +147,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index 27b67df4d1c..949e07b252c 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -139,16 +139,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 9116957a3ff..4d234081f30 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -147,16 +147,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index 6a2b5e741d2..436e5a2f363 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -199,16 +199,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index 3633df23593..f5fc3a170af 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -225,26 +225,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index af815922275..030b93373c5 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -167,6 +167,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 81287146f38..d87128d801a 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -116,6 +116,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 0bff3e76ba3..243b7290728 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -117,6 +117,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index 5d1ff963c56..ab57bf6d6a0 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -188,16 +188,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 2faa53d35c1..7c8747cc314 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -168,6 +168,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 68c6e1f1796..fa1c8204418 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -273,6 +273,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 84f85c88a7e..47923af4e0c 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -166,6 +166,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 84fec150a63..7b3e5deaf59 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -213,6 +213,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index fcd5944465e..7b12a2536ba 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -208,6 +208,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 898b41b8409..76714c82aa4 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -123,6 +123,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index 08c4a0a0c8d..b12ff0e9d5e 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -78,6 +78,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 2305431dc22..1eff17449b9 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -188,6 +188,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index b22c1a1b27b..4dcbb645b04 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -98,6 +98,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 050b3ddfd1f..f2c17bc6c45 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -98,6 +98,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index 462bdfbfa9a..ce78576c981 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -288,6 +288,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 9b1850271fd..b14ef2759d0 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -163,6 +163,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index 90902ae0982..79114da19cc 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -88,6 +88,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index 9a9a024f704..ee20bc73e99 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -138,11 +138,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 627b149c8cb..8f6ed041ee2 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -138,11 +138,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 8dda1d9d453..46d2ce90597 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -177,6 +177,16 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
             }
         ]
     },

From b71bfd64c351026c65f77ded37ca69394011d4a3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:01:52 +0000
Subject: [PATCH 733/845] "-Synchronized-Data."

---
 2000/0xxx/CVE-2000-0913.json   | 10 ++++++++++
 2000/1xxx/CVE-2000-1204.json   | 10 ++++++++++
 2000/1xxx/CVE-2000-1205.json   | 10 ++++++++++
 2000/1xxx/CVE-2000-1206.json   |  5 +++++
 2001/0xxx/CVE-2001-0729.json   | 10 ++++++++++
 2001/0xxx/CVE-2001-0730.json   | 10 ++++++++++
 2001/0xxx/CVE-2001-0731.json   | 10 ++++++++++
 2001/0xxx/CVE-2001-0925.json   | 10 ++++++++++
 2002/0xxx/CVE-2002-0061.json   |  5 +++++
 2002/0xxx/CVE-2002-0839.json   | 10 ++++++++++
 2002/0xxx/CVE-2002-0840.json   |  5 +++++
 2002/0xxx/CVE-2002-0843.json   |  5 +++++
 2002/1xxx/CVE-2002-1156.json   | 10 ----------
 2002/1xxx/CVE-2002-1592.json   |  5 -----
 2002/1xxx/CVE-2002-1593.json   |  5 -----
 2003/0xxx/CVE-2003-0016.json   |  5 -----
 2003/0xxx/CVE-2003-0020.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0189.json   |  5 -----
 2003/0xxx/CVE-2003-0460.json   |  5 +++++
 2003/0xxx/CVE-2003-0542.json   |  5 -----
 2003/0xxx/CVE-2003-0789.json   |  5 -----
 2003/0xxx/CVE-2003-0987.json   |  5 +++++
 2004/0xxx/CVE-2004-0174.json   |  5 +++++
 2004/0xxx/CVE-2004-0492.json   |  5 +++++
 2004/0xxx/CVE-2004-0809.json   |  5 -----
 2005/2xxx/CVE-2005-2728.json   | 20 ++++++++++++++++++++
 2005/3xxx/CVE-2005-3352.json   | 20 --------------------
 2005/3xxx/CVE-2005-3357.json   | 20 ++++++++++++++++++++
 2006/3xxx/CVE-2006-3747.json   | 25 -------------------------
 2006/5xxx/CVE-2006-5752.json   | 25 -------------------------
 2007/1xxx/CVE-2007-1862.json   |  5 +++++
 2007/3xxx/CVE-2007-3304.json   | 25 -------------------------
 2007/5xxx/CVE-2007-5000.json   | 10 ----------
 2008/0xxx/CVE-2008-0455.json   |  5 -----
 2009/1xxx/CVE-2009-1195.json   | 15 ---------------
 2009/1xxx/CVE-2009-1890.json   | 15 ---------------
 2010/0xxx/CVE-2010-0010.json   | 10 ++++++++++
 2010/0xxx/CVE-2010-0434.json   | 15 +++++++++++++++
 2010/2xxx/CVE-2010-2068.json   |  5 +++++
 2011/0xxx/CVE-2011-0419.json   | 15 +++++++++++++++
 2011/3xxx/CVE-2011-3368.json   | 15 +++++++++++++++
 2011/3xxx/CVE-2011-3607.json   | 10 ----------
 2011/4xxx/CVE-2011-4317.json   |  5 -----
 2012/0xxx/CVE-2012-0021.json   |  5 -----
 2012/0xxx/CVE-2012-0031.json   | 25 -------------------------
 2012/0xxx/CVE-2012-0053.json   | 15 ---------------
 2012/0xxx/CVE-2012-0883.json   |  5 -----
 2012/3xxx/CVE-2012-3502.json   |  5 -----
 2012/4xxx/CVE-2012-4557.json   |  5 -----
 2012/4xxx/CVE-2012-4558.json   |  5 -----
 2013/1xxx/CVE-2013-1862.json   | 15 ---------------
 2013/1xxx/CVE-2013-1896.json   |  5 -----
 2013/2xxx/CVE-2013-2249.json   |  5 -----
 2013/4xxx/CVE-2013-4352.json   |  5 +++++
 2014/8xxx/CVE-2014-8109.json   | 15 ---------------
 2015/3xxx/CVE-2015-3185.json   | 10 ++++++++++
 2016/0xxx/CVE-2016-0736.json   | 10 ++++++++++
 2016/1xxx/CVE-2016-1546.json   |  5 +++++
 2016/2xxx/CVE-2016-2161.json   | 10 ++++++++++
 2016/4xxx/CVE-2016-4975.json   | 15 +++++++++++++++
 2016/4xxx/CVE-2016-4979.json   |  5 +++++
 2016/5xxx/CVE-2016-5387.json   |  5 +++++
 2016/8xxx/CVE-2016-8740.json   |  5 +++++
 2016/8xxx/CVE-2016-8743.json   |  5 +++++
 2017/15xxx/CVE-2017-15710.json |  5 +++++
 2017/15xxx/CVE-2017-15715.json | 15 +++++++++++++++
 2017/3xxx/CVE-2017-3167.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7668.json   | 20 --------------------
 2018/17xxx/CVE-2018-17189.json | 20 ++++++++++++++++++++
 2018/17xxx/CVE-2018-17199.json |  5 +++++
 2018/1xxx/CVE-2018-1302.json   | 20 --------------------
 2018/1xxx/CVE-2018-1312.json   | 20 --------------------
 2018/1xxx/CVE-2018-1333.json   | 10 ++++++++++
 2018/8xxx/CVE-2018-8011.json   |  5 +++++
 2019/0xxx/CVE-2019-0190.json   |  5 +++++
 2019/0xxx/CVE-2019-0196.json   | 20 ++++++++++++++++++++
 2019/0xxx/CVE-2019-0197.json   |  5 +++++
 2019/0xxx/CVE-2019-0211.json   | 15 ---------------
 2019/0xxx/CVE-2019-0215.json   | 15 ---------------
 2019/0xxx/CVE-2019-0217.json   |  5 +++++
 2019/0xxx/CVE-2019-0220.json   |  5 +++++
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/10xxx/CVE-2019-10082.json |  5 +++++
 2019/10xxx/CVE-2019-10092.json |  5 +++++
 2019/10xxx/CVE-2019-10097.json |  5 +++++
 2019/10xxx/CVE-2019-10098.json |  5 +++++
 2019/9xxx/CVE-2019-9517.json   |  5 +++++
 2020/1xxx/CVE-2020-1934.json   | 10 ----------
 88 files changed, 455 insertions(+), 405 deletions(-)

diff --git a/2000/0xxx/CVE-2000-0913.json b/2000/0xxx/CVE-2000-0913.json
index fb0a139c92f..cc398596f51 100644
--- a/2000/0xxx/CVE-2000-0913.json
+++ b/2000/0xxx/CVE-2000-0913.json
@@ -96,6 +96,16 @@
                 "name": "MDKSA-2000:060",
                 "refsource": "MANDRAKE",
                 "url": "http://www.linux-mandrake.com/en/security/MDKSA-2000-060-2.php3?dis=7.1"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1204.json b/2000/1xxx/CVE-2000-1204.json
index 7bbbb18fbf0..5a2580a44de 100644
--- a/2000/1xxx/CVE-2000-1204.json
+++ b/2000/1xxx/CVE-2000-1204.json
@@ -56,6 +56,16 @@
                 "name": "http://www.apacheweek.com/issues/00-10-13",
                 "refsource": "CONFIRM",
                 "url": "http://www.apacheweek.com/issues/00-10-13"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1205.json b/2000/1xxx/CVE-2000-1205.json
index b77b85bf3d8..2d8cbe72ff8 100644
--- a/2000/1xxx/CVE-2000-1205.json
+++ b/2000/1xxx/CVE-2000-1205.json
@@ -81,6 +81,16 @@
                 "name": "http://httpd.apache.org/info/css-security/apache_specific.html",
                 "refsource": "CONFIRM",
                 "url": "http://httpd.apache.org/info/css-security/apache_specific.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1206.json b/2000/1xxx/CVE-2000-1206.json
index d8fdbf29beb..db2edbf575b 100644
--- a/2000/1xxx/CVE-2000-1206.json
+++ b/2000/1xxx/CVE-2000-1206.json
@@ -61,6 +61,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0729.json b/2001/0xxx/CVE-2001-0729.json
index 5d7e380ff8e..33ea27d56f0 100644
--- a/2001/0xxx/CVE-2001-0729.json
+++ b/2001/0xxx/CVE-2001-0729.json
@@ -76,6 +76,16 @@
                 "name": "1017522",
                 "refsource": "SECTRACK",
                 "url": "http://securitytracker.com/id?1017522"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0730.json b/2001/0xxx/CVE-2001-0730.json
index 50fbfcc92cf..5aa07dd9564 100644
--- a/2001/0xxx/CVE-2001-0730.json
+++ b/2001/0xxx/CVE-2001-0730.json
@@ -86,6 +86,16 @@
                 "name": "apache-log-file-overwrite(7419)",
                 "refsource": "XF",
                 "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7419"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0731.json b/2001/0xxx/CVE-2001-0731.json
index 7f708dc6c1f..d79b436aa0f 100644
--- a/2001/0xxx/CVE-2001-0731.json
+++ b/2001/0xxx/CVE-2001-0731.json
@@ -91,6 +91,16 @@
                 "name": "3009",
                 "refsource": "BID",
                 "url": "http://www.securityfocus.com/bid/3009"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0925.json b/2001/0xxx/CVE-2001-0925.json
index cb671521dd3..59934cb2de9 100644
--- a/2001/0xxx/CVE-2001-0925.json
+++ b/2001/0xxx/CVE-2001-0925.json
@@ -101,6 +101,16 @@
                 "name": "2503",
                 "refsource": "BID",
                 "url": "http://www.securityfocus.com/bid/2503"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0061.json b/2002/0xxx/CVE-2002-0061.json
index bad2e3dc023..216b81612b9 100644
--- a/2002/0xxx/CVE-2002-0061.json
+++ b/2002/0xxx/CVE-2002-0061.json
@@ -76,6 +76,11 @@
                 "name": "20020325 Apache 1.3.24 Released! (fwd)",
                 "refsource": "BUGTRAQ",
                 "url": "http://online.securityfocus.com/archive/1/263927"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0839.json b/2002/0xxx/CVE-2002-0839.json
index 64e92c256bf..9869a2f90d8 100644
--- a/2002/0xxx/CVE-2002-0839.json
+++ b/2002/0xxx/CVE-2002-0839.json
@@ -141,6 +141,16 @@
                 "name": "20021015 GLSA: apache",
                 "refsource": "BUGTRAQ",
                 "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0195.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 1d489649fc1..76c681d59a9 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -196,6 +196,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0843.json b/2002/0xxx/CVE-2002-0843.json
index af3224ccdd9..6699b9c7018 100644
--- a/2002/0xxx/CVE-2002-0843.json
+++ b/2002/0xxx/CVE-2002-0843.json
@@ -166,6 +166,11 @@
                 "name": "apache-apachebench-response-bo(10281)",
                 "refsource": "XF",
                 "url": "http://www.iss.net/security_center/static/10281.php"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index 07929d2eb61..1820e5bc99d 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -106,16 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index f753ba3e3de..a47deba61cd 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index 4aa963d0e1b..993b12bb1a3 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -101,11 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index b21fb6d2176..ce1973c6dcb 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -111,11 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 57fd7cdd6f0..7536f1c1381 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -196,6 +196,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index bc67ee88988..0972b8c1cac 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index 2563a8fe440..de3b54acf9c 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 6c6f9aa522f..851f4e2d908 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -276,11 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index d2d19bf41eb..5632b4cb40d 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index 298047c13c4..a664ad2f402 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index ef574658c0e..f1f767ba4aa 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -181,6 +181,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 1ab73d1ebd7..0c66d182274 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index e139a46ddc2..18ce4682566 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 6650ab075a3..7861382a1c6 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -281,6 +281,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 70b06364463..e18b9daa3a5 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -441,26 +441,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index 990dfd369a6..d0305b28678 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -346,6 +346,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index 813662a40fc..7bd4b4a533f 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -481,31 +481,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 11d167b06d7..09df5cb31bd 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -396,31 +396,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index 968e5a9796a..59f894dfa28 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -166,6 +166,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 93fe56dfc7a..8ee693f2f77 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -446,31 +446,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 986bb9f8bfe..d365be614e5 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -506,16 +506,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index 8672fbc141a..ba407cd19d5 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -161,11 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 3cb74abf021..4df658a5e99 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -241,21 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 9981cefe172..02444d1b377 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -256,21 +256,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 2d9a1317903..0231bc14b1e 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index e67f7f6888c..12e2abbaef7 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -296,6 +296,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index c20eb2e885a..d27a0a3ce30 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -221,6 +221,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index cae64b4b6cd..0d19647ec36 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -321,6 +321,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 00e7d8b9f0c..1d1a83b82c8 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -286,6 +286,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index 06c1485b089..ca7f499263e 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -246,16 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 0d9d083c3fa..112e3f1fefd 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -196,11 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index 267170a7581..6b37527970c 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -176,11 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index c031ca2f6ce..7a590fb2822 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -221,31 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index d2d6ef1ce4a..a3cb25af74b 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -246,21 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index a38add02117..b5f19d77c4e 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -191,11 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index 3220ef9c985..fdc7481ae9a 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -101,11 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index 79424f864e5..3db52c75007 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index fb84273be06..a7a3f81e8ef 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -191,11 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 5171a85a618..287dae03dc1 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -226,21 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 84e04ca91ec..ea6e1365f64 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -211,11 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index da62abb2f4c..ee0d2685e9a 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 9e842b18c36..467596d0f43 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index 5ce1af78b43..bdccd3f355a 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 2cc52f883dd..7597d5d59df 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -186,6 +186,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index 758f6fbc91d..fddaf553c41 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -152,6 +152,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index f5093bdc474..9786429fba9 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -126,6 +126,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 5dec23f143d..09d16453e81 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -147,6 +147,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index 949e07b252c..f3de51dd992 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -139,6 +139,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index c2deb56b367..e1ee30e910e 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index 03b9d7c12c5..9c31e64f189 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -271,6 +271,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index a70bcad7edb..8fd4103b053 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index e5b28f5c4b3..a6a60bd1edd 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -187,6 +187,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 51b91c5400c..4d98d6afd0a 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -168,6 +168,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 4d234081f30..32dc1b77caa 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -147,6 +147,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index 436e5a2f363..b84fe5b8582 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -199,6 +199,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 9a325e8352a..7313e4929da 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -174,26 +174,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index b243198a7d1..297e45f3026 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -167,6 +167,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 030b93373c5..67eae0d697d 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -172,6 +172,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index eed62dfc44a..2c9e5b0a6d7 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -127,26 +127,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 10ad814795c..4cc10660edd 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -157,26 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index b93c45f5eed..6cf3d320c72 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index d87128d801a..7c83eea6eef 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 243b7290728..3695492cabc 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -122,6 +122,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index ab57bf6d6a0..fd564553197 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -188,6 +188,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 7c8747cc314..ad6c7fbcdba 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -173,6 +173,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index fa1c8204418..4638d9ab722 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -263,21 +263,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 47923af4e0c..08fba0b5166 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 7b3e5deaf59..b056e2332b4 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -218,6 +218,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index 7b12a2536ba..05a6bb33057 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -213,6 +213,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 76714c82aa4..abf25eaa694 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -128,6 +128,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index b12ff0e9d5e..ff0ab125236 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -93,6 +93,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 1eff17449b9..99f669d68d9 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -193,6 +193,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index 4dcbb645b04..05f614ae133 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -103,6 +103,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index f2c17bc6c45..80c5d8422ca 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -103,6 +103,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index ce78576c981..d955d449e48 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -293,6 +293,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 4af2d5a7369..6b6696d4869 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -103,16 +103,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 3fbe9e1206f5eeccadd15ee3976adc8c8b772c71 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:02:08 +0000
Subject: [PATCH 734/845] "-Synchronized-Data."

---
 1999/1xxx/CVE-1999-1199.json   |  5 +++
 2000/0xxx/CVE-2000-0505.json   |  5 ---
 2000/0xxx/CVE-2000-0913.json   |  5 ---
 2001/0xxx/CVE-2001-0925.json   |  5 ---
 2002/0xxx/CVE-2002-0392.json   | 10 ------
 2002/0xxx/CVE-2002-0661.json   |  5 +++
 2002/0xxx/CVE-2002-0840.json   |  5 +++
 2003/0xxx/CVE-2003-0017.json   | 10 ++++++
 2003/0xxx/CVE-2003-0083.json   | 10 ------
 2003/0xxx/CVE-2003-0134.json   | 10 ++++++
 2003/0xxx/CVE-2003-0192.json   |  5 ---
 2003/0xxx/CVE-2003-0254.json   | 15 +++++++++
 2003/0xxx/CVE-2003-0789.json   | 15 +++++++++
 2003/0xxx/CVE-2003-0993.json   |  5 +++
 2004/0xxx/CVE-2004-0493.json   |  5 ---
 2004/0xxx/CVE-2004-0748.json   | 15 +++++++++
 2004/0xxx/CVE-2004-0786.json   |  5 ---
 2004/0xxx/CVE-2004-0942.json   |  5 ---
 2005/2xxx/CVE-2005-2088.json   | 10 ++++++
 2005/2xxx/CVE-2005-2700.json   | 10 ------
 2005/2xxx/CVE-2005-2970.json   | 10 ------
 2006/3xxx/CVE-2006-3918.json   | 10 ------
 2007/3xxx/CVE-2007-3304.json   | 10 ++++++
 2007/3xxx/CVE-2007-3847.json   | 10 ------
 2007/6xxx/CVE-2007-6388.json   | 15 +++++++++
 2007/6xxx/CVE-2007-6422.json   | 10 ++++++
 2008/0xxx/CVE-2008-0005.json   |  5 +++
 2008/0xxx/CVE-2008-0456.json   | 15 ---------
 2008/2xxx/CVE-2008-2364.json   |  5 ---
 2009/1xxx/CVE-2009-1191.json   | 15 ---------
 2009/1xxx/CVE-2009-1955.json   | 15 +++++++++
 2009/1xxx/CVE-2009-1956.json   | 10 ++++++
 2009/2xxx/CVE-2009-2412.json   | 10 ------
 2009/2xxx/CVE-2009-2699.json   | 20 +++++++++++
 2009/3xxx/CVE-2009-3094.json   |  5 ---
 2009/3xxx/CVE-2009-3095.json   | 10 ------
 2009/3xxx/CVE-2009-3560.json   | 10 ------
 2009/3xxx/CVE-2009-3720.json   | 25 --------------
 2010/0xxx/CVE-2010-0010.json   |  5 +++
 2010/0xxx/CVE-2010-0408.json   | 15 +++++++++
 2010/0xxx/CVE-2010-0425.json   | 15 ---------
 2010/1xxx/CVE-2010-1452.json   | 15 +++++++++
 2010/1xxx/CVE-2010-1623.json   | 15 +++++++++
 2010/2xxx/CVE-2010-2791.json   |  5 +++
 2011/3xxx/CVE-2011-3192.json   |  5 ---
 2011/3xxx/CVE-2011-3348.json   |  5 +++
 2011/3xxx/CVE-2011-3368.json   | 20 -----------
 2011/3xxx/CVE-2011-3607.json   |  5 +++
 2011/4xxx/CVE-2011-4317.json   |  5 ---
 2012/0xxx/CVE-2012-0053.json   |  5 ---
 2012/0xxx/CVE-2012-0883.json   | 10 ------
 2012/2xxx/CVE-2012-2687.json   |  5 ---
 2012/3xxx/CVE-2012-3502.json   |  5 ---
 2012/4xxx/CVE-2012-4558.json   |  5 ---
 2013/1xxx/CVE-2013-1896.json   |  5 ---
 2013/6xxx/CVE-2013-6438.json   | 10 ------
 2014/0xxx/CVE-2014-0098.json   | 10 ------
 2014/0xxx/CVE-2014-0117.json   | 15 ---------
 2014/3xxx/CVE-2014-3581.json   | 15 ---------
 2015/3xxx/CVE-2015-3183.json   | 20 -----------
 2015/3xxx/CVE-2015-3185.json   | 15 ---------
 2016/1xxx/CVE-2016-1546.json   | 10 ------
 2017/3xxx/CVE-2017-3169.json   | 20 -----------
 2018/11xxx/CVE-2018-11763.json | 20 -----------
 2018/1xxx/CVE-2018-1301.json   | 20 -----------
 2019/0xxx/CVE-2019-0217.json   | 20 -----------
 2019/0xxx/CVE-2019-0220.json   | 20 -----------
 2019/10xxx/CVE-2019-10098.json | 20 -----------
 2019/9xxx/CVE-2019-9517.json   | 20 -----------
 2021/28xxx/CVE-2021-28935.json | 56 +++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29096.json |  5 +++
 2021/29xxx/CVE-2021-29097.json | 10 ++++++
 2021/29xxx/CVE-2021-29098.json | 10 ++++++
 2021/29xxx/CVE-2021-29343.json | 61 ++++++++++++++++++++++++++++++----
 74 files changed, 375 insertions(+), 517 deletions(-)

diff --git a/1999/1xxx/CVE-1999-1199.json b/1999/1xxx/CVE-1999-1199.json
index e7a7769ba25..8c233117523 100644
--- a/1999/1xxx/CVE-1999-1199.json
+++ b/1999/1xxx/CVE-1999-1199.json
@@ -76,6 +76,11 @@
                 "name": "19980808 Debian Apache Security Update",
                 "refsource": "BUGTRAQ",
                 "url": "http://marc.info/?l=bugtraq&m=90276683825862&w=2"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/0xxx/CVE-2000-0505.json b/2000/0xxx/CVE-2000-0505.json
index affb2e4b344..26f1f18085e 100644
--- a/2000/0xxx/CVE-2000-0505.json
+++ b/2000/0xxx/CVE-2000-0505.json
@@ -71,11 +71,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/0xxx/CVE-2000-0913.json b/2000/0xxx/CVE-2000-0913.json
index cc398596f51..0a09b83c6ac 100644
--- a/2000/0xxx/CVE-2000-0913.json
+++ b/2000/0xxx/CVE-2000-0913.json
@@ -101,11 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0925.json b/2001/0xxx/CVE-2001-0925.json
index 59934cb2de9..9a97a91fc32 100644
--- a/2001/0xxx/CVE-2001-0925.json
+++ b/2001/0xxx/CVE-2001-0925.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 95d1d6843ac..8eb662adc95 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -251,16 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index 8f44ac2bc70..b19ba6b2dfa 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -101,6 +101,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 76c681d59a9..c6aff684a85 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -201,6 +201,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 94438de9209..10029e44604 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -86,6 +86,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 84b59a2b496..23ca8af8f83 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -111,16 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index a8ba3c36e29..25a3c722d44 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -96,6 +96,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index ed978fae924..3b593f6a57e 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -111,11 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 931354c42a6..7bd07ab0ffd 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -96,6 +96,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index 5632b4cb40d..d8a320cbc84 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -146,6 +146,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index edcba885b9a..98056ecff7b 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -136,6 +136,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index f85c9d23291..c4fbf102a08 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index ace756938e3..fb06733159b 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -116,6 +116,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index 6efc0937c96..8c956c5c33f 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index 193d0104bc4..faf60e29857 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index 2cedb9b2869..f4431d59797 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -326,6 +326,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index c7a16d739b5..ce62c2903ea 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -351,16 +351,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 5691cf0497e..5f8da2ef98f 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -166,16 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index cd608d8b95a..8e35e8551b9 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -311,16 +311,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 8ee693f2f77..87e41890470 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -446,6 +446,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index efd43945a14..c1281ec5f58 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -416,16 +416,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 0f7dd31437b..74c0c467486 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -476,6 +476,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 724f3bf9aec..9adc7583f6b 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -181,6 +181,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 88643781716..23100159196 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -336,6 +336,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index 9398e2fb746..4b2f64f7d7c 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 7fb08ca34e7..65c70f6eaa2 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -356,11 +356,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 35c5ef610ed..7e40e675980 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -176,21 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index afa725d04b8..a768832da9d 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -311,6 +311,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index b0cc0056614..4f699fadbce 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -271,6 +271,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 4ea7dd35b70..516527c90f2 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -266,16 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 0e0dfdee900..bd1eb732e7a 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -116,6 +116,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index 99407c04909..149d5d1a20b 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -226,11 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index dfc0a659714..135ef2d9bff 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -216,16 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 17a4ca72673..4d5d3605892 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -301,16 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 8fd85fd03d8..21f8ff8845c 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -451,31 +451,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 0231bc14b1e..ee16e38a2cf 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index ac4f2edc021..b73921368cd 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -241,6 +241,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 4b67b96952c..1202fb9c757 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -211,21 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index 56c91d530b0..f70b0b8ab72 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -221,6 +221,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index 69970b30f70..a400db4c22d 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -286,6 +286,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 7777ca453fa..f99bc511479 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -116,6 +116,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 725a29489d3..d891f3827d4 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -391,11 +391,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index c3016665c34..fa697390049 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -186,6 +186,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 1d1a83b82c8..fe4a0aa1f78 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index ca7f499263e..f59374e7db0 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -246,6 +246,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 112e3f1fefd..5e7156c7060 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -191,11 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index a3cb25af74b..d67a58f7c77 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -241,11 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index b5f19d77c4e..ec78cefa185 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -181,16 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index e65ad97cf43..13d7c700bf2 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -221,11 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index fdc7481ae9a..4de3979887c 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index a7a3f81e8ef..36ce9a39aae 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -186,11 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index ea6e1365f64..48d3fced505 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -206,11 +206,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 25518513fa0..5b135f27411 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -261,16 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 0750d1ba95f..f45f87fc0b6 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -276,16 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index 15995d0c045..f1109ccd587 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -136,21 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index dad38851624..e4d84288e64 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index ce90bcde8cf..e6d11a79f75 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -276,26 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 7597d5d59df..a3777659f2b 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -181,21 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index 9786429fba9..f53945aa18d 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -121,16 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 5ebe95ddb08..92573751b84 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -204,26 +204,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 07d229598d2..645ab01fa55 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -147,26 +147,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index df7e26b952c..e00919c0231 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -152,26 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index b056e2332b4..d20db6e688d 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -203,26 +203,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index 05a6bb33057..edc40dbec30 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -198,26 +198,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 80c5d8422ca..776e054e766 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -88,26 +88,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index d955d449e48..82c0381db76 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -278,26 +278,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28935.json b/2021/28xxx/CVE-2021-28935.json
index f3151d78267..c19fb69bc3b 100644
--- a/2021/28xxx/CVE-2021-28935.json
+++ b/2021/28xxx/CVE-2021-28935.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28935",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28935",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "CMS Made Simple (CMSMS) 2.2.15 allows authenticated XSS via the /admin/addbookmark.php script through the Site Admin > My Preferences > Title field."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "http://dev.cmsmadesimple.org/bug/view/12432",
+                "refsource": "MISC",
+                "name": "http://dev.cmsmadesimple.org/bug/view/12432"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index 26d90377878..129cb31c68c 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -156,6 +156,11 @@
                 "name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
                 "refsource": "CONFIRM",
                 "url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-370/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-370/"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 46d2ce90597..7094bac30eb 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -187,6 +187,16 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 449062d70d7..3c61d72b8d7 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -161,6 +161,16 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29343.json b/2021/29xxx/CVE-2021-29343.json
index 97b11558231..1e2a2abe36f 100644
--- a/2021/29xxx/CVE-2021-29343.json
+++ b/2021/29xxx/CVE-2021-29343.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29343",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29343",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Ovidentia CMS 6.x contains a SQL injection vulnerability in the \"id\" parameter of index.php. The \"checkbox\" property into \"text\" data can be extracted and displayed in the text region or in source code."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "http://ovidentia.org",
+                "url": "http://ovidentia.org"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.exploit-db.com/exploits/49707",
+                "url": "https://www.exploit-db.com/exploits/49707"
             }
         ]
     }

From b5987d91bd7f524e7d9fb48072cecb48da821f35 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:02:24 +0000
Subject: [PATCH 735/845] "-Synchronized-Data."

---
 2001/0xxx/CVE-2001-0731.json   |  5 -----
 2002/0xxx/CVE-2002-0392.json   |  5 -----
 2002/0xxx/CVE-2002-0654.json   |  5 +++++
 2002/1xxx/CVE-2002-1156.json   |  5 +++++
 2002/1xxx/CVE-2002-1592.json   | 15 +++++++++++++++
 2002/1xxx/CVE-2002-1593.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0016.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0132.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0189.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0245.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0253.json   |  5 -----
 2003/0xxx/CVE-2003-0542.json   | 20 ++++++++++++++++++++
 2003/0xxx/CVE-2003-0987.json   | 10 ----------
 2004/0xxx/CVE-2004-0113.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0174.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0488.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0751.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0809.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0885.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0940.json   | 10 ----------
 2004/1xxx/CVE-2004-1834.json   |  5 -----
 2005/1xxx/CVE-2005-1268.json   |  5 -----
 2005/2xxx/CVE-2005-2491.json   |  5 -----
 2005/2xxx/CVE-2005-2728.json   | 10 ----------
 2005/3xxx/CVE-2005-3352.json   | 10 ++++++++++
 2005/3xxx/CVE-2005-3357.json   | 10 ----------
 2006/3xxx/CVE-2006-3747.json   | 15 +++++++++++++++
 2006/5xxx/CVE-2006-5752.json   |  5 +++++
 2007/1xxx/CVE-2007-1862.json   | 10 ----------
 2007/3xxx/CVE-2007-3304.json   | 10 ++++++++++
 2007/5xxx/CVE-2007-5000.json   |  5 +++++
 2007/6xxx/CVE-2007-6420.json   |  5 -----
 2007/6xxx/CVE-2007-6421.json   |  5 -----
 2008/0xxx/CVE-2008-0455.json   |  5 -----
 2008/2xxx/CVE-2008-2939.json   |  5 +++++
 2009/0xxx/CVE-2009-0023.json   |  5 -----
 2009/1xxx/CVE-2009-1195.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1890.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1891.json   |  5 -----
 2009/1xxx/CVE-2009-1955.json   |  5 -----
 2009/2xxx/CVE-2009-2412.json   |  5 -----
 2009/2xxx/CVE-2009-2699.json   |  5 -----
 2009/3xxx/CVE-2009-3094.json   | 20 --------------------
 2009/3xxx/CVE-2009-3095.json   |  5 +++++
 2009/3xxx/CVE-2009-3560.json   |  5 -----
 2009/3xxx/CVE-2009-3720.json   | 20 ++++++++++++++++++++
 2010/0xxx/CVE-2010-0408.json   |  5 -----
 2010/0xxx/CVE-2010-0425.json   | 10 ++++++++++
 2010/0xxx/CVE-2010-0434.json   | 10 ----------
 2010/1xxx/CVE-2010-1452.json   | 10 ----------
 2010/2xxx/CVE-2010-2068.json   | 10 ----------
 2010/2xxx/CVE-2010-2791.json   | 10 ----------
 2011/0xxx/CVE-2011-0419.json   | 10 ----------
 2011/3xxx/CVE-2011-3192.json   | 10 ++++++++++
 2011/3xxx/CVE-2011-3368.json   | 10 ++++++++++
 2011/3xxx/CVE-2011-3607.json   | 10 ++++++++++
 2012/0xxx/CVE-2012-0021.json   |  5 -----
 2012/0xxx/CVE-2012-0031.json   | 15 +++++++++++++++
 2012/0xxx/CVE-2012-0053.json   | 10 ++++++++++
 2012/3xxx/CVE-2012-3499.json   |  5 -----
 2012/4xxx/CVE-2012-4557.json   |  5 -----
 2013/1xxx/CVE-2013-1862.json   |  5 +++++
 2013/2xxx/CVE-2013-2249.json   |  5 -----
 2014/0xxx/CVE-2014-0118.json   | 10 ----------
 2014/0xxx/CVE-2014-0226.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0231.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3523.json   | 15 ---------------
 2014/3xxx/CVE-2014-3583.json   | 15 ---------------
 2015/0xxx/CVE-2015-0228.json   | 15 ---------------
 2015/0xxx/CVE-2015-0253.json   | 15 ---------------
 2016/4xxx/CVE-2016-4979.json   | 10 ----------
 2016/5xxx/CVE-2016-5387.json   | 15 ---------------
 2016/8xxx/CVE-2016-8743.json   | 10 ----------
 2017/7xxx/CVE-2017-7668.json   |  5 +++++
 2017/9xxx/CVE-2017-9798.json   |  5 +++++
 2018/1xxx/CVE-2018-1303.json   | 20 --------------------
 2018/8xxx/CVE-2018-8011.json   | 20 --------------------
 2019/0xxx/CVE-2019-0197.json   | 20 --------------------
 2019/10xxx/CVE-2019-10092.json | 20 --------------------
 2019/10xxx/CVE-2019-10097.json | 20 --------------------
 2020/11xxx/CVE-2020-11993.json | 10 ----------
 81 files changed, 370 insertions(+), 435 deletions(-)

diff --git a/2001/0xxx/CVE-2001-0731.json b/2001/0xxx/CVE-2001-0731.json
index d79b436aa0f..b9a5dc3b644 100644
--- a/2001/0xxx/CVE-2001-0731.json
+++ b/2001/0xxx/CVE-2001-0731.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 8eb662adc95..038158289f2 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -246,11 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index de451dbc690..97b3a97caf8 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index 1820e5bc99d..db0091cdf71 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index a47deba61cd..df6b8ca30fc 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -96,6 +96,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index 993b12bb1a3..a799abebfcb 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -101,6 +101,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index ce1973c6dcb..a4579b6c73c 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -111,6 +111,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 591aa0927d8..19361833730 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -156,6 +156,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 0972b8c1cac..93fc61092dd 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -116,6 +116,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 802ee3ac5f3..973a399298d 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 248b67efa25..d58f9735bcc 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 851f4e2d908..82f0a4681d3 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -276,6 +276,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index a664ad2f402..1a07dc1616a 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -141,16 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 2a77f406c40..83836e9dd01 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -161,6 +161,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index f1f767ba4aa..cb442fab2f0 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -186,6 +186,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index f5ef2b8305a..d4f6925f78b 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -176,6 +176,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index 29d92a51f7b..f8a19fc812f 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index 18ce4682566..2dd6935e76f 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -116,6 +116,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index 497474d3c4a..bb54e223e60 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -171,6 +171,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index 4e8e12e53be..8afb434c39d 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -126,16 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 10aedae087b..23207611d09 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index efc38abaecd..52730f6ffb3 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -176,11 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index a14dbe0c423..05b66822408 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -366,11 +366,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 7861382a1c6..5d0b4e06112 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -291,16 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index e18b9daa3a5..10bb0eeff71 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -441,6 +441,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index d0305b28678..a6492574a4a 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -356,16 +356,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index 7bd4b4a533f..e8a7ff3b59e 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -481,6 +481,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 09df5cb31bd..2e4bbe6a5c4 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -396,6 +396,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index 59f894dfa28..6e990ccfda3 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -161,16 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 87e41890470..48a4772a580 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -456,6 +456,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index d365be614e5..885a9c36739 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -506,6 +506,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index fa121d87f38..290471a2f46 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -186,11 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index dcee4e94f2d..62ba3f44caa 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -201,11 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index ba407cd19d5..a55eea4b05e 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -156,11 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index 1706b8c2d1d..33efbeaa861 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -331,6 +331,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index d012abf66dd..5a939039678 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -301,11 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 4df658a5e99..113ba1e5d88 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -241,6 +241,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 02444d1b377..518d3fdbf54 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -256,6 +256,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index f0adaaa2158..37f1cd247cd 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -286,11 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index a768832da9d..3f079b48a61 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -321,11 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 516527c90f2..728fead9675 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -261,11 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index bd1eb732e7a..2a6f0a96ec4 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -131,11 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index 149d5d1a20b..a0af195eebc 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -206,26 +206,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 135ef2d9bff..9a1eea1565c 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -216,6 +216,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 4d5d3605892..2be57d7d9b3 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -296,11 +296,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 21f8ff8845c..f377dac5e55 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -451,6 +451,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index b73921368cd..f4089f73d34 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -251,11 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 1202fb9c757..9a2fb9bdf5d 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -211,6 +211,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index 12e2abbaef7..d22280f3969 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -301,16 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index f70b0b8ab72..060366435de 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -226,16 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index d27a0a3ce30..83c6b5848e4 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -216,16 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index f99bc511479..4a7060f1ef3 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -111,16 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index 0d19647ec36..08a0247181a 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -326,16 +326,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index d891f3827d4..6f1a2a025af 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -391,6 +391,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index fe4a0aa1f78..8bea3e1527e 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -281,6 +281,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index f59374e7db0..cff66c4947d 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -251,6 +251,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index 6b37527970c..d52ecfc1a6f 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -171,11 +171,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index 7a590fb2822..da021163141 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -221,6 +221,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index d67a58f7c77..bf82791581b 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -241,6 +241,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 2c6c995e945..47b6de1e0cf 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -216,11 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index 3db52c75007..d7ad02c142e 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -131,11 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 287dae03dc1..2b72ddc9e98 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -226,6 +226,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index ee0d2685e9a..a9720ceade1 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -101,11 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index a53bd575a8b..8fc4a202c9f 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -231,16 +231,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index df1e2f6b5c9..c6dba617d5e 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -266,6 +266,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index 0d0118ae286..663e84dd3df 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -236,6 +236,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 01641bc40c1..377d3e74488 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -111,21 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index d83c4b71c79..5e56ec7a4e5 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index 90b3211c5c4..c9af2015ff2 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index 9e1002bd763..de836ed7bc4 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index e1ee30e910e..c0cbf4bdaaf 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -141,16 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index 9c31e64f189..2bfa91b1586 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -261,21 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index a6a60bd1edd..263eca07a63 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -182,16 +182,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 7313e4929da..0771730abb4 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -174,6 +174,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index feb4b6faa2e..9bcebf4a3e7 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -281,6 +281,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index c80423d9945..63962cac63e 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -142,26 +142,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 7c83eea6eef..2159bd6292a 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -106,26 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index ad6c7fbcdba..8fc64e81aa7 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -158,26 +158,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 99f669d68d9..116aa538c90 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -178,26 +178,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index 05f614ae133..a04e3fbd586 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -88,26 +88,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index ee20bc73e99..fa3f9613216 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -128,16 +128,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 3029b61f30d34c025b9ce1eff689eaa31c3cf8b6 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:02:39 +0000
Subject: [PATCH 736/845] "-Synchronized-Data."

---
 2000/1xxx/CVE-2000-1205.json   |  5 -----
 2001/0xxx/CVE-2001-0729.json   |  5 -----
 2001/0xxx/CVE-2001-0730.json   |  5 -----
 2002/0xxx/CVE-2002-0392.json   | 10 ++++++++++
 2002/0xxx/CVE-2002-0839.json   |  5 -----
 2002/1xxx/CVE-2002-1592.json   |  5 -----
 2003/0xxx/CVE-2003-0017.json   |  5 -----
 2003/0xxx/CVE-2003-0020.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0083.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0132.json   | 15 ---------------
 2003/0xxx/CVE-2003-0134.json   |  5 -----
 2003/0xxx/CVE-2003-0189.json   |  5 -----
 2003/0xxx/CVE-2003-0192.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0253.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0254.json   |  5 -----
 2003/0xxx/CVE-2003-0460.json   | 10 ----------
 2003/0xxx/CVE-2003-0789.json   |  5 -----
 2004/0xxx/CVE-2004-0174.json   | 20 --------------------
 2004/0xxx/CVE-2004-0488.json   | 15 ---------------
 2004/0xxx/CVE-2004-0492.json   |  5 +++++
 2004/0xxx/CVE-2004-0493.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0747.json   |  5 +++++
 2004/0xxx/CVE-2004-0748.json   |  5 -----
 2004/0xxx/CVE-2004-0751.json   |  5 -----
 2004/0xxx/CVE-2004-0786.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0809.json   |  5 -----
 2004/0xxx/CVE-2004-0811.json   |  5 +++++
 2004/0xxx/CVE-2004-0885.json   |  5 -----
 2004/0xxx/CVE-2004-0940.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0942.json   | 10 ++++++++++
 2004/1xxx/CVE-2004-1834.json   | 10 ++++++++++
 2005/1xxx/CVE-2005-1268.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2088.json   |  5 -----
 2005/2xxx/CVE-2005-2491.json   | 10 ++++++++++
 2005/3xxx/CVE-2005-3352.json   | 15 ---------------
 2006/5xxx/CVE-2006-5752.json   | 10 ----------
 2007/1xxx/CVE-2007-1863.json   | 20 --------------------
 2007/5xxx/CVE-2007-5000.json   | 15 ---------------
 2008/2xxx/CVE-2008-2364.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1891.json   | 10 ++++++++++
 2009/2xxx/CVE-2009-2412.json   | 10 ----------
 2009/2xxx/CVE-2009-2699.json   | 10 ----------
 2009/3xxx/CVE-2009-3095.json   | 20 --------------------
 2009/3xxx/CVE-2009-3560.json   | 10 ++++++++++
 2010/0xxx/CVE-2010-0434.json   | 15 ---------------
 2011/0xxx/CVE-2011-0419.json   | 15 ---------------
 2011/3xxx/CVE-2011-3192.json   | 15 ---------------
 2011/3xxx/CVE-2011-3348.json   | 15 ---------------
 2012/0xxx/CVE-2012-0021.json   |  5 -----
 2012/2xxx/CVE-2012-2687.json   |  5 -----
 2013/1xxx/CVE-2013-1896.json   |  5 -----
 2013/4xxx/CVE-2013-4352.json   | 15 ---------------
 2013/5xxx/CVE-2013-5704.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0098.json   | 10 ----------
 2015/3xxx/CVE-2015-3183.json   | 10 ++++++++++
 2016/0xxx/CVE-2016-0736.json   |  5 +++++
 2016/1xxx/CVE-2016-1546.json   | 15 +++++++++++++++
 2016/2xxx/CVE-2016-2161.json   |  5 +++++
 2016/4xxx/CVE-2016-4975.json   |  5 +++++
 2016/4xxx/CVE-2016-4979.json   | 15 +++++++++++++++
 2016/5xxx/CVE-2016-5387.json   | 20 ++++++++++++++++++++
 2016/8xxx/CVE-2016-8740.json   | 10 ----------
 2016/8xxx/CVE-2016-8743.json   | 15 +++++++++++++++
 2017/15xxx/CVE-2017-15710.json |  5 +++++
 2017/15xxx/CVE-2017-15715.json |  5 +++++
 2017/3xxx/CVE-2017-3167.json   |  5 +++++
 2017/3xxx/CVE-2017-3169.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7679.json   | 15 ---------------
 2017/9xxx/CVE-2017-9788.json   |  5 +++++
 2018/17xxx/CVE-2018-17199.json | 20 --------------------
 2018/1xxx/CVE-2018-1333.json   | 20 --------------------
 2019/0xxx/CVE-2019-0190.json   | 20 --------------------
 2019/10xxx/CVE-2019-10081.json | 20 --------------------
 2020/11xxx/CVE-2020-11984.json | 20 --------------------
 2020/11xxx/CVE-2020-11985.json | 15 ---------------
 2020/11xxx/CVE-2020-11993.json | 20 ++++++++++++++++++++
 2020/1xxx/CVE-2020-1927.json   | 10 ++++++++++
 2020/1xxx/CVE-2020-1934.json   | 20 ++++++++++++++++++++
 2020/9xxx/CVE-2020-9490.json   | 10 ----------
 2021/29xxx/CVE-2021-29097.json |  5 -----
 80 files changed, 365 insertions(+), 490 deletions(-)

diff --git a/2000/1xxx/CVE-2000-1205.json b/2000/1xxx/CVE-2000-1205.json
index 2d8cbe72ff8..82808bc802b 100644
--- a/2000/1xxx/CVE-2000-1205.json
+++ b/2000/1xxx/CVE-2000-1205.json
@@ -86,11 +86,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0729.json b/2001/0xxx/CVE-2001-0729.json
index 33ea27d56f0..c7d25d27db2 100644
--- a/2001/0xxx/CVE-2001-0729.json
+++ b/2001/0xxx/CVE-2001-0729.json
@@ -81,11 +81,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0730.json b/2001/0xxx/CVE-2001-0730.json
index 5aa07dd9564..f5030ecbb93 100644
--- a/2001/0xxx/CVE-2001-0730.json
+++ b/2001/0xxx/CVE-2001-0730.json
@@ -91,11 +91,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 038158289f2..6fcb2c3f8c6 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -246,6 +246,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0839.json b/2002/0xxx/CVE-2002-0839.json
index 9869a2f90d8..fb5142e3d4b 100644
--- a/2002/0xxx/CVE-2002-0839.json
+++ b/2002/0xxx/CVE-2002-0839.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index df6b8ca30fc..a27ed17115c 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 10029e44604..0e1e3c457d9 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -91,11 +91,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 7536f1c1381..f77bde2f278 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -206,6 +206,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 23ca8af8f83..1891eab849f 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -111,6 +111,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 19361833730..e28711658f9 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index 25a3c722d44..25d26121892 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -101,11 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 93fc61092dd..4b85231437d 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -126,11 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index 3b593f6a57e..be8a509622c 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -111,6 +111,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index d58f9735bcc..15e20bc11c2 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -96,6 +96,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 7bd07ab0ffd..7a38e150994 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index de3b54acf9c..c286af2eb03 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -66,16 +66,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index d8a320cbc84..ad909d256d5 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -156,11 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index cb442fab2f0..030202a06cd 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -176,26 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index d4f6925f78b..cccbc705e17 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -171,21 +171,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 0c66d182274..f0565130e97 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -156,6 +156,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index c4fbf102a08..c727450735e 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index e5f79263938..40c170fe7d7 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index fb06733159b..ddf1ec94c7c 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -126,11 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index f8a19fc812f..bd1f509978e 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -131,11 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index 8c956c5c33f..5813e268e7b 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -116,6 +116,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index 2dd6935e76f..913c18dd5e2 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -126,11 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index ff17438d5a4..eec28e0e670 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -116,6 +116,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index bb54e223e60..537bf689af0 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -176,11 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index 8afb434c39d..6d6a1ff7510 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -126,6 +126,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index faf60e29857..8c51dd9a269 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 23207611d09..ff092666de2 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index 52730f6ffb3..df7a6eec1f2 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -176,6 +176,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index f4431d59797..d31986c890d 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -331,11 +331,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index 05b66822408..fc379b48e04 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -366,6 +366,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 10bb0eeff71..0a3fb4761d1 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -436,21 +436,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 2e4bbe6a5c4..4caf359228c 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -391,16 +391,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 9dd786b3b48..4e24ed2382d 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -326,26 +326,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 885a9c36739..1341721124e 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -496,21 +496,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 65c70f6eaa2..4dd8e5d4080 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -356,6 +356,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 37f1cd247cd..8a19fe6f84e 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -286,6 +286,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 728fead9675..0b4cfefefa0 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -251,16 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 2a6f0a96ec4..1159e4565ef 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -121,16 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 9a1eea1565c..3e5d070f3c3 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -201,26 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 2be57d7d9b3..c28be6088bf 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -296,6 +296,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index d22280f3969..cbf42039553 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -286,21 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index 08a0247181a..c42b2d36807 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -311,21 +311,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 6f1a2a025af..469a71d3c47 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -386,21 +386,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index fa697390049..eaf54387f43 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -176,21 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index d52ecfc1a6f..8121b778511 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -166,11 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 13d7c700bf2..85ae846b3cb 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -216,11 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 48d3fced505..5d97402be1d 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -201,11 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 467596d0f43..64f214af238 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -96,21 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index 64e1d53a7e9..9d3ba9683ec 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -251,6 +251,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index f45f87fc0b6..6ee92f142f4 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -266,16 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index e6d11a79f75..5edd23877dc 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -276,6 +276,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index fddaf553c41..64062ac8603 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -162,6 +162,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index f53945aa18d..b409b1eb2af 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -121,6 +121,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 09d16453e81..6aa4a6e19fd 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -157,6 +157,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index f3de51dd992..dc67e30dcce 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -154,6 +154,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index c0cbf4bdaaf..1844d6d81c5 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -141,6 +141,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index 2bfa91b1586..f331bfb5528 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -261,6 +261,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index 8fd4103b053..f2cdf40e401 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -146,16 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index 263eca07a63..00de20f8359 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -182,6 +182,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 4d98d6afd0a..03ee3c5a111 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -173,6 +173,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 32dc1b77caa..020bcaecb71 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -162,6 +162,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index b84fe5b8582..0be78dfe52a 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -214,6 +214,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 92573751b84..6cc29b7b1fd 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -204,6 +204,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 4db523e52cb..6f77512b29b 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -214,21 +214,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index f5fc3a170af..481af969521 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -225,6 +225,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 67eae0d697d..28e36377c30 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -157,26 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index 6cf3d320c72..2646af159ee 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -136,26 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 3695492cabc..d4116794d8e 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -107,26 +107,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index abf25eaa694..8f936e0ccd1 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -113,26 +113,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index b14ef2759d0..6c32a0defa2 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -153,26 +153,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index 79114da19cc..a3afd2c8f30 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -78,21 +78,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index fa3f9613216..2d1d38001cf 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -128,6 +128,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 5ceac293627..9334a281a6a 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -128,6 +128,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 6b6696d4869..c850ea9b5a1 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -103,6 +103,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 8f6ed041ee2..7938f2397ea 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -128,16 +128,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 7094bac30eb..b038d8cf808 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -192,11 +192,6 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/"
             }
         ]
     },

From fe0bed1e8d93fd43e7534fb283d8c8fc3c26a050 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 12:02:56 +0000
Subject: [PATCH 737/845] "-Synchronized-Data."

---
 2000/1xxx/CVE-2000-1204.json   |  5 -----
 2002/1xxx/CVE-2002-1593.json   |  5 -----
 2003/0xxx/CVE-2003-0016.json   |  5 -----
 2003/0xxx/CVE-2003-0017.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0020.json   |  5 -----
 2003/0xxx/CVE-2003-0083.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0132.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0245.json   |  5 -----
 2003/0xxx/CVE-2003-0253.json   |  5 -----
 2003/0xxx/CVE-2003-0460.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0542.json   |  5 -----
 2003/0xxx/CVE-2003-0987.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0993.json   |  5 +++++
 2004/0xxx/CVE-2004-0113.json   |  5 -----
 2005/2xxx/CVE-2005-2700.json   |  5 +++++
 2005/2xxx/CVE-2005-2970.json   |  5 -----
 2005/3xxx/CVE-2005-3352.json   | 10 ++++++++++
 2006/3xxx/CVE-2006-3747.json   |  5 -----
 2006/5xxx/CVE-2006-5752.json   | 15 +++++++++++++++
 2007/1xxx/CVE-2007-1863.json   |  5 +++++
 2007/3xxx/CVE-2007-3847.json   |  5 -----
 2007/6xxx/CVE-2007-6388.json   |  5 +++++
 2009/1xxx/CVE-2009-1955.json   |  5 -----
 2009/1xxx/CVE-2009-1956.json   |  5 -----
 2009/2xxx/CVE-2009-2412.json   |  5 +++++
 2009/2xxx/CVE-2009-2699.json   |  5 +++++
 2009/3xxx/CVE-2009-3094.json   |  5 +++++
 2009/3xxx/CVE-2009-3095.json   |  5 +++++
 2009/3xxx/CVE-2009-3560.json   | 15 ---------------
 2009/3xxx/CVE-2009-3720.json   | 15 ---------------
 2010/0xxx/CVE-2010-0010.json   | 10 ----------
 2010/0xxx/CVE-2010-0408.json   |  5 -----
 2010/0xxx/CVE-2010-0425.json   | 15 ---------------
 2017/7xxx/CVE-2017-7659.json   |  5 -----
 2017/7xxx/CVE-2017-7668.json   | 10 ++++++++++
 2017/7xxx/CVE-2017-7679.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9788.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9789.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9798.json   | 10 ++++++++++
 2018/11xxx/CVE-2018-11763.json | 15 +++++++++++++++
 2018/17xxx/CVE-2018-17189.json |  5 -----
 2018/1xxx/CVE-2018-1283.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1301.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1302.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1303.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1312.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1333.json   | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10098.json |  5 +++++
 48 files changed, 285 insertions(+), 135 deletions(-)

diff --git a/2000/1xxx/CVE-2000-1204.json b/2000/1xxx/CVE-2000-1204.json
index 5a2580a44de..9951f290623 100644
--- a/2000/1xxx/CVE-2000-1204.json
+++ b/2000/1xxx/CVE-2000-1204.json
@@ -61,11 +61,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index a799abebfcb..a569e22d3ff 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -111,11 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index a4579b6c73c..2257d777ada 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -121,11 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 0e1e3c457d9..cd23d40ffa8 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -91,6 +91,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index f77bde2f278..d60a3e8fff1 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -211,11 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 1891eab849f..5dacade03ca 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index e28711658f9..e1eddf688f2 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 973a399298d..050f6790cb8 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 15e20bc11c2..115c263a790 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index c286af2eb03..033c6dd549e 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -66,6 +66,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 82f0a4681d3..d03ba6bf77e 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -291,11 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index 1a07dc1616a..ddd8dd14365 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -141,6 +141,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index 98056ecff7b..a0c50e77ee4 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -141,6 +141,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 83836e9dd01..867ff378ef5 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -166,11 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index ce62c2903ea..47437094513 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -351,6 +351,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 5f8da2ef98f..e2e433d6682 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -161,11 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 0a3fb4761d1..7ace5d1154e 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -436,6 +436,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index e8a7ff3b59e..ff53ab8d2e9 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -491,11 +491,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 4caf359228c..960da394151 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -391,6 +391,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 4e24ed2382d..f91eb48088f 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -326,6 +326,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index c1281ec5f58..d4f2ea44eca 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -411,11 +411,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 74c0c467486..73542e0301b 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -491,6 +491,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index 3f079b48a61..84a440e4ca1 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -316,11 +316,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index 4f699fadbce..a3c09674434 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -276,11 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 0b4cfefefa0..b9c59a24236 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -251,6 +251,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 1159e4565ef..634453cb691 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index a0af195eebc..00de8e6ed01 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -206,6 +206,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 3e5d070f3c3..72ee0adf35c 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -201,6 +201,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index c28be6088bf..a8fb059def6 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -291,21 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index f377dac5e55..0b8044cbfe4 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -456,21 +456,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index ee16e38a2cf..8c77d630ed8 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -146,16 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index f4089f73d34..f7fc40069b9 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -246,11 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 9a2fb9bdf5d..e140e209ed6 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -206,21 +206,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index 01c77cda418..a7f0c711260 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 0771730abb4..f7f0c834223 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -179,6 +179,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 6f77512b29b..65ecccda8c6 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -214,6 +214,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index 481af969521..0549d0b5c67 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -230,6 +230,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index 7ee91f35cc8..bdb6a575642 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -117,6 +117,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 9bcebf4a3e7..94929ad685d 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -286,6 +286,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 645ab01fa55..bd36d1305b7 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -147,6 +147,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 297e45f3026..fea3d369755 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -182,11 +182,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 19e84ef79df..952a8ea74a3 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -142,6 +142,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index e00919c0231..842dfb217de 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -152,6 +152,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 2c9e5b0a6d7..8183a82e38b 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -127,6 +127,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index 63962cac63e..6732682e209 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -142,6 +142,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 4cc10660edd..c03e67bf6b0 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -157,6 +157,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index 2646af159ee..b8b77830916 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 776e054e766..9dc0568b2e8 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -88,6 +88,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 95ff5601adc3af29d72c55923473bee6fbb44af9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:00:40 +0000
Subject: [PATCH 738/845] "-Synchronized-Data."

---
 2002/0xxx/CVE-2002-0661.json   |  5 +++++
 2002/0xxx/CVE-2002-0840.json   |  5 +++++
 2003/0xxx/CVE-2003-0134.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0189.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0192.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0254.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0789.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0748.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0786.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2088.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2491.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2728.json   |  5 +++++
 2005/2xxx/CVE-2005-2970.json   | 10 ++++++++++
 2005/3xxx/CVE-2005-3357.json   |  5 -----
 2006/3xxx/CVE-2006-3918.json   |  5 +++++
 2007/1xxx/CVE-2007-1862.json   | 20 +++++++++++++++++++
 2007/3xxx/CVE-2007-3304.json   | 20 +++++++++++++++++++
 2007/3xxx/CVE-2007-3847.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6388.json   | 15 +++++++++++++++
 2007/6xxx/CVE-2007-6420.json   | 20 +++++++++++++++++++
 2007/6xxx/CVE-2007-6421.json   | 20 +++++++++++++++++++
 2007/6xxx/CVE-2007-6422.json   | 20 +++++++++++++++++++
 2008/0xxx/CVE-2008-0005.json   | 20 +++++++++++++++++++
 2008/0xxx/CVE-2008-0455.json   | 15 +++++++++++++++
 2008/0xxx/CVE-2008-0456.json   | 30 +++++++++++++++++++++++++++++
 2008/2xxx/CVE-2008-2364.json   | 20 +++++++++++++++++++
 2008/2xxx/CVE-2008-2939.json   | 20 +++++++++++++++++++
 2009/0xxx/CVE-2009-0023.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1191.json   | 30 +++++++++++++++++++++++++++++
 2009/1xxx/CVE-2009-1195.json   | 20 +++++++++++++++++++
 2009/1xxx/CVE-2009-1890.json   | 20 +++++++++++++++++++
 2009/1xxx/CVE-2009-1891.json   | 20 +++++++++++++++++++
 2009/1xxx/CVE-2009-1955.json   | 25 ++++++++++++++++++++++++
 2009/2xxx/CVE-2009-2412.json   | 30 +++++++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3094.json   | 20 +++++++++++++++++++
 2009/3xxx/CVE-2009-3720.json   | 30 +++++++++++++++++++++++++++++
 2010/0xxx/CVE-2010-0408.json   | 20 +++++++++++++++++++
 2010/0xxx/CVE-2010-0425.json   | 30 +++++++++++++++++++++++++++++
 2010/1xxx/CVE-2010-1623.json   |  5 +++++
 2011/0xxx/CVE-2011-0419.json   | 35 ++++++++++++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3192.json   | 35 ++++++++++++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3348.json   | 25 ++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3607.json   | 20 +++++++++++++++++++
 2012/0xxx/CVE-2012-0021.json   | 25 ++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0053.json   |  5 +++++
 2012/0xxx/CVE-2012-0883.json   | 25 ++++++++++++++++++++++++
 2012/2xxx/CVE-2012-2687.json   | 25 ++++++++++++++++++++++++
 2013/6xxx/CVE-2013-6438.json   |  5 +++++
 2014/0xxx/CVE-2014-0098.json   | 30 +++++++++++++++++++++++++++++
 2014/0xxx/CVE-2014-0117.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3583.json   | 10 ++++++++++
 2015/3xxx/CVE-2015-3185.json   | 10 ++++++++++
 2016/4xxx/CVE-2016-4979.json   | 10 ----------
 2017/15xxx/CVE-2017-15710.json | 15 ---------------
 2017/3xxx/CVE-2017-3169.json   |  5 -----
 2017/7xxx/CVE-2017-7659.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7668.json   | 10 ++++++++++
 2018/11xxx/CVE-2018-11763.json |  5 -----
 2018/17xxx/CVE-2018-17189.json |  5 -----
 2018/17xxx/CVE-2018-17199.json |  5 +++++
 2018/1xxx/CVE-2018-1283.json   |  5 -----
 2018/1xxx/CVE-2018-1301.json   |  5 -----
 2018/8xxx/CVE-2018-8011.json   |  5 +++++
 2019/0xxx/CVE-2019-0196.json   | 10 ----------
 2019/0xxx/CVE-2019-0197.json   |  5 +++++
 2019/0xxx/CVE-2019-0215.json   |  5 +++++
 2019/10xxx/CVE-2019-10082.json | 10 ----------
 2019/10xxx/CVE-2019-10092.json |  5 +++++
 2019/10xxx/CVE-2019-10097.json | 30 +++++++++++++++++++++++++++++
 2019/10xxx/CVE-2019-10098.json | 25 ++++++++++++++++++++++++
 2020/11xxx/CVE-2020-11984.json | 35 ++++++++++++++++++++++++++++++++++
 2020/11xxx/CVE-2020-11985.json | 25 ++++++++++++++++++++++++
 2020/1xxx/CVE-2020-1927.json   | 15 ---------------
 2020/1xxx/CVE-2020-1934.json   | 10 ++++++++++
 2021/29xxx/CVE-2021-29098.json |  5 -----
 75 files changed, 1045 insertions(+), 95 deletions(-)

diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index b19ba6b2dfa..04115e25a84 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index c6aff684a85..62511b95ca8 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -206,6 +206,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index 25d26121892..5c2ae226e0f 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -101,6 +101,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 4b85231437d..1f83050a43e 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index be8a509622c..7281a90c38d 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -121,6 +121,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 7a38e150994..50243803d64 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index ad909d256d5..dbf9cbfac82 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -156,6 +156,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index ddf1ec94c7c..9363d444e20 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index 5813e268e7b..cecf6e0039d 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index d31986c890d..21391773b2d 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -331,6 +331,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index fc379b48e04..c69a559594b 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -376,6 +376,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 5d0b4e06112..24855d639c3 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -291,6 +291,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index e2e433d6682..01e9f12aebd 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -161,6 +161,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index a6492574a4a..58a81b6a388 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -351,11 +351,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index 8e35e8551b9..ab109489f85 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -311,6 +311,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index 6e990ccfda3..3a054d6ae65 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -161,6 +161,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 48a4772a580..836f0adb9ec 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -466,6 +466,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index d4f2ea44eca..9ee32ed72f7 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -411,6 +411,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 73542e0301b..7aba1f67e99 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -496,6 +496,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index 290471a2f46..b19c2b13c3f 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -186,6 +186,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index 62ba3f44caa..3ac1f6c5c82 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -201,6 +201,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 9adc7583f6b..795ce08bdfe 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -191,6 +191,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 23100159196..0e379ba1b0a 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -341,6 +341,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index a55eea4b05e..256ac72c890 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -156,6 +156,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index 4b2f64f7d7c..19a5e3e0b2b 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -146,6 +146,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 4dd8e5d4080..520d066b86b 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -366,6 +366,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index 33efbeaa861..a426ea694eb 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -336,6 +336,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index 5a939039678..8b6708025de 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -301,6 +301,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 7e40e675980..81b00d1d37a 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -176,6 +176,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 113ba1e5d88..80af2936b24 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -251,6 +251,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 518d3fdbf54..492e4880e8d 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -266,6 +266,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 8a19fe6f84e..bdc9c556804 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -296,6 +296,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index 84a440e4ca1..9c308b58df6 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -316,6 +316,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index b9c59a24236..3ed6820db8b 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -256,6 +256,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index 00de8e6ed01..99407c04909 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -211,6 +211,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 0b8044cbfe4..22866266103 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -456,6 +456,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index f7fc40069b9..db419274246 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -246,6 +246,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index e140e209ed6..03339995d8b 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -206,6 +206,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index a400db4c22d..546ac3c92b7 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -301,6 +301,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index c42b2d36807..31f069c78f3 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -311,6 +311,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 469a71d3c47..507c6283abc 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -386,6 +386,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index eaf54387f43..c540eacb7f7 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -176,6 +176,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index cff66c4947d..7e7daed7284 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -261,6 +261,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index 8121b778511..a592d6e1822 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -166,6 +166,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index bf82791581b..76cdaee34bb 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -251,6 +251,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index ec78cefa185..0c97b4251af 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -181,6 +181,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 85ae846b3cb..7ba2f33df23 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -216,6 +216,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 5b135f27411..85cd345d50a 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -261,6 +261,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 6ee92f142f4..20a60eade0b 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -266,6 +266,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index f1109ccd587..2646e7fc6c8 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index 5e56ec7a4e5..9f0221a427e 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index a3777659f2b..1ea08a0845d 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -181,6 +181,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index 1844d6d81c5..c2deb56b367 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -146,16 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 03ee3c5a111..33fbf750c81 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -163,21 +163,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 6cc29b7b1fd..8d062999afe 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -214,11 +214,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index a7f0c711260..c144b349f25 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index f7f0c834223..cfbfe86bffb 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -189,6 +189,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index bd36d1305b7..174143c7dbe 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -157,11 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index fea3d369755..48d85fa09c2 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -177,11 +177,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 28e36377c30..eef3499325f 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -157,6 +157,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 952a8ea74a3..4a531b1f307 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -152,11 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index 842dfb217de..6eec31b351b 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -162,11 +162,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 2159bd6292a..48ceae53c48 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index fd564553197..5d1ff963c56 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -198,16 +198,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 8fc64e81aa7..0fe004fd496 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -158,6 +158,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 08fba0b5166..4455cca6a9a 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -156,6 +156,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index ff0ab125236..ac6403611d2 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -88,16 +88,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 116aa538c90..ffa421cc2f9 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -178,6 +178,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index a04e3fbd586..4468a23fa79 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -88,6 +88,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 9dc0568b2e8..f9592900b4b 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -93,6 +93,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 6c32a0defa2..90f8f94c2a3 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -153,6 +153,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml",
+                "url": "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index a3afd2c8f30..947a1586f05 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -78,6 +78,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 9334a281a6a..168e23c0d19 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -123,21 +123,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index c850ea9b5a1..e2745daf82f 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -123,6 +123,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 3c61d72b8d7..7a7c7c6d28c 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -166,11 +166,6 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
             }
         ]
     },

From 7ee99c26288b33279b5f3bdca3200aa8cd124f7f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:00:57 +0000
Subject: [PATCH 739/845] "-Synchronized-Data."

---
 2002/0xxx/CVE-2002-0654.json   |  5 +++++
 2002/1xxx/CVE-2002-1156.json   |  5 +++++
 2002/1xxx/CVE-2002-1592.json   | 10 ++++++++++
 2002/1xxx/CVE-2002-1593.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0132.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0245.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0113.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0751.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0809.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0885.json   | 10 ++++++++++
 2005/3xxx/CVE-2005-3357.json   | 10 ++++++++++
 2006/3xxx/CVE-2006-3747.json   | 10 ++++++++++
 2006/5xxx/CVE-2006-5752.json   | 25 ++++++++++++++++++++++++
 2008/0xxx/CVE-2008-0455.json   |  5 +++++
 2008/2xxx/CVE-2008-2939.json   | 10 ----------
 2009/1xxx/CVE-2009-1890.json   | 10 ----------
 2009/1xxx/CVE-2009-1891.json   | 10 ----------
 2009/1xxx/CVE-2009-1955.json   | 10 ----------
 2009/2xxx/CVE-2009-2699.json   | 20 +++++++++++++++++++
 2009/3xxx/CVE-2009-3095.json   | 30 +++++++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3560.json   | 30 +++++++++++++++++++++++++++++
 2010/0xxx/CVE-2010-0434.json   | 20 +++++++++++++++++++
 2010/1xxx/CVE-2010-1452.json   |  5 +++++
 2010/2xxx/CVE-2010-2791.json   | 20 +++++++++++++++++++
 2011/0xxx/CVE-2011-0419.json   | 15 ---------------
 2011/3xxx/CVE-2011-3192.json   | 15 ---------------
 2011/3xxx/CVE-2011-3368.json   |  5 +++++
 2011/3xxx/CVE-2011-3607.json   | 15 ---------------
 2012/0xxx/CVE-2012-0031.json   | 20 +++++++++++++++++++
 2012/0xxx/CVE-2012-0053.json   | 15 +++++++++++++++
 2012/0xxx/CVE-2012-0883.json   | 10 ++++++++++
 2012/2xxx/CVE-2012-2687.json   | 10 ++++++++++
 2012/3xxx/CVE-2012-3499.json   | 30 +++++++++++++++++++++++++++++
 2013/1xxx/CVE-2013-1862.json   |  5 +++++
 2013/1xxx/CVE-2013-1896.json   | 35 ++++++++++++++++++++++++++++++++++
 2013/4xxx/CVE-2013-4352.json   |  5 +++++
 2013/6xxx/CVE-2013-6438.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0098.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0118.json   |  5 +++++
 2014/0xxx/CVE-2014-0226.json   | 20 +++++++++++++++++++
 2014/0xxx/CVE-2014-0231.json   | 20 +++++++++++++++++++
 2014/3xxx/CVE-2014-3523.json   | 30 +++++++++++++++++++++++++++++
 2014/3xxx/CVE-2014-3581.json   | 25 ++++++++++++++++++++++++
 2014/8xxx/CVE-2014-8109.json   | 10 ++++++++++
 2015/3xxx/CVE-2015-3183.json   | 15 +++++++++++++++
 2016/0xxx/CVE-2016-0736.json   | 10 ----------
 2016/1xxx/CVE-2016-1546.json   | 10 ++++++++++
 2016/8xxx/CVE-2016-8743.json   |  5 +++++
 2017/15xxx/CVE-2017-15710.json |  5 +++++
 2017/15xxx/CVE-2017-15715.json | 15 ---------------
 2017/7xxx/CVE-2017-7668.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7679.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9788.json   | 25 ++++++++++++++++++++++++
 2017/9xxx/CVE-2017-9789.json   |  5 -----
 2017/9xxx/CVE-2017-9798.json   |  5 -----
 2018/17xxx/CVE-2018-17199.json |  5 +++++
 2018/1xxx/CVE-2018-1302.json   | 10 ----------
 2018/1xxx/CVE-2018-1303.json   |  5 -----
 2018/1xxx/CVE-2018-1312.json   |  5 -----
 2018/1xxx/CVE-2018-1333.json   | 10 ----------
 2018/8xxx/CVE-2018-8011.json   |  5 +++++
 2019/0xxx/CVE-2019-0190.json   |  5 +++++
 2019/0xxx/CVE-2019-0197.json   |  5 +++++
 2019/0xxx/CVE-2019-0211.json   |  5 +++++
 2019/0xxx/CVE-2019-0215.json   |  5 +++++
 2019/0xxx/CVE-2019-0217.json   |  5 +++++
 2019/0xxx/CVE-2019-0220.json   |  5 +++++
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/10xxx/CVE-2019-10082.json | 20 +++++++++++++++++++
 2019/10xxx/CVE-2019-10092.json |  5 +++++
 2019/9xxx/CVE-2019-9517.json   |  5 +++++
 2020/11xxx/CVE-2020-11984.json | 30 -----------------------------
 2020/11xxx/CVE-2020-11985.json |  5 +++++
 2020/11xxx/CVE-2020-11993.json | 15 ---------------
 2020/1xxx/CVE-2020-1927.json   | 10 ++++++++++
 2020/1xxx/CVE-2020-1934.json   | 15 ---------------
 2020/9xxx/CVE-2020-9490.json   |  5 +++++
 77 files changed, 715 insertions(+), 210 deletions(-)

diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index 97b3a97caf8..6e987afc14a 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -111,6 +111,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index db0091cdf71..07929d2eb61 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -111,6 +111,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index a27ed17115c..2227830478c 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index a569e22d3ff..f46842b6acb 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -111,6 +111,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index e1eddf688f2..2193ff68018 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -161,6 +161,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 050f6790cb8..4319ed12410 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 867ff378ef5..728c2ce9a29 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -166,6 +166,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index bd1f509978e..fa491c94aa2 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index 913c18dd5e2..c5cda0a063c 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index 537bf689af0..f2048e0aa11 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -176,6 +176,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index 58a81b6a388..327ad87353e 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -351,6 +351,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index ff53ab8d2e9..d5aaef6767a 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -491,6 +491,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 960da394151..8b5f8fc6fb2 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -406,6 +406,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index 256ac72c890..3740d5cf56d 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -171,6 +171,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index a426ea694eb..cd1d398f9fc 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -346,16 +346,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 492e4880e8d..e848ed7b86e 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -276,16 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index bdc9c556804..bf2222221d6 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -306,16 +306,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index 9c308b58df6..0b84de975f8 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -331,16 +331,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 634453cb691..48ea6c42dff 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -126,6 +126,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 72ee0adf35c..2879a97266f 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -206,6 +206,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index a8fb059def6..070442045ff 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -291,6 +291,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index cbf42039553..0ec8901bba4 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -286,6 +286,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index 060366435de..09f59674257 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -226,6 +226,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 4a7060f1ef3..af192d678df 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -111,6 +111,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index 31f069c78f3..fd1d63dcc0b 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -331,21 +331,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 507c6283abc..57da8b5e3ac 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -406,21 +406,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 8bea3e1527e..a056d7ae11d 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -291,6 +291,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index 7e7daed7284..ef635fccd80 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -266,21 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index da021163141..217d058653a 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -236,6 +236,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index 76cdaee34bb..1e9a86366b0 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -256,6 +256,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index 0c97b4251af..d73954dddb6 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -206,6 +206,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 7ba2f33df23..46d3a832773 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -241,6 +241,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 47b6de1e0cf..456d5e80088 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -216,6 +216,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 2b72ddc9e98..52f913861bf 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -231,6 +231,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 5d97402be1d..3b2ee02af03 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -201,6 +201,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 64f214af238..a76ce416de4 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -96,6 +96,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 85cd345d50a..6f469fb06f7 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -266,6 +266,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 20a60eade0b..18e98b15392 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -296,6 +296,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index 8fc4a202c9f..2a2709d99ef 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -231,6 +231,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index c6dba617d5e..a268c40c725 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -276,6 +276,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index 663e84dd3df..dba9876edd7 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -246,6 +246,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 377d3e74488..96e4fe322c1 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -111,6 +111,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index e4d84288e64..a54786a45b1 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -151,6 +151,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index bdccd3f355a..d6d5cb41f60 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index 5edd23877dc..e06311ebd9f 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -286,6 +286,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index 64062ac8603..5b285ba83df 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -157,16 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index b409b1eb2af..31c2b109e5d 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index 00de20f8359..d6c1d1c2a9f 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -197,6 +197,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 33fbf750c81..51b91c5400c 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -163,6 +163,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 020bcaecb71..fe9e8478218 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -152,21 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index cfbfe86bffb..e5d0a8c78be 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -199,6 +199,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 65ecccda8c6..f2db8e67bdb 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -224,6 +224,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index 0549d0b5c67..88ebd3afcfa 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -240,6 +240,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index bdb6a575642..95517599f28 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -122,11 +122,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 94929ad685d..2f3c4d1850e 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -291,11 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index eef3499325f..af815922275 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -162,6 +162,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 8183a82e38b..18ee245c707 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -132,16 +132,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index 6732682e209..e864f54d8bd 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -152,11 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index c03e67bf6b0..504a610e2b4 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -167,11 +167,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index b8b77830916..a801cf06c2f 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -141,16 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 48ceae53c48..81287146f38 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -111,6 +111,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index d4116794d8e..633de2f2768 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -107,6 +107,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 0fe004fd496..2faa53d35c1 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -163,6 +163,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 4638d9ab722..042257e4ba2 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -263,6 +263,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 4455cca6a9a..84f85c88a7e 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -161,6 +161,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index d20db6e688d..7b15385ce9b 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -203,6 +203,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index edc40dbec30..cfa70311cd3 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -198,6 +198,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 8f936e0ccd1..2d6efe1bcb9 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -113,6 +113,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index ac6403611d2..39871c6f3bc 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -88,6 +88,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index ffa421cc2f9..2305431dc22 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -183,6 +183,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index 82c0381db76..21538ad3d0c 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -278,6 +278,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 90f8f94c2a3..55e663b26bd 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -158,36 +158,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml",
-                "url": "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index 947a1586f05..2d95d65e8ea 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -103,6 +103,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index 2d1d38001cf..d2bd3193699 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -133,21 +133,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 168e23c0d19..7e150a98a98 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -123,6 +123,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index e2745daf82f..17df50a3f1f 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -118,21 +118,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 7938f2397ea..68f06c9252e 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -128,6 +128,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 8e00cac5fe1bfff4e7d45c691156d5a35cc67f00 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:01:13 +0000
Subject: [PATCH 740/845] "-Synchronized-Data."

---
 2003/0xxx/CVE-2003-0016.json   | 10 +++++++++
 2003/0xxx/CVE-2003-0020.json   | 10 +++++++++
 2003/0xxx/CVE-2003-0253.json   | 10 +++++++++
 2003/0xxx/CVE-2003-0542.json   | 10 +++++++++
 2004/0xxx/CVE-2004-0174.json   | 25 +++++++++++++++++++++
 2004/0xxx/CVE-2004-0488.json   | 20 +++++++++++++++++
 2004/0xxx/CVE-2004-0493.json   | 10 +++++++++
 2004/0xxx/CVE-2004-0747.json   | 10 +++++++++
 2004/1xxx/CVE-2004-1834.json   | 10 +++++++++
 2005/1xxx/CVE-2005-1268.json   | 10 +++++++++
 2005/3xxx/CVE-2005-3352.json   | 25 +++++++++++++++++++++
 2006/3xxx/CVE-2006-3747.json   | 15 +++++++++++++
 2006/5xxx/CVE-2006-5752.json   | 15 -------------
 2007/1xxx/CVE-2007-1863.json   | 10 +++++++++
 2007/5xxx/CVE-2007-5000.json   | 40 ++++++++++++++++++++++++++++++++++
 2007/6xxx/CVE-2007-6388.json   | 40 ----------------------------------
 2007/6xxx/CVE-2007-6422.json   | 10 ---------
 2008/0xxx/CVE-2008-0005.json   | 10 ---------
 2008/0xxx/CVE-2008-0456.json   | 10 ---------
 2008/2xxx/CVE-2008-2939.json   | 25 ---------------------
 2009/0xxx/CVE-2009-0023.json   | 15 -------------
 2009/1xxx/CVE-2009-1191.json   | 25 ---------------------
 2009/1xxx/CVE-2009-1195.json   | 10 ---------
 2009/1xxx/CVE-2009-1891.json   |  5 -----
 2009/2xxx/CVE-2009-2412.json   | 10 ---------
 2009/3xxx/CVE-2009-3094.json   | 10 +++++++++
 2009/3xxx/CVE-2009-3095.json   | 10 ---------
 2009/3xxx/CVE-2009-3560.json   | 10 ---------
 2009/3xxx/CVE-2009-3720.json   | 10 ---------
 2010/1xxx/CVE-2010-1623.json   | 15 +++++++++++++
 2010/2xxx/CVE-2010-2068.json   | 20 +++++++++++++++++
 2011/3xxx/CVE-2011-3368.json   | 15 +++++++++++++
 2011/4xxx/CVE-2011-4317.json   | 20 +++++++++++++++++
 2013/1xxx/CVE-2013-1862.json   | 15 +++++++++++++
 2013/2xxx/CVE-2013-2249.json   | 25 +++++++++++++++++++++
 2013/5xxx/CVE-2013-5704.json   |  5 +++++
 2013/6xxx/CVE-2013-6438.json   | 10 +++++++++
 2014/0xxx/CVE-2014-0098.json   | 35 -----------------------------
 2014/0xxx/CVE-2014-0117.json   |  5 -----
 2014/0xxx/CVE-2014-0118.json   | 25 +++++++++++++++++++++
 2014/0xxx/CVE-2014-0226.json   | 25 ---------------------
 2014/0xxx/CVE-2014-0231.json   | 25 ---------------------
 2014/3xxx/CVE-2014-3523.json   | 25 ---------------------
 2014/3xxx/CVE-2014-3581.json   | 20 -----------------
 2014/3xxx/CVE-2014-3583.json   |  5 -----
 2014/8xxx/CVE-2014-8109.json   |  5 -----
 2015/0xxx/CVE-2015-0228.json   |  5 +++++
 2015/0xxx/CVE-2015-0253.json   | 10 +++++++++
 2015/3xxx/CVE-2015-3183.json   | 20 -----------------
 2015/3xxx/CVE-2015-3185.json   | 15 +++++++++++++
 2016/0xxx/CVE-2016-0736.json   | 20 +++++++++++++++++
 2016/2xxx/CVE-2016-2161.json   | 10 ---------
 2016/4xxx/CVE-2016-4975.json   | 15 +++++++++++++
 2016/4xxx/CVE-2016-4979.json   | 20 +++++++++++++++++
 2016/5xxx/CVE-2016-5387.json   |  5 +++++
 2016/8xxx/CVE-2016-8740.json   |  5 +++++
 2016/8xxx/CVE-2016-8743.json   | 15 +++++++++++++
 2017/15xxx/CVE-2017-15715.json |  5 +++++
 2017/3xxx/CVE-2017-3169.json   | 30 +++++++++++++++++++++++++
 2017/7xxx/CVE-2017-7659.json   |  5 +++++
 2017/7xxx/CVE-2017-7679.json   | 15 +++++++++++++
 2017/9xxx/CVE-2017-9789.json   | 25 +++++++++++++++++++++
 2017/9xxx/CVE-2017-9798.json   | 30 +++++++++++++++++++++++++
 2018/1xxx/CVE-2018-1302.json   |  5 +++++
 2018/1xxx/CVE-2018-1333.json   |  5 +++++
 2019/0xxx/CVE-2019-0190.json   |  5 +++++
 2019/0xxx/CVE-2019-0211.json   |  5 +++++
 2019/0xxx/CVE-2019-0217.json   |  5 +++++
 2019/0xxx/CVE-2019-0220.json   |  5 +++++
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/9xxx/CVE-2019-9517.json   |  5 +++++
 2020/11xxx/CVE-2020-11984.json | 10 +++++++++
 2020/11xxx/CVE-2020-11993.json | 10 +++++++++
 2020/9xxx/CVE-2020-9490.json   | 10 +++++++++
 74 files changed, 665 insertions(+), 380 deletions(-)

diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index 2257d777ada..f935a45a032 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -121,6 +121,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index d60a3e8fff1..b24e36cc40b 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -211,6 +211,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 115c263a790..bc0d07f5889 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index d03ba6bf77e..e15e5c75832 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -291,6 +291,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index 030202a06cd..edda3a4bd0a 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -176,6 +176,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index cccbc705e17..c5d2e1415c3 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -171,6 +171,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index c727450735e..74dc01700d8 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index 40c170fe7d7..ed27497c3ca 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index ff092666de2..10711a9e565 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index df7a6eec1f2..be5d649361c 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -186,6 +186,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 7ace5d1154e..4f583a40351 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -446,6 +446,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index d5aaef6767a..d795759f065 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -501,6 +501,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 8b5f8fc6fb2..b433fea2c03 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -416,21 +416,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index f91eb48088f..86fc44eea3c 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -331,6 +331,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 1341721124e..35578c17fac 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -496,6 +496,46 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 7aba1f67e99..f36954e0a08 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -471,46 +471,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 795ce08bdfe..8471a806602 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -201,16 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 0e379ba1b0a..c2a625bbdad 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -351,16 +351,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index 19a5e3e0b2b..dbc62c194ab 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -166,16 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index cd1d398f9fc..c713a804e2a 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -321,31 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index 8b6708025de..404ad190072 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -296,21 +296,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 81b00d1d37a..a2f00d9df8b 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -181,31 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 80af2936b24..0c96a3e24dc 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -261,16 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index bf2222221d6..266468effe2 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -301,11 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 3ed6820db8b..4ea7dd35b70 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -276,16 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index 99407c04909..0feec52bd57 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -231,6 +231,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 2879a97266f..dfc0a659714 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -226,16 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 070442045ff..17a4ca72673 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -311,16 +311,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 22866266103..8fd85fd03d8 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -476,16 +476,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index 546ac3c92b7..59870039d5e 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -306,6 +306,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index 83c6b5848e4..28dc299ed53 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -216,6 +216,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index a056d7ae11d..3dd1de55879 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -296,6 +296,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 5e7156c7060..c4361f2310f 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -191,6 +191,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 52f913861bf..894df0b79e8 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -236,6 +236,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index a9720ceade1..68ef76cc12b 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -101,6 +101,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index 9d3ba9683ec..605a12eb733 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -261,6 +261,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 6f469fb06f7..7cf2aefce1e 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -281,6 +281,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 18e98b15392..0addea30559 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -271,41 +271,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index 2646e7fc6c8..f831a7190dd 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -141,11 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index 2a2709d99ef..3928fd3227d 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -236,6 +236,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index a268c40c725..7ad470789b3 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -271,31 +271,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index dba9876edd7..53c28f0ab1d 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -241,31 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 96e4fe322c1..745afc2d6a3 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -116,31 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index a54786a45b1..61171647a2d 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -156,26 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index 9f0221a427e..fec56e628bc 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index d6d5cb41f60..ecefdea7c64 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index c9af2015ff2..fac45cfb216 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -156,6 +156,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index de836ed7bc4..8788c0badc8 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index e06311ebd9f..872e8c545d4 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 1ea08a0845d..5c85047df00 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -191,6 +191,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index 5b285ba83df..c9ffccd8281 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -157,6 +157,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 6aa4a6e19fd..1d70e1832f0 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -152,16 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index dc67e30dcce..7031a59bcc9 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -159,6 +159,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index c2deb56b367..4c5f8820eef 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -146,6 +146,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index f331bfb5528..aa5df7cf88d 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -281,6 +281,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index f2cdf40e401..a70bcad7edb 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index d6c1d1c2a9f..413d3036de3 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -202,6 +202,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index fe9e8478218..9116957a3ff 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -152,6 +152,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 8d062999afe..2a8cabb9ed1 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -214,6 +214,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index c144b349f25..cbe71c734b4 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index f2db8e67bdb..3031527d01b 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -234,6 +234,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index 95517599f28..7f877050f5c 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -122,6 +122,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 2f3c4d1850e..e9b10af9eec 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -291,6 +291,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 18ee245c707..f1262ba621c 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -132,6 +132,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index a801cf06c2f..b93c45f5eed 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -141,6 +141,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 633de2f2768..0bff3e76ba3 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -112,6 +112,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 042257e4ba2..68c6e1f1796 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -268,6 +268,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 7b15385ce9b..84fec150a63 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -208,6 +208,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index cfa70311cd3..fcd5944465e 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -203,6 +203,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 2d6efe1bcb9..898b41b8409 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -118,6 +118,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index 21538ad3d0c..462bdfbfa9a 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -283,6 +283,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 55e663b26bd..8f9fabb84c7 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -158,6 +158,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index d2bd3193699..9a9a024f704 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -133,6 +133,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 68f06c9252e..627b149c8cb 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -133,6 +133,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From f306a64ce125763588f0fa7708e449e44b189ed3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:01:30 +0000
Subject: [PATCH 741/845] "-Synchronized-Data."

---
 2001/1xxx/CVE-2001-1342.json   |  5 -----
 2002/0xxx/CVE-2002-0392.json   |  5 +++++
 2002/0xxx/CVE-2002-0661.json   | 10 ---------
 2002/0xxx/CVE-2002-0840.json   | 15 -------------
 2002/1xxx/CVE-2002-1592.json   | 15 -------------
 2003/0xxx/CVE-2003-0017.json   | 15 -------------
 2003/0xxx/CVE-2003-0083.json   | 20 -----------------
 2003/0xxx/CVE-2003-0134.json   | 15 -------------
 2003/0xxx/CVE-2003-0189.json   | 15 -------------
 2003/0xxx/CVE-2003-0192.json   | 15 -------------
 2003/0xxx/CVE-2003-0254.json   | 15 -------------
 2003/0xxx/CVE-2003-0460.json   | 10 ---------
 2003/0xxx/CVE-2003-0789.json   | 15 -------------
 2003/0xxx/CVE-2003-0993.json   | 10 +++++++++
 2004/0xxx/CVE-2004-0751.json   | 10 +++++++++
 2004/0xxx/CVE-2004-0809.json   | 10 +++++++++
 2004/0xxx/CVE-2004-0811.json   | 10 +++++++++
 2004/0xxx/CVE-2004-0942.json   | 10 +++++++++
 2005/1xxx/CVE-2005-1268.json   | 10 +++++++++
 2005/2xxx/CVE-2005-2088.json   | 10 +++++++++
 2005/2xxx/CVE-2005-2700.json   | 15 -------------
 2007/3xxx/CVE-2007-3847.json   | 20 +++++++++++++++++
 2007/5xxx/CVE-2007-5000.json   | 35 -----------------------------
 2007/6xxx/CVE-2007-6388.json   | 35 +++++++++++++++++++++++++++++
 2007/6xxx/CVE-2007-6420.json   | 10 ---------
 2007/6xxx/CVE-2007-6421.json   | 25 ---------------------
 2007/6xxx/CVE-2007-6422.json   | 15 -------------
 2008/0xxx/CVE-2008-0005.json   | 30 -------------------------
 2008/0xxx/CVE-2008-0456.json   | 15 -------------
 2008/2xxx/CVE-2008-2364.json   | 35 -----------------------------
 2009/1xxx/CVE-2009-1195.json   | 15 -------------
 2009/1xxx/CVE-2009-1890.json   | 15 -------------
 2009/1xxx/CVE-2009-1891.json   | 20 -----------------
 2010/0xxx/CVE-2010-0408.json   |  5 +++++
 2011/4xxx/CVE-2011-4317.json   | 25 ---------------------
 2012/0xxx/CVE-2012-0053.json   | 35 -----------------------------
 2012/2xxx/CVE-2012-2687.json   |  5 -----
 2012/3xxx/CVE-2012-3499.json   | 20 -----------------
 2012/3xxx/CVE-2012-3502.json   | 25 +++++++++++++++++++++
 2012/4xxx/CVE-2012-4558.json   |  5 -----
 2013/4xxx/CVE-2013-4352.json   | 20 +++++++++++++++++
 2013/5xxx/CVE-2013-5704.json   | 25 +++++++++++++++++++++
 2013/6xxx/CVE-2013-6438.json   | 40 ----------------------------------
 2014/0xxx/CVE-2014-0098.json   | 15 +++++++++++++
 2014/0xxx/CVE-2014-0118.json   | 20 -----------------
 2014/3xxx/CVE-2014-3581.json   | 25 +++++++++++++++++++++
 2014/3xxx/CVE-2014-3583.json   | 25 +++++++++++++++++++++
 2014/8xxx/CVE-2014-8109.json   | 10 +++++++++
 2015/0xxx/CVE-2015-0228.json   | 10 +++++++++
 2015/0xxx/CVE-2015-0253.json   | 20 +++++++++++++++++
 2015/3xxx/CVE-2015-3183.json   | 35 +++++++++++++++++++++++++++++
 2015/3xxx/CVE-2015-3185.json   |  5 +++++
 2016/1xxx/CVE-2016-1546.json   | 20 -----------------
 2016/2xxx/CVE-2016-2161.json   | 25 +++++++++++++++++++++
 2016/4xxx/CVE-2016-4975.json   |  5 +++++
 2016/5xxx/CVE-2016-5387.json   | 15 +++++++++++++
 2016/8xxx/CVE-2016-8740.json   | 25 +++++++++++++++++++++
 2017/3xxx/CVE-2017-3167.json   | 20 +++++++++++++++++
 2017/3xxx/CVE-2017-3169.json   | 20 -----------------
 2017/7xxx/CVE-2017-7659.json   | 15 -------------
 2017/7xxx/CVE-2017-7668.json   | 20 -----------------
 2017/7xxx/CVE-2017-7679.json   | 20 -----------------
 2017/9xxx/CVE-2017-9788.json   | 20 -----------------
 2017/9xxx/CVE-2017-9789.json   | 15 -------------
 2017/9xxx/CVE-2017-9798.json   | 20 -----------------
 2018/11xxx/CVE-2018-11763.json | 10 +++++++++
 2018/17xxx/CVE-2018-17189.json | 10 ---------
 2018/1xxx/CVE-2018-1283.json   | 10 ---------
 2018/1xxx/CVE-2018-1301.json   | 10 +++++++++
 2018/1xxx/CVE-2018-1302.json   | 10 +++++++++
 2018/1xxx/CVE-2018-1303.json   | 10 +++++++++
 2018/1xxx/CVE-2018-1312.json   | 10 +++++++++
 2019/0xxx/CVE-2019-0220.json   | 15 +++++++++++++
 2020/9xxx/CVE-2020-9490.json   | 10 +++++++++
 2021/29xxx/CVE-2021-29097.json | 15 -------------
 75 files changed, 515 insertions(+), 730 deletions(-)

diff --git a/2001/1xxx/CVE-2001-1342.json b/2001/1xxx/CVE-2001-1342.json
index 7f7fa8dd05a..fd877af0334 100644
--- a/2001/1xxx/CVE-2001-1342.json
+++ b/2001/1xxx/CVE-2001-1342.json
@@ -86,11 +86,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 6fcb2c3f8c6..95d1d6843ac 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -256,6 +256,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index 04115e25a84..8f44ac2bc70 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -101,16 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 62511b95ca8..1d489649fc1 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -196,21 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index 2227830478c..f753ba3e3de 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index cd23d40ffa8..94438de9209 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -86,21 +86,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 5dacade03ca..ae6703034c7 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -116,26 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index 5c2ae226e0f..a8ba3c36e29 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -96,21 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 1f83050a43e..bc67ee88988 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index 7281a90c38d..ed978fae924 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 50243803d64..a686e486bfa 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index 033c6dd549e..2563a8fe440 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -71,16 +71,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index dbf9cbfac82..d2d19bf41eb 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index a0c50e77ee4..4200bdba65c 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index fa491c94aa2..6ed41ebdfbb 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index c5cda0a063c..e39746f2548 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -136,6 +136,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index eec28e0e670..296cc1019e1 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -121,6 +121,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index 8c51dd9a269..4a0b74f7449 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -156,6 +156,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index be5d649361c..b4f62c22a58 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -196,6 +196,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index 21391773b2d..50946dabdf8 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -341,6 +341,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index 47437094513..a93774458e3 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -341,21 +341,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index 9ee32ed72f7..96ee363f079 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -421,6 +421,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 35578c17fac..27dbe0f2199 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -501,41 +501,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index f36954e0a08..865845eb60c 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -471,6 +471,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index b19c2b13c3f..3ad847b6d8e 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -196,16 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index 3ac1f6c5c82..4c8ffa4c5ca 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -196,31 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 8471a806602..e8ecb44a060 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -186,21 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index c2a625bbdad..8c339344ec1 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -321,36 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index dbc62c194ab..a1cd60f6f7f 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 520d066b86b..50a71681e43 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -351,41 +351,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 0c96a3e24dc..fc9b447da7c 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -246,21 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index e848ed7b86e..bb781385257 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -261,21 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 266468effe2..573874ff165 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index db419274246..26fa3bed051 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -266,6 +266,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index c4361f2310f..73211ab3ddf 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -186,31 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index 1e9a86366b0..3fc70e20633 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -236,41 +236,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 46d3a832773..1985d49baad 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -246,11 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 456d5e80088..3c644916ef9 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -226,26 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index 4de3979887c..ea7acbf6876 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -96,6 +96,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index 36ce9a39aae..a9d7476c84c 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -181,11 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index a76ce416de4..49258097097 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -101,6 +101,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index 605a12eb733..be9705d4af6 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -266,6 +266,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 7cf2aefce1e..b76501fb704 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -251,46 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 0addea30559..0750d1ba95f 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -271,6 +271,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index 3928fd3227d..a53bd575a8b 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -241,26 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index 61171647a2d..b4a54461bde 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -156,6 +156,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index fec56e628bc..1eddc5a3181 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -146,6 +146,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index ecefdea7c64..5ce1af78b43 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -146,6 +146,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index fac45cfb216..90b3211c5c4 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -161,6 +161,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index 8788c0badc8..58975b8a14f 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -156,6 +156,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index 872e8c545d4..8f583e09207 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -281,6 +281,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 5c85047df00..9adc2b78475 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -206,6 +206,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index 31c2b109e5d..f5093bdc474 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -126,26 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 1d70e1832f0..2a768cb1f90 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -152,6 +152,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index 7031a59bcc9..7a47e63e67e 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -174,6 +174,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index aa5df7cf88d..a91f07f3e3a 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -286,6 +286,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index a70bcad7edb..53a12fdae6a 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -151,6 +151,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index 0be78dfe52a..f7f35a750b7 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -219,6 +219,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 2a8cabb9ed1..5ebe95ddb08 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -224,26 +224,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index cbe71c734b4..01c77cda418 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index e5d0a8c78be..9a325e8352a 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -194,26 +194,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 3031527d01b..4db523e52cb 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -229,26 +229,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index 88ebd3afcfa..3633df23593 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -245,26 +245,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index 7f877050f5c..c72721be995 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -132,21 +132,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index e9b10af9eec..cc2322ac2fe 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -301,26 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 174143c7dbe..07d229598d2 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -157,6 +157,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 48d85fa09c2..b243198a7d1 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -167,16 +167,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 4a531b1f307..19e84ef79df 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -142,16 +142,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index 6eec31b351b..df7e26b952c 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -162,6 +162,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index f1262ba621c..eed62dfc44a 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -137,6 +137,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index e864f54d8bd..c80423d9945 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -152,6 +152,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 504a610e2b4..10ad814795c 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -167,6 +167,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index fcd5944465e..ab1d16457b8 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -208,6 +208,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 627b149c8cb..c429159ccd2 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -143,6 +143,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888203 - /httpd/site/trunk/content/security/json/CVE-2020-9490.json",
+                "url": "https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index b038d8cf808..8dda1d9d453 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -177,21 +177,6 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
             }
         ]
     },

From 736fc3e8c0a0356ac2e1fa303abe888d94f6910b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:01:47 +0000
Subject: [PATCH 742/845] "-Synchronized-Data."

---
 2002/0xxx/CVE-2002-0654.json   | 10 ----------
 2002/1xxx/CVE-2002-1156.json   | 10 ++++++++++
 2002/1xxx/CVE-2002-1593.json   | 15 ---------------
 2003/0xxx/CVE-2003-0016.json   | 15 ---------------
 2003/0xxx/CVE-2003-0017.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0020.json   | 20 --------------------
 2003/0xxx/CVE-2003-0132.json   | 15 ---------------
 2003/0xxx/CVE-2003-0189.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0245.json   | 15 ---------------
 2003/0xxx/CVE-2003-0253.json   | 15 ---------------
 2003/0xxx/CVE-2003-0542.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0987.json   | 10 ----------
 2003/0xxx/CVE-2003-0993.json   | 20 --------------------
 2004/0xxx/CVE-2004-0113.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0492.json   | 15 ---------------
 2004/0xxx/CVE-2004-0751.json   | 30 ------------------------------
 2004/0xxx/CVE-2004-0885.json   | 20 --------------------
 2005/2xxx/CVE-2005-2728.json   | 15 ---------------
 2005/3xxx/CVE-2005-3357.json   | 15 +++++++++++++++
 2007/3xxx/CVE-2007-3304.json   |  5 +++++
 2008/0xxx/CVE-2008-0455.json   | 10 ----------
 2008/2xxx/CVE-2008-2939.json   |  5 -----
 2009/2xxx/CVE-2009-2699.json   |  5 +++++
 2010/0xxx/CVE-2010-0010.json   |  5 -----
 2010/0xxx/CVE-2010-0408.json   | 30 ------------------------------
 2010/0xxx/CVE-2010-0434.json   | 10 ----------
 2010/1xxx/CVE-2010-1452.json   | 20 --------------------
 2010/2xxx/CVE-2010-2068.json   | 15 ---------------
 2010/2xxx/CVE-2010-2791.json   | 15 ---------------
 2011/0xxx/CVE-2011-0419.json   | 10 ----------
 2011/3xxx/CVE-2011-3348.json   | 15 ---------------
 2011/3xxx/CVE-2011-3368.json   | 25 -------------------------
 2011/4xxx/CVE-2011-4317.json   | 15 +++++++++++++++
 2012/0xxx/CVE-2012-0021.json   | 10 ----------
 2012/0xxx/CVE-2012-0031.json   | 10 ----------
 2012/0xxx/CVE-2012-0053.json   | 25 +++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0883.json   | 20 --------------------
 2012/2xxx/CVE-2012-2687.json   | 15 ---------------
 2012/3xxx/CVE-2012-3502.json   | 15 ---------------
 2012/4xxx/CVE-2012-4557.json   | 10 ++++++++++
 2012/4xxx/CVE-2012-4558.json   | 15 +++++++++++++++
 2013/1xxx/CVE-2013-1862.json   | 10 ----------
 2013/1xxx/CVE-2013-1896.json   | 20 --------------------
 2013/2xxx/CVE-2013-2249.json   | 15 ---------------
 2013/5xxx/CVE-2013-5704.json   | 20 --------------------
 2013/6xxx/CVE-2013-6438.json   | 20 ++++++++++++++++++++
 2014/0xxx/CVE-2014-0098.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0117.json   | 10 ++++++++++
 2014/0xxx/CVE-2014-0226.json   |  5 -----
 2014/0xxx/CVE-2014-0231.json   |  5 -----
 2014/3xxx/CVE-2014-3523.json   | 10 ++++++++++
 2014/3xxx/CVE-2014-3581.json   | 15 ---------------
 2014/3xxx/CVE-2014-3583.json   | 15 ---------------
 2014/8xxx/CVE-2014-8109.json   | 15 +++++++++++++++
 2015/0xxx/CVE-2015-0228.json   |  5 +++++
 2015/0xxx/CVE-2015-0253.json   | 15 ---------------
 2015/3xxx/CVE-2015-3183.json   | 20 --------------------
 2016/0xxx/CVE-2016-0736.json   | 25 -------------------------
 2016/1xxx/CVE-2016-1546.json   | 25 +++++++++++++++++++++++++
 2016/4xxx/CVE-2016-4979.json   |  5 +++++
 2017/9xxx/CVE-2017-9789.json   |  5 +++++
 2017/9xxx/CVE-2017-9798.json   | 20 --------------------
 2018/17xxx/CVE-2018-17189.json | 30 ++++++++++++++++++++++++++++++
 2018/17xxx/CVE-2018-17199.json | 20 ++++++++++++++++++++
 2018/1xxx/CVE-2018-1302.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1303.json   |  5 +++++
 2018/1xxx/CVE-2018-1312.json   | 10 ++++++++++
 2018/1xxx/CVE-2018-1333.json   | 20 ++++++++++++++++++++
 2018/8xxx/CVE-2018-8011.json   | 20 ++++++++++++++++++++
 2019/0xxx/CVE-2019-0196.json   |  5 +++++
 2019/0xxx/CVE-2019-0197.json   | 20 ++++++++++++++++++++
 2019/0xxx/CVE-2019-0211.json   | 20 ++++++++++++++++++++
 2019/0xxx/CVE-2019-0215.json   | 20 ++++++++++++++++++++
 2019/0xxx/CVE-2019-0217.json   | 20 ++++++++++++++++++++
 2019/0xxx/CVE-2019-0220.json   |  5 +++++
 2019/10xxx/CVE-2019-10082.json | 30 ------------------------------
 2019/10xxx/CVE-2019-10098.json |  5 -----
 2019/9xxx/CVE-2019-9517.json   |  5 +++++
 2020/11xxx/CVE-2020-11984.json |  5 -----
 2020/11xxx/CVE-2020-11985.json | 25 -------------------------
 2020/11xxx/CVE-2020-11993.json |  5 -----
 2020/1xxx/CVE-2020-1927.json   |  5 -----
 2020/1xxx/CVE-2020-1934.json   |  5 -----
 2020/9xxx/CVE-2020-9490.json   | 15 ---------------
 2021/29xxx/CVE-2021-29098.json |  5 -----
 85 files changed, 490 insertions(+), 730 deletions(-)

diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index 6e987afc14a..de451dbc690 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -106,16 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index 07929d2eb61..195b87a08e9 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -116,6 +116,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index f46842b6acb..4aa963d0e1b 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -106,21 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index f935a45a032..b21fb6d2176 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 94438de9209..b00afce6d46 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -86,6 +86,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index b24e36cc40b..49d5e258ce9 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -201,26 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 2193ff68018..591aa0927d8 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index bc67ee88988..5a160ffcc29 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -121,6 +121,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 4319ed12410..802ee3ac5f3 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -131,21 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index bc0d07f5889..248b67efa25 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index e15e5c75832..52f6d2d26ce 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -301,6 +301,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index ddd8dd14365..298047c13c4 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -146,16 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index 4200bdba65c..edcba885b9a 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -136,26 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 728c2ce9a29..0d36631c453 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -176,6 +176,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index f0565130e97..90c04a58795 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index 6ed41ebdfbb..a9d398eb9d6 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -121,36 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index f2048e0aa11..f58f45f9417 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -166,26 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 24855d639c3..6650ab075a3 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -281,21 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index 327ad87353e..894c9a7d036 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -361,6 +361,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 836f0adb9ec..9ab0eca4f71 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -486,6 +486,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index 3740d5cf56d..8672fbc141a 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -166,16 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index c713a804e2a..5092de501d9 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -316,11 +316,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 48ea6c42dff..e322284c75b 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 8c77d630ed8..2d9a1317903 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -141,11 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index 26fa3bed051..ac4f2edc021 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -241,36 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index 0ec8901bba4..e67f7f6888c 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -296,16 +296,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index 09f59674257..ac3699d7cef 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -211,26 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index 28dc299ed53..c20eb2e885a 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -221,21 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index af192d678df..7777ca453fa 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index fd1d63dcc0b..cae64b4b6cd 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -321,16 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index c540eacb7f7..c3016665c34 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -186,21 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 3dd1de55879..00e7d8b9f0c 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -286,31 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 73211ab3ddf..0d9d083c3fa 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -186,6 +186,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index a592d6e1822..267170a7581 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -181,16 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index 217d058653a..c031ca2f6ce 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -246,16 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index 3fc70e20633..d2d6ef1ce4a 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -236,6 +236,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index d73954dddb6..a38add02117 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -196,26 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 1985d49baad..449d8cc0c3f 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -231,21 +231,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index ea7acbf6876..3220ef9c985 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -106,21 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index d7ad02c142e..79424f864e5 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index a9d7476c84c..fb84273be06 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -181,6 +181,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 894df0b79e8..5171a85a618 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -241,16 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 3b2ee02af03..84e04ca91ec 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -216,26 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index 68ef76cc12b..da62abb2f4c 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -111,21 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index be9705d4af6..b979f80ce6f 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -271,26 +271,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index b76501fb704..25518513fa0 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -251,6 +251,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 0750d1ba95f..678eb8a1ad3 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -286,6 +286,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index f831a7190dd..15995d0c045 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index 7ad470789b3..df1e2f6b5c9 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -266,11 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index 53c28f0ab1d..0d0118ae286 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -236,11 +236,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 745afc2d6a3..01641bc40c1 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -116,6 +116,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index b4a54461bde..dad38851624 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -166,21 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index 1eddc5a3181..d83c4b71c79 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index 5ce1af78b43..c110ad8c189 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -156,6 +156,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index 90b3211c5c4..eec7820bcbe 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -171,6 +171,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index 58975b8a14f..9e1002bd763 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -161,21 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index 8f583e09207..ce90bcde8cf 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -296,26 +296,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index c9ffccd8281..758f6fbc91d 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -152,31 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index f5093bdc474..be32bafeea2 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -126,6 +126,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index 4c5f8820eef..28746278b5f 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -166,6 +166,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index c72721be995..60957814b8a 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -132,6 +132,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index cc2322ac2fe..feb4b6faa2e 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index b243198a7d1..74a497640d7 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -167,6 +167,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index af815922275..9fad623401f 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -167,6 +167,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index eed62dfc44a..d10c8716f2d 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -147,6 +147,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index c80423d9945..5e01b628ff8 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -162,6 +162,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 10ad814795c..78067354b6e 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -177,6 +177,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index b93c45f5eed..69782c67060 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -146,6 +146,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 81287146f38..f403bfc0f08 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -116,6 +116,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index 5d1ff963c56..1dfaa41934c 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -198,6 +198,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 2faa53d35c1..8b43704defe 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -168,6 +168,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 68c6e1f1796..1a5d326931c 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -273,6 +273,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 84f85c88a7e..544e67bcc00 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -166,6 +166,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 84fec150a63..64e72f179e3 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -213,6 +213,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index ab1d16457b8..fb57920eaed 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -223,6 +223,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index 39871c6f3bc..08c4a0a0c8d 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -78,36 +78,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index f9592900b4b..5b9b844d651 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -113,11 +113,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index 462bdfbfa9a..ce78576c981 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -288,6 +288,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 8f9fabb84c7..9b1850271fd 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -163,11 +163,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index 2d95d65e8ea..f097a973391 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -83,31 +83,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index 9a9a024f704..ee20bc73e99 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -138,11 +138,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 7e150a98a98..5ceac293627 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -128,11 +128,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 17df50a3f1f..4af2d5a7369 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -113,11 +113,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index c429159ccd2..8f6ed041ee2 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -138,21 +138,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888203 - /httpd/site/trunk/content/security/json/CVE-2020-9490.json",
-                "url": "https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 7a7c7c6d28c..449062d70d7 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -161,11 +161,6 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
             }
         ]
     },

From 76e4839e834cf5f48917367bad6bc4da65be1644 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:02:03 +0000
Subject: [PATCH 743/845] "-Synchronized-Data."

---
 1999/1xxx/CVE-1999-1199.json   | 10 +++++++++
 2000/1xxx/CVE-2000-1205.json   | 10 +++++++++
 2000/1xxx/CVE-2000-1206.json   |  5 -----
 2001/0xxx/CVE-2001-0729.json   | 10 +++++++++
 2002/1xxx/CVE-2002-1592.json   | 25 +++++++++++++++++++++
 2003/0xxx/CVE-2003-0020.json   |  5 -----
 2003/0xxx/CVE-2003-0254.json   |  5 -----
 2004/0xxx/CVE-2004-0174.json   | 20 -----------------
 2004/0xxx/CVE-2004-0488.json   | 15 -------------
 2004/0xxx/CVE-2004-0492.json   |  5 +++++
 2004/0xxx/CVE-2004-0493.json   | 15 -------------
 2004/0xxx/CVE-2004-0747.json   | 15 -------------
 2004/0xxx/CVE-2004-0748.json   | 15 -------------
 2004/0xxx/CVE-2004-0751.json   |  5 +++++
 2004/0xxx/CVE-2004-0786.json   | 15 -------------
 2004/0xxx/CVE-2004-0809.json   | 25 ---------------------
 2004/0xxx/CVE-2004-0811.json   | 15 -------------
 2004/0xxx/CVE-2004-0885.json   |  5 +++++
 2004/0xxx/CVE-2004-0940.json   | 10 ---------
 2004/0xxx/CVE-2004-0942.json   | 15 -------------
 2004/1xxx/CVE-2004-1834.json   | 15 -------------
 2005/1xxx/CVE-2005-1268.json   | 25 ---------------------
 2005/2xxx/CVE-2005-2088.json   | 25 ---------------------
 2005/2xxx/CVE-2005-2491.json   | 15 -------------
 2005/2xxx/CVE-2005-2700.json   | 20 +++++++++++++++++
 2005/3xxx/CVE-2005-3352.json   |  5 +++++
 2006/3xxx/CVE-2006-3747.json   | 10 ---------
 2006/3xxx/CVE-2006-3918.json   | 10 ---------
 2007/1xxx/CVE-2007-1863.json   |  5 +++++
 2007/5xxx/CVE-2007-5000.json   | 15 +++++++++++++
 2007/6xxx/CVE-2007-6388.json   | 40 ----------------------------------
 2007/6xxx/CVE-2007-6420.json   |  5 -----
 2007/6xxx/CVE-2007-6421.json   | 10 +++++++++
 2007/6xxx/CVE-2007-6422.json   | 10 +++++++++
 2008/0xxx/CVE-2008-0005.json   | 15 +++++++++++++
 2008/0xxx/CVE-2008-0456.json   | 10 +++++++++
 2008/2xxx/CVE-2008-2364.json   | 10 +++++++++
 2008/2xxx/CVE-2008-2939.json   | 15 +++++++++++++
 2009/0xxx/CVE-2009-0023.json   | 10 +++++++++
 2009/1xxx/CVE-2009-1191.json   | 10 +++++++++
 2009/1xxx/CVE-2009-1195.json   | 10 +++++++++
 2009/1xxx/CVE-2009-1890.json   | 10 +++++++++
 2009/1xxx/CVE-2009-1891.json   |  5 -----
 2009/1xxx/CVE-2009-1955.json   | 20 -----------------
 2009/1xxx/CVE-2009-1956.json   |  5 -----
 2010/1xxx/CVE-2010-1452.json   | 10 +++++++++
 2010/1xxx/CVE-2010-1623.json   |  5 +++++
 2011/3xxx/CVE-2011-3192.json   | 10 ---------
 2011/3xxx/CVE-2011-3607.json   | 10 ---------
 2011/4xxx/CVE-2011-4317.json   | 15 +++++++++++++
 2012/3xxx/CVE-2012-3502.json   | 10 +++++++++
 2013/5xxx/CVE-2013-5704.json   | 20 -----------------
 2013/6xxx/CVE-2013-6438.json   | 15 +++++++++++++
 2014/8xxx/CVE-2014-8109.json   | 10 ---------
 2016/2xxx/CVE-2016-2161.json   | 30 -------------------------
 2016/4xxx/CVE-2016-4975.json   | 40 ----------------------------------
 2016/4xxx/CVE-2016-4979.json   | 10 ---------
 2016/5xxx/CVE-2016-5387.json   | 10 ---------
 2017/15xxx/CVE-2017-15715.json | 10 ---------
 2017/3xxx/CVE-2017-3167.json   | 40 ----------------------------------
 2017/9xxx/CVE-2017-9788.json   | 20 -----------------
 2018/11xxx/CVE-2018-11763.json |  5 +++++
 2018/17xxx/CVE-2018-17199.json | 15 -------------
 2018/8xxx/CVE-2018-8011.json   | 15 -------------
 2019/0xxx/CVE-2019-0190.json   |  5 +++++
 2019/0xxx/CVE-2019-0196.json   | 15 -------------
 2019/0xxx/CVE-2019-0197.json   |  5 -----
 2019/0xxx/CVE-2019-0211.json   | 15 -------------
 2019/0xxx/CVE-2019-0215.json   | 15 -------------
 2019/0xxx/CVE-2019-0217.json   | 15 -------------
 2019/0xxx/CVE-2019-0220.json   | 15 -------------
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/10xxx/CVE-2019-10082.json | 15 +++++++++++++
 2019/10xxx/CVE-2019-10092.json |  5 +++++
 2019/10xxx/CVE-2019-10097.json | 15 -------------
 2020/11xxx/CVE-2020-11984.json | 10 +++++++++
 2020/11xxx/CVE-2020-11985.json | 10 +++++++++
 2020/1xxx/CVE-2020-1927.json   | 15 +++++++++++++
 78 files changed, 350 insertions(+), 685 deletions(-)

diff --git a/1999/1xxx/CVE-1999-1199.json b/1999/1xxx/CVE-1999-1199.json
index 8c233117523..7fb58564c12 100644
--- a/1999/1xxx/CVE-1999-1199.json
+++ b/1999/1xxx/CVE-1999-1199.json
@@ -81,6 +81,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1205.json b/2000/1xxx/CVE-2000-1205.json
index 82808bc802b..941f24609f5 100644
--- a/2000/1xxx/CVE-2000-1205.json
+++ b/2000/1xxx/CVE-2000-1205.json
@@ -86,6 +86,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1206.json b/2000/1xxx/CVE-2000-1206.json
index db2edbf575b..d8fdbf29beb 100644
--- a/2000/1xxx/CVE-2000-1206.json
+++ b/2000/1xxx/CVE-2000-1206.json
@@ -61,11 +61,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0729.json b/2001/0xxx/CVE-2001-0729.json
index c7d25d27db2..821b78a804b 100644
--- a/2001/0xxx/CVE-2001-0729.json
+++ b/2001/0xxx/CVE-2001-0729.json
@@ -81,6 +81,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index f753ba3e3de..07589a7f5fb 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -101,6 +101,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 49d5e258ce9..57fd7cdd6f0 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -196,11 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index a686e486bfa..931354c42a6 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index edda3a4bd0a..ef574658c0e 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -181,26 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index c5d2e1415c3..f5ef2b8305a 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -176,21 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 90c04a58795..1ab73d1ebd7 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index 74dc01700d8..f85c9d23291 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index ed27497c3ca..e5f79263938 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index 9363d444e20..6f51a6db71b 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index a9d398eb9d6..29d92a51f7b 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index cecf6e0039d..6efc0937c96 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index e39746f2548..e139a46ddc2 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -121,31 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index 296cc1019e1..ff17438d5a4 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -116,21 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index f58f45f9417..497474d3c4a 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -166,6 +166,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index 6d6a1ff7510..34f10535891 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -131,16 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index 4a0b74f7449..193d0104bc4 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 10711a9e565..10aedae087b 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index b4f62c22a58..efc38abaecd 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -181,31 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index 50946dabdf8..2cedb9b2869 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -326,31 +326,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index c69a559594b..a14dbe0c423 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -371,21 +371,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index a93774458e3..c7a16d739b5 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -341,6 +341,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 4f583a40351..c956b1af6f5 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -471,6 +471,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index d795759f065..813662a40fc 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -506,16 +506,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index ab109489f85..b9d734ef50e 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -306,16 +306,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 86fc44eea3c..9dd786b3b48 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -341,6 +341,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 27dbe0f2199..986bb9f8bfe 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -501,6 +501,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 865845eb60c..c78f418d79b 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -466,46 +466,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index 3ad847b6d8e..fa121d87f38 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -191,11 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index 4c8ffa4c5ca..dcee4e94f2d 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -196,6 +196,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index e8ecb44a060..3d67831d99f 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -186,6 +186,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 8c339344ec1..88643781716 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -321,6 +321,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index a1cd60f6f7f..9398e2fb746 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 50a71681e43..7fb08ca34e7 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -351,6 +351,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index 5092de501d9..1706b8c2d1d 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -316,6 +316,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index 404ad190072..d012abf66dd 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -296,6 +296,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index a2f00d9df8b..35c5ef610ed 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -181,6 +181,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index fc9b447da7c..3cb74abf021 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -246,6 +246,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index bb781385257..9981cefe172 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -261,6 +261,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 573874ff165..28cf2da7ca7 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -276,11 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index 0b84de975f8..afa725d04b8 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -311,26 +311,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index a3c09674434..b0cc0056614 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -271,11 +271,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index ac3699d7cef..56c91d530b0 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -211,6 +211,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index 59870039d5e..f515d9e200d 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -321,6 +321,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 57da8b5e3ac..725a29489d3 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -396,16 +396,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index ef635fccd80..06c1485b089 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -256,16 +256,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 0d9d083c3fa..50b4e69d030 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -201,6 +201,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index 3220ef9c985..db62b930dc6 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index b979f80ce6f..64e1d53a7e9 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -251,26 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 25518513fa0..b8fe5a44517 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -271,6 +271,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index c110ad8c189..227e0aeee7b 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -161,16 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 2a768cb1f90..5dec23f143d 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -147,36 +147,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index 7a47e63e67e..949e07b252c 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -139,46 +139,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index 28746278b5f..e972d6f7760 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -161,16 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index a91f07f3e3a..1ac38364420 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -291,16 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 9116957a3ff..4d234081f30 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -147,16 +147,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index f7f35a750b7..436e5a2f363 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -199,46 +199,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index 3633df23593..f5fc3a170af 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -225,26 +225,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 07d229598d2..bbef673ec24 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -167,6 +167,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 9fad623401f..030b93373c5 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -172,21 +172,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index f403bfc0f08..d87128d801a 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 0bff3e76ba3..243b7290728 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -117,6 +117,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index 1dfaa41934c..ab57bf6d6a0 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -188,21 +188,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index 8b43704defe..ccb2b3bcc00 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -183,11 +183,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 1a5d326931c..fa1c8204418 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -278,21 +278,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 544e67bcc00..47923af4e0c 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -171,21 +171,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 64e72f179e3..7b3e5deaf59 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -218,21 +218,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index fb57920eaed..7b12a2536ba 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -213,21 +213,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 898b41b8409..76714c82aa4 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -123,6 +123,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index 08c4a0a0c8d..b12ff0e9d5e 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -78,6 +78,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 2305431dc22..1eff17449b9 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -188,6 +188,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index 4468a23fa79..4dcbb645b04 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -103,21 +103,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 9b1850271fd..b14ef2759d0 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -163,6 +163,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index f097a973391..79114da19cc 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -83,6 +83,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 5ceac293627..a0efd4c3ee6 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -128,6 +128,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 0d53b13d668bda86e05e88d4a2c91f28342fc0e4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:02:20 +0000
Subject: [PATCH 744/845] "-Synchronized-Data."

---
 2000/0xxx/CVE-2000-0505.json   |  5 ++++
 2000/1xxx/CVE-2000-1204.json   | 10 ++++++++
 2000/1xxx/CVE-2000-1205.json   |  5 ----
 2001/0xxx/CVE-2001-0730.json   |  5 ++++
 2001/1xxx/CVE-2001-1342.json   |  5 ++++
 2002/0xxx/CVE-2002-0061.json   |  5 ++++
 2002/0xxx/CVE-2002-0392.json   | 10 ++++++++
 2002/0xxx/CVE-2002-0839.json   |  5 ++++
 2002/0xxx/CVE-2002-0840.json   |  5 ++++
 2002/1xxx/CVE-2002-1592.json   | 30 -----------------------
 2002/1xxx/CVE-2002-1593.json   | 25 +++++++++++++++++++
 2003/0xxx/CVE-2003-0083.json   |  5 ++++
 2003/0xxx/CVE-2003-0132.json   | 25 +++++++++++++++++++
 2003/0xxx/CVE-2003-0189.json   | 30 -----------------------
 2003/0xxx/CVE-2003-0245.json   | 25 +++++++++++++++++++
 2003/0xxx/CVE-2003-0254.json   | 30 +++++++++++++++++++++++
 2003/0xxx/CVE-2003-0460.json   |  5 ++++
 2003/0xxx/CVE-2003-0542.json   | 25 -------------------
 2003/0xxx/CVE-2003-0789.json   |  5 ----
 2003/0xxx/CVE-2003-0987.json   | 20 +++++++++++++++
 2004/0xxx/CVE-2004-0174.json   |  5 ++++
 2004/0xxx/CVE-2004-0488.json   | 25 +++++++++++++++++++
 2004/0xxx/CVE-2004-0492.json   |  5 ++++
 2004/0xxx/CVE-2004-0748.json   |  5 ----
 2004/0xxx/CVE-2004-0809.json   |  5 ----
 2004/0xxx/CVE-2004-0940.json   |  5 ++++
 2005/2xxx/CVE-2005-2728.json   | 20 +++++++++++++++
 2005/2xxx/CVE-2005-2970.json   |  5 ++++
 2005/3xxx/CVE-2005-3352.json   | 35 --------------------------
 2005/3xxx/CVE-2005-3357.json   | 10 --------
 2006/3xxx/CVE-2006-3747.json   | 25 -------------------
 2006/3xxx/CVE-2006-3918.json   | 25 +++++++++++++++++++
 2006/5xxx/CVE-2006-5752.json   |  5 ++++
 2007/1xxx/CVE-2007-1862.json   | 10 --------
 2007/3xxx/CVE-2007-3304.json   | 45 ----------------------------------
 2007/3xxx/CVE-2007-3847.json   | 15 ------------
 2007/5xxx/CVE-2007-5000.json   | 25 +++++++++++++++++++
 2007/6xxx/CVE-2007-6388.json   | 10 ++++++++
 2007/6xxx/CVE-2007-6422.json   | 15 ------------
 2008/0xxx/CVE-2008-0455.json   |  5 ----
 2009/1xxx/CVE-2009-1890.json   | 15 ------------
 2009/1xxx/CVE-2009-1891.json   | 15 ++++++++++++
 2010/0xxx/CVE-2010-0010.json   | 10 ++++++++
 2010/0xxx/CVE-2010-0425.json   |  5 ++++
 2010/1xxx/CVE-2010-1452.json   | 30 +++++++++++++++++++++++
 2010/1xxx/CVE-2010-1623.json   | 40 ------------------------------
 2010/2xxx/CVE-2010-2068.json   | 10 --------
 2010/2xxx/CVE-2010-2791.json   | 20 +++++++++++++++
 2011/3xxx/CVE-2011-3348.json   | 20 +++++++++++++++
 2011/3xxx/CVE-2011-3368.json   | 10 --------
 2011/3xxx/CVE-2011-3607.json   | 10 --------
 2011/4xxx/CVE-2011-4317.json   | 20 ---------------
 2012/0xxx/CVE-2012-0021.json   |  5 ----
 2012/0xxx/CVE-2012-0031.json   | 25 -------------------
 2012/0xxx/CVE-2012-0053.json   | 15 ------------
 2012/0xxx/CVE-2012-0883.json   |  5 ----
 2012/2xxx/CVE-2012-2687.json   |  5 ----
 2012/3xxx/CVE-2012-3499.json   |  5 ----
 2012/3xxx/CVE-2012-3502.json   | 15 ------------
 2012/4xxx/CVE-2012-4557.json   |  5 ----
 2012/4xxx/CVE-2012-4558.json   |  5 ----
 2013/1xxx/CVE-2013-1862.json   | 15 ------------
 2013/1xxx/CVE-2013-1896.json   |  5 ----
 2013/2xxx/CVE-2013-2249.json   |  5 ----
 2013/4xxx/CVE-2013-4352.json   | 10 --------
 2014/0xxx/CVE-2014-0117.json   | 10 ++++++++
 2016/0xxx/CVE-2016-0736.json   | 10 ++++++++
 2016/8xxx/CVE-2016-8743.json   | 40 ------------------------------
 2017/15xxx/CVE-2017-15710.json |  5 ++++
 2017/7xxx/CVE-2017-7668.json   | 20 ---------------
 2018/17xxx/CVE-2018-17189.json | 10 --------
 2018/17xxx/CVE-2018-17199.json | 10 ++++++++
 2018/8xxx/CVE-2018-8011.json   |  5 ++++
 2019/0xxx/CVE-2019-0190.json   |  5 ++++
 2019/0xxx/CVE-2019-0196.json   | 20 +++++++++++++++
 2019/0xxx/CVE-2019-0211.json   |  5 ++++
 2019/0xxx/CVE-2019-0215.json   | 15 ------------
 2019/10xxx/CVE-2019-10081.json |  5 ++++
 2019/10xxx/CVE-2019-10082.json | 10 ++++++++
 2019/10xxx/CVE-2019-10092.json | 10 ++++++++
 2019/10xxx/CVE-2019-10097.json |  5 ++++
 2019/10xxx/CVE-2019-10098.json |  5 ----
 2019/9xxx/CVE-2019-9517.json   |  5 ++++
 2020/1xxx/CVE-2020-1934.json   | 10 --------
 2021/29xxx/CVE-2021-29097.json | 10 ++++++++
 85 files changed, 530 insertions(+), 590 deletions(-)

diff --git a/2000/0xxx/CVE-2000-0505.json b/2000/0xxx/CVE-2000-0505.json
index 26f1f18085e..affb2e4b344 100644
--- a/2000/0xxx/CVE-2000-0505.json
+++ b/2000/0xxx/CVE-2000-0505.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1204.json b/2000/1xxx/CVE-2000-1204.json
index 9951f290623..49a163b8acf 100644
--- a/2000/1xxx/CVE-2000-1204.json
+++ b/2000/1xxx/CVE-2000-1204.json
@@ -61,6 +61,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1205.json b/2000/1xxx/CVE-2000-1205.json
index 941f24609f5..2d8cbe72ff8 100644
--- a/2000/1xxx/CVE-2000-1205.json
+++ b/2000/1xxx/CVE-2000-1205.json
@@ -91,11 +91,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0730.json b/2001/0xxx/CVE-2001-0730.json
index f5030ecbb93..5aa07dd9564 100644
--- a/2001/0xxx/CVE-2001-0730.json
+++ b/2001/0xxx/CVE-2001-0730.json
@@ -91,6 +91,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/1xxx/CVE-2001-1342.json b/2001/1xxx/CVE-2001-1342.json
index fd877af0334..7f7fa8dd05a 100644
--- a/2001/1xxx/CVE-2001-1342.json
+++ b/2001/1xxx/CVE-2001-1342.json
@@ -86,6 +86,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0061.json b/2002/0xxx/CVE-2002-0061.json
index 216b81612b9..d975ca408f2 100644
--- a/2002/0xxx/CVE-2002-0061.json
+++ b/2002/0xxx/CVE-2002-0061.json
@@ -81,6 +81,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 95d1d6843ac..6f9fb40af50 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -261,6 +261,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0839.json b/2002/0xxx/CVE-2002-0839.json
index fb5142e3d4b..9869a2f90d8 100644
--- a/2002/0xxx/CVE-2002-0839.json
+++ b/2002/0xxx/CVE-2002-0839.json
@@ -146,6 +146,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 1d489649fc1..76c681d59a9 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -196,6 +196,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index 07589a7f5fb..a47deba61cd 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -96,36 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index 4aa963d0e1b..9a9b3f5280d 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -106,6 +106,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index ae6703034c7..84b59a2b496 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -116,6 +116,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 591aa0927d8..3686b03cdcf 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -156,6 +156,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 5a160ffcc29..0972b8c1cac 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -116,36 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 802ee3ac5f3..91084199710 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -131,6 +131,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 931354c42a6..3401a6fc55c 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -96,6 +96,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index 2563a8fe440..de3b54acf9c 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -71,6 +71,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 52f6d2d26ce..b1d9e58fec7 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -286,31 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index d2d19bf41eb..5632b4cb40d 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index 298047c13c4..c1cea7aab9e 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -146,6 +146,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index ef574658c0e..f1f767ba4aa 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -181,6 +181,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index f5ef2b8305a..d7f4c0ebd2c 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -176,6 +176,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 1ab73d1ebd7..0c66d182274 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index 6f51a6db71b..ace756938e3 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index e139a46ddc2..18ce4682566 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index 34f10535891..4e8e12e53be 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -131,6 +131,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 6650ab075a3..7861382a1c6 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -281,6 +281,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 01e9f12aebd..5691cf0497e 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -171,6 +171,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index c956b1af6f5..e18b9daa3a5 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -441,41 +441,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index 894c9a7d036..d0305b28678 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -366,16 +366,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index 813662a40fc..7bd4b4a533f 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -481,31 +481,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index b9d734ef50e..dac07ca220d 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -306,6 +306,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index b433fea2c03..11d167b06d7 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -416,6 +416,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
                 "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index 3a054d6ae65..59f894dfa28 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -171,16 +171,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 9ab0eca4f71..8ee693f2f77 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -446,51 +446,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index 96ee363f079..efd43945a14 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -426,21 +426,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 986bb9f8bfe..485b360b206 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -516,6 +516,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index c78f418d79b..0f7dd31437b 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -466,6 +466,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 3d67831d99f..724f3bf9aec 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -181,21 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index 8672fbc141a..ba407cd19d5 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -161,11 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 9981cefe172..02444d1b377 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -256,21 +256,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 28cf2da7ca7..f0adaaa2158 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -276,6 +276,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 2d9a1317903..0231bc14b1e 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 03339995d8b..6d578e27963 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -236,6 +236,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index 56c91d530b0..e491d051d1e 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -221,6 +221,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index f515d9e200d..69970b30f70 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -286,46 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index c20eb2e885a..e8da3ba2a16 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -211,16 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 7777ca453fa..048a29bb4e5 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -116,6 +116,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index c3016665c34..058e840c929 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -186,6 +186,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 00e7d8b9f0c..3031d8f8fed 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -276,16 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index 06c1485b089..ca7f499263e 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -246,16 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 50b4e69d030..112e3f1fefd 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -196,26 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index 267170a7581..6b37527970c 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -176,11 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index c031ca2f6ce..7a590fb2822 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -221,31 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index d2d6ef1ce4a..a3cb25af74b 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -246,21 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index a38add02117..b5f19d77c4e 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -191,11 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 449d8cc0c3f..e65ad97cf43 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -226,11 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 3c644916ef9..2c6c995e945 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -221,11 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index db62b930dc6..fdc7481ae9a 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index 79424f864e5..3db52c75007 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index fb84273be06..a7a3f81e8ef 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -191,11 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 5171a85a618..287dae03dc1 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -226,21 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 84e04ca91ec..ea6e1365f64 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -211,11 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index da62abb2f4c..ee0d2685e9a 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 49258097097..467596d0f43 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -111,16 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index 15995d0c045..635b4558cba 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index 758f6fbc91d..fddaf553c41 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -152,6 +152,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index 413d3036de3..d886bc2b177 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -177,46 +177,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 51b91c5400c..4d98d6afd0a 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -168,6 +168,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 9a325e8352a..7313e4929da 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -174,26 +174,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 74a497640d7..297e45f3026 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -187,16 +187,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 030b93373c5..4298ab5453f 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -172,6 +172,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index d87128d801a..7c83eea6eef 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 243b7290728..3695492cabc 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -122,6 +122,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index ab57bf6d6a0..fd564553197 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -188,6 +188,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index fa1c8204418..4f6b188157e 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -278,6 +278,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 47923af4e0c..08fba0b5166 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 76714c82aa4..abf25eaa694 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -128,6 +128,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index b12ff0e9d5e..74996291775 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -93,6 +93,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index 1eff17449b9..ffb6d00a69a 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -193,6 +193,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index 4dcbb645b04..05f614ae133 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -103,6 +103,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 5b9b844d651..80c5d8422ca 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -108,11 +108,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index ce78576c981..d955d449e48 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -293,6 +293,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 4af2d5a7369..6b6696d4869 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -103,16 +103,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 8dda1d9d453..46d2ce90597 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -177,6 +177,16 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
             }
         ]
     },

From ca2975f40143409bbb5d8c31cc203b7718e80032 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:02:37 +0000
Subject: [PATCH 745/845] "-Synchronized-Data."

---
 1999/1xxx/CVE-1999-1199.json   | 10 ----------
 2000/1xxx/CVE-2000-1204.json   |  5 -----
 2000/1xxx/CVE-2000-1206.json   | 10 ++++++++++
 2001/0xxx/CVE-2001-0729.json   |  5 -----
 2001/0xxx/CVE-2001-0731.json   |  5 +++++
 2002/0xxx/CVE-2002-0061.json   |  5 -----
 2002/0xxx/CVE-2002-0392.json   | 20 -------------------
 2002/0xxx/CVE-2002-0654.json   | 20 +++++++++++++++++++
 2002/0xxx/CVE-2002-0839.json   | 10 ++++++++++
 2002/1xxx/CVE-2002-1156.json   | 20 -------------------
 2002/1xxx/CVE-2002-1593.json   | 30 -----------------------------
 2003/0xxx/CVE-2003-0016.json   |  5 -----
 2003/0xxx/CVE-2003-0020.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0253.json   | 25 ++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0542.json   | 10 ----------
 2003/0xxx/CVE-2003-0987.json   | 15 ---------------
 2003/0xxx/CVE-2003-0993.json   |  5 +++++
 2004/0xxx/CVE-2004-0493.json   |  5 -----
 2004/0xxx/CVE-2004-0942.json   |  5 -----
 2006/3xxx/CVE-2006-3918.json   | 20 -------------------
 2006/5xxx/CVE-2006-5752.json   | 15 +++++++++++++++
 2007/1xxx/CVE-2007-1863.json   | 15 +++++++++++++++
 2007/5xxx/CVE-2007-5000.json   | 35 ----------------------------------
 2007/6xxx/CVE-2007-6388.json   |  5 +++++
 2009/1xxx/CVE-2009-1191.json   |  5 -----
 2009/1xxx/CVE-2009-1195.json   | 15 ---------------
 2009/1xxx/CVE-2009-1955.json   | 15 +++++++++++++++
 2009/1xxx/CVE-2009-1956.json   | 30 +++++++++++++++++++++++++++++
 2009/2xxx/CVE-2009-2412.json   | 10 ----------
 2009/2xxx/CVE-2009-2699.json   | 15 ---------------
 2009/3xxx/CVE-2009-3094.json   | 25 ------------------------
 2009/3xxx/CVE-2009-3095.json   | 10 ----------
 2009/3xxx/CVE-2009-3560.json   | 10 ----------
 2009/3xxx/CVE-2009-3720.json   | 15 ---------------
 2010/0xxx/CVE-2010-0010.json   |  5 +++++
 2010/0xxx/CVE-2010-0408.json   | 15 +++++++++++++++
 2010/0xxx/CVE-2010-0434.json   | 15 +++++++++++++++
 2010/1xxx/CVE-2010-1452.json   | 15 ---------------
 2010/1xxx/CVE-2010-1623.json   | 25 ++++++++++++++++++++++++
 2010/2xxx/CVE-2010-2068.json   | 30 +++++++++++++++++++++++++++++
 2010/2xxx/CVE-2010-2791.json   | 15 ---------------
 2011/0xxx/CVE-2011-0419.json   | 15 +++++++++++++++
 2011/3xxx/CVE-2011-3192.json   | 15 +++++++++++++++
 2011/3xxx/CVE-2011-3348.json   | 15 ---------------
 2011/3xxx/CVE-2011-3368.json   | 25 ++++++++++++++++++++++++
 2011/3xxx/CVE-2011-3607.json   | 25 ++++++++++++++++++++++++
 2013/2xxx/CVE-2013-2249.json   | 15 +++++++++++++++
 2013/5xxx/CVE-2013-5704.json   | 35 ++++++++++++++++++++++++++++++++++
 2014/0xxx/CVE-2014-0231.json   | 35 ++++++++++++++++++++++++++++++++++
 2014/8xxx/CVE-2014-8109.json   | 20 -------------------
 2015/3xxx/CVE-2015-3185.json   | 15 ---------------
 2016/1xxx/CVE-2016-1546.json   | 30 -----------------------------
 2016/2xxx/CVE-2016-2161.json   | 20 +++++++++++++++++++
 2016/4xxx/CVE-2016-4975.json   | 15 +++++++++++++++
 2016/4xxx/CVE-2016-4979.json   | 10 ----------
 2016/5xxx/CVE-2016-5387.json   | 15 ---------------
 2016/8xxx/CVE-2016-8740.json   | 20 -------------------
 2016/8xxx/CVE-2016-8743.json   | 15 +++++++++++++++
 2017/15xxx/CVE-2017-15715.json | 15 +++++++++++++++
 2017/3xxx/CVE-2017-3167.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7679.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9798.json   | 30 +++++++++++++++++++++++++++++
 2018/17xxx/CVE-2018-17199.json |  5 -----
 2018/1xxx/CVE-2018-1301.json   |  5 +++++
 2018/1xxx/CVE-2018-1302.json   | 30 -----------------------------
 2018/1xxx/CVE-2018-1312.json   | 30 -----------------------------
 2018/1xxx/CVE-2018-1333.json   | 10 ----------
 2019/0xxx/CVE-2019-0197.json   |  5 -----
 2019/0xxx/CVE-2019-0211.json   | 20 -------------------
 2019/0xxx/CVE-2019-0217.json   | 15 ---------------
 2019/0xxx/CVE-2019-0220.json   | 15 ---------------
 2019/10xxx/CVE-2019-10082.json |  5 -----
 2019/9xxx/CVE-2019-9517.json   | 20 -------------------
 2020/11xxx/CVE-2020-11984.json | 10 ++++++++++
 2021/29xxx/CVE-2021-29097.json | 10 ++++++++++
 75 files changed, 565 insertions(+), 605 deletions(-)

diff --git a/1999/1xxx/CVE-1999-1199.json b/1999/1xxx/CVE-1999-1199.json
index 7fb58564c12..8c233117523 100644
--- a/1999/1xxx/CVE-1999-1199.json
+++ b/1999/1xxx/CVE-1999-1199.json
@@ -81,16 +81,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1204.json b/2000/1xxx/CVE-2000-1204.json
index 49a163b8acf..5a2580a44de 100644
--- a/2000/1xxx/CVE-2000-1204.json
+++ b/2000/1xxx/CVE-2000-1204.json
@@ -66,11 +66,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2000/1xxx/CVE-2000-1206.json b/2000/1xxx/CVE-2000-1206.json
index d8fdbf29beb..498e835f366 100644
--- a/2000/1xxx/CVE-2000-1206.json
+++ b/2000/1xxx/CVE-2000-1206.json
@@ -61,6 +61,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0729.json b/2001/0xxx/CVE-2001-0729.json
index 821b78a804b..33ea27d56f0 100644
--- a/2001/0xxx/CVE-2001-0729.json
+++ b/2001/0xxx/CVE-2001-0729.json
@@ -86,11 +86,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0731.json b/2001/0xxx/CVE-2001-0731.json
index b9a5dc3b644..d79b436aa0f 100644
--- a/2001/0xxx/CVE-2001-0731.json
+++ b/2001/0xxx/CVE-2001-0731.json
@@ -96,6 +96,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0061.json b/2002/0xxx/CVE-2002-0061.json
index d975ca408f2..216b81612b9 100644
--- a/2002/0xxx/CVE-2002-0061.json
+++ b/2002/0xxx/CVE-2002-0061.json
@@ -81,11 +81,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 6f9fb40af50..8eb662adc95 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -251,26 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index de451dbc690..9c7fe1ba85e 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -106,6 +106,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0839.json b/2002/0xxx/CVE-2002-0839.json
index 9869a2f90d8..3a9772a2e33 100644
--- a/2002/0xxx/CVE-2002-0839.json
+++ b/2002/0xxx/CVE-2002-0839.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index 195b87a08e9..1820e5bc99d 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -106,26 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index 9a9b3f5280d..993b12bb1a3 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -101,36 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index b21fb6d2176..ce1973c6dcb 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -111,11 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 57fd7cdd6f0..7536f1c1381 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -196,6 +196,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 248b67efa25..4f9e33ca566 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -101,6 +101,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index b1d9e58fec7..851f4e2d908 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -276,16 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index c1cea7aab9e..a664ad2f402 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index edcba885b9a..98056ecff7b 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -136,6 +136,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index f85c9d23291..c4fbf102a08 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index 193d0104bc4..faf60e29857 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index dac07ca220d..8e35e8551b9 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -311,26 +311,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 11d167b06d7..c96fe021f20 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -421,6 +421,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 9dd786b3b48..3b84cf61279 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -346,6 +346,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 485b360b206..d365be614e5 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -506,41 +506,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 0f7dd31437b..5b0997ff8da 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -476,6 +476,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 35c5ef610ed..9166abc629a 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -186,11 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 3cb74abf021..4df658a5e99 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -241,21 +241,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index afa725d04b8..a768832da9d 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -311,6 +311,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index b0cc0056614..162cfe34a72 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -271,6 +271,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 4ea7dd35b70..516527c90f2 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -266,16 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index e322284c75b..bd1eb732e7a 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -136,21 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index 0feec52bd57..31dc4b59f48 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -216,31 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index dfc0a659714..135ef2d9bff 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -216,16 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 17a4ca72673..4d5d3605892 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -301,16 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 8fd85fd03d8..6f8575640a3 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -461,21 +461,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 0231bc14b1e..ee16e38a2cf 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -151,6 +151,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index ac4f2edc021..b73921368cd 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -241,6 +241,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index e67f7f6888c..12e2abbaef7 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -296,6 +296,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index e491d051d1e..f70b0b8ab72 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -236,21 +236,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index 69970b30f70..63a01b9176d 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -286,6 +286,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index e8da3ba2a16..1755b79579d 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -211,6 +211,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 048a29bb4e5..f99bc511479 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index cae64b4b6cd..0d19647ec36 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -321,6 +321,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 725a29489d3..aeea9504ef0 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -396,6 +396,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index 058e840c929..fa697390049 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -191,21 +191,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 3031d8f8fed..1d1a83b82c8 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -276,6 +276,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index ca7f499263e..87084d82cee 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -246,6 +246,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index ee0d2685e9a..2a4e00efdae 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -106,6 +106,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index 64e1d53a7e9..c87c29eda37 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -251,6 +251,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index 0d0118ae286..abbdd5409d4 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -236,6 +236,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/8xxx/CVE-2014-8109.json b/2014/8xxx/CVE-2014-8109.json
index 227e0aeee7b..bdccd3f355a 100644
--- a/2014/8xxx/CVE-2014-8109.json
+++ b/2014/8xxx/CVE-2014-8109.json
@@ -141,26 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 9adc2b78475..7597d5d59df 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -196,21 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index be32bafeea2..f53945aa18d 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -121,36 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 5dec23f143d..57d937db7c5 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -147,6 +147,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index 949e07b252c..f3de51dd992 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -139,6 +139,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index e972d6f7760..e1ee30e910e 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -151,16 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index 1ac38364420..9c31e64f189 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -276,21 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index 53a12fdae6a..8fd4103b053 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -156,26 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index d886bc2b177..a6a60bd1edd 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -177,6 +177,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 4d234081f30..32dc1b77caa 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -147,6 +147,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index 436e5a2f363..b84fe5b8582 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -199,6 +199,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 4db523e52cb..a7c530fcad9 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -229,6 +229,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index feb4b6faa2e..07e1561659b 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -281,6 +281,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 4298ab5453f..67eae0d697d 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -177,11 +177,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index df7e26b952c..3185cfbf442 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -172,6 +172,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index d10c8716f2d..2c9e5b0a6d7 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -127,36 +127,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 78067354b6e..4cc10660edd 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -157,36 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index 69782c67060..6cf3d320c72 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -156,16 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index ccb2b3bcc00..ad6c7fbcdba 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -178,11 +178,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 4f6b188157e..4638d9ab722 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -263,26 +263,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index 7b3e5deaf59..d20db6e688d 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -203,21 +203,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json
index 7b12a2536ba..edc40dbec30 100644
--- a/2019/0xxx/CVE-2019-0220.json
+++ b/2019/0xxx/CVE-2019-0220.json
@@ -198,21 +198,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json
index 74996291775..ff0ab125236 100644
--- a/2019/10xxx/CVE-2019-10082.json
+++ b/2019/10xxx/CVE-2019-10082.json
@@ -98,11 +98,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index d955d449e48..82c0381db76 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -278,26 +278,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index b14ef2759d0..ebac7f7b758 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -173,6 +173,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml",
+                "url": "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 46d2ce90597..7094bac30eb 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -187,6 +187,16 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/"
             }
         ]
     },

From 2ce57c78355f76569906c54f5e6cb2f1dc4058e7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:02:53 +0000
Subject: [PATCH 746/845] "-Synchronized-Data."

---
 2000/0xxx/CVE-2000-0505.json   |  5 -----
 2001/0xxx/CVE-2001-0730.json   |  5 +++++
 2002/0xxx/CVE-2002-0661.json   | 20 ++++++++++++++++++++
 2002/0xxx/CVE-2002-0840.json   |  5 +++++
 2003/0xxx/CVE-2003-0016.json   | 30 ++++++++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0017.json   | 15 ---------------
 2003/0xxx/CVE-2003-0083.json   | 10 ----------
 2003/0xxx/CVE-2003-0134.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0192.json   |  5 -----
 2003/0xxx/CVE-2003-0254.json   | 15 ---------------
 2003/0xxx/CVE-2003-0789.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0174.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0748.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0786.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0940.json   | 15 +++++++++++++++
 2005/2xxx/CVE-2005-2088.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2700.json   | 10 ----------
 2005/2xxx/CVE-2005-2970.json   | 10 ----------
 2007/3xxx/CVE-2007-3304.json   | 10 ++++++++++
 2007/3xxx/CVE-2007-3847.json   | 10 ----------
 2007/6xxx/CVE-2007-6388.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6422.json   | 10 ++++++++++
 2008/0xxx/CVE-2008-0005.json   |  5 +++++
 2008/0xxx/CVE-2008-0456.json   | 15 ---------------
 2008/2xxx/CVE-2008-2364.json   |  5 -----
 2008/2xxx/CVE-2008-2939.json   | 20 ++++++++++++++++++++
 2009/1xxx/CVE-2009-1191.json   | 10 ----------
 2009/1xxx/CVE-2009-1891.json   | 20 ++++++++++++++++++++
 2009/1xxx/CVE-2009-1956.json   | 10 ----------
 2009/2xxx/CVE-2009-2412.json   | 25 +++++++++++++++++++++++++
 2009/2xxx/CVE-2009-2699.json   |  5 +++++
 2009/3xxx/CVE-2009-3094.json   | 20 ++++++++++++++++++++
 2009/3xxx/CVE-2009-3095.json   | 25 +++++++++++++++++++++++++
 2009/3xxx/CVE-2009-3720.json   | 10 ----------
 2010/0xxx/CVE-2010-0425.json   | 30 ------------------------------
 2010/1xxx/CVE-2010-1623.json   | 10 ----------
 2010/2xxx/CVE-2010-2068.json   | 10 ----------
 2010/2xxx/CVE-2010-2791.json   |  5 +++++
 2011/0xxx/CVE-2011-0419.json   |  5 +++++
 2011/3xxx/CVE-2011-3192.json   | 20 --------------------
 2011/3xxx/CVE-2011-3348.json   |  5 +++++
 2011/3xxx/CVE-2011-3368.json   | 20 --------------------
 2011/3xxx/CVE-2011-3607.json   | 20 --------------------
 2011/4xxx/CVE-2011-4317.json   | 10 ++++++++++
 2012/0xxx/CVE-2012-0021.json   | 10 ++++++++++
 2012/0xxx/CVE-2012-0031.json   | 30 ++++++++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0053.json   | 30 ++++++++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0883.json   | 10 ----------
 2012/2xxx/CVE-2012-2687.json   |  5 -----
 2012/3xxx/CVE-2012-3499.json   | 10 ++++++++++
 2012/3xxx/CVE-2012-3502.json   |  5 -----
 2012/4xxx/CVE-2012-4557.json   | 20 ++++++++++++++++++++
 2012/4xxx/CVE-2012-4558.json   |  5 -----
 2013/1xxx/CVE-2013-1896.json   |  5 -----
 2013/6xxx/CVE-2013-6438.json   | 25 -------------------------
 2014/0xxx/CVE-2014-0098.json   | 25 -------------------------
 2014/0xxx/CVE-2014-0117.json   | 25 -------------------------
 2014/3xxx/CVE-2014-3581.json   | 15 ---------------
 2015/3xxx/CVE-2015-3183.json   | 10 ++++++++++
 2015/3xxx/CVE-2015-3185.json   | 15 ---------------
 2017/3xxx/CVE-2017-3169.json   | 20 --------------------
 2017/9xxx/CVE-2017-9788.json   | 30 ++++++++++++++++++++++++++++++
 2018/11xxx/CVE-2018-11763.json | 25 -------------------------
 2018/1xxx/CVE-2018-1301.json   | 25 -------------------------
 2018/1xxx/CVE-2018-1302.json   | 25 +++++++++++++++++++++++++
 2019/0xxx/CVE-2019-0215.json   | 25 +++++++++++++++++++++++++
 2019/10xxx/CVE-2019-10098.json | 20 --------------------
 2020/11xxx/CVE-2020-11984.json |  5 -----
 2021/29xxx/CVE-2021-29098.json | 10 ++++++++++
 69 files changed, 565 insertions(+), 470 deletions(-)

diff --git a/2000/0xxx/CVE-2000-0505.json b/2000/0xxx/CVE-2000-0505.json
index affb2e4b344..26f1f18085e 100644
--- a/2000/0xxx/CVE-2000-0505.json
+++ b/2000/0xxx/CVE-2000-0505.json
@@ -71,11 +71,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0730.json b/2001/0xxx/CVE-2001-0730.json
index 5aa07dd9564..834f731d138 100644
--- a/2001/0xxx/CVE-2001-0730.json
+++ b/2001/0xxx/CVE-2001-0730.json
@@ -96,6 +96,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index 8f44ac2bc70..11373b081e8 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -101,6 +101,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index 76c681d59a9..c6aff684a85 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -201,6 +201,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index ce1973c6dcb..a7626f33019 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -111,6 +111,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index b00afce6d46..10029e44604 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -96,21 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 84b59a2b496..23ca8af8f83 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -111,16 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index a8ba3c36e29..3accedf3a68 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -96,6 +96,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index ed978fae924..3b593f6a57e 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -111,11 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 3401a6fc55c..7bd07ab0ffd 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -111,21 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index 5632b4cb40d..d8a320cbc84 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -146,6 +146,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index f1f767ba4aa..603f1afd20e 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -186,6 +186,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index ace756938e3..fb06733159b 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -116,6 +116,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index 6efc0937c96..0edf706f3e1 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -121,6 +121,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index 4e8e12e53be..e8c01715d2a 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index 2cedb9b2869..f4431d59797 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -326,6 +326,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index c7a16d739b5..ce62c2903ea 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -351,16 +351,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 5691cf0497e..5f8da2ef98f 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -166,16 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 8ee693f2f77..87e41890470 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -446,6 +446,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index efd43945a14..c1281ec5f58 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -416,16 +416,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 5b0997ff8da..74c0c467486 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -481,6 +481,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 724f3bf9aec..9adc7583f6b 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -181,6 +181,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 88643781716..23100159196 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -336,6 +336,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index 9398e2fb746..4b2f64f7d7c 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 7fb08ca34e7..65c70f6eaa2 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -356,11 +356,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index 1706b8c2d1d..7bd40852787 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -331,6 +331,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 9166abc629a..7e40e675980 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -176,16 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index f0adaaa2158..bf4e231c5c4 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -291,6 +291,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index 162cfe34a72..b0cfd39b4d0 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -291,16 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 516527c90f2..452308d4436 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -266,6 +266,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index bd1eb732e7a..c81db2e18cf 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -136,6 +136,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index 31dc4b59f48..cf728068936 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -216,6 +216,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 135ef2d9bff..50f8f0ed9f9 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -216,6 +216,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 6f8575640a3..21f8ff8845c 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -451,16 +451,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 6d578e27963..1202fb9c757 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -211,36 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index 63a01b9176d..a400db4c22d 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -301,16 +301,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index 1755b79579d..3f7a3ab6fae 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -231,16 +231,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index f99bc511479..41ae2cc9855 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index 0d19647ec36..e6521e48ea9 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -336,6 +336,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index aeea9504ef0..d891f3827d4 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -391,26 +391,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index fa697390049..23be6681bf2 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -191,6 +191,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 1d1a83b82c8..fe4a0aa1f78 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -281,26 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index 87084d82cee..f59374e7db0 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -251,26 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/4xxx/CVE-2011-4317.json b/2011/4xxx/CVE-2011-4317.json
index 112e3f1fefd..2289595fd4f 100644
--- a/2011/4xxx/CVE-2011-4317.json
+++ b/2011/4xxx/CVE-2011-4317.json
@@ -196,6 +196,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index 6b37527970c..4b3369167fb 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -176,6 +176,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index 7a590fb2822..4a51ddfb4a7 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -221,6 +221,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index a3cb25af74b..eeb3870d10c 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -246,6 +246,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index b5f19d77c4e..ec78cefa185 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -181,16 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index e65ad97cf43..13d7c700bf2 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -221,11 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 2c6c995e945..b52fa8c6705 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -221,6 +221,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3502.json b/2012/3xxx/CVE-2012-3502.json
index fdc7481ae9a..4de3979887c 100644
--- a/2012/3xxx/CVE-2012-3502.json
+++ b/2012/3xxx/CVE-2012-3502.json
@@ -96,11 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index 3db52c75007..7d1aed05fa0 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -136,6 +136,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index a7a3f81e8ef..36ce9a39aae 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -186,11 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index ea6e1365f64..48d3fced505 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -206,11 +206,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index b8fe5a44517..5b135f27411 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -261,31 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index 678eb8a1ad3..f45f87fc0b6 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -276,31 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index 635b4558cba..f1109ccd587 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -136,31 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3581.json b/2014/3xxx/CVE-2014-3581.json
index dad38851624..e4d84288e64 100644
--- a/2014/3xxx/CVE-2014-3581.json
+++ b/2014/3xxx/CVE-2014-3581.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index ce90bcde8cf..b26ef6efcf2 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -296,6 +296,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index 7597d5d59df..a3777659f2b 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -181,21 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 5ebe95ddb08..92573751b84 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -204,26 +204,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index f5fc3a170af..d52d9d7ef95 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -225,6 +225,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index bbef673ec24..645ab01fa55 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -147,31 +147,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index 3185cfbf442..e00919c0231 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -152,31 +152,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 2c9e5b0a6d7..59156afd0be 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -127,6 +127,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0215.json b/2019/0xxx/CVE-2019-0215.json
index 08fba0b5166..661f2f176d8 100644
--- a/2019/0xxx/CVE-2019-0215.json
+++ b/2019/0xxx/CVE-2019-0215.json
@@ -156,6 +156,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 80c5d8422ca..776e054e766 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -88,26 +88,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index ebac7f7b758..7f92162cf82 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -178,11 +178,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml",
                 "url": "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 449062d70d7..3c61d72b8d7 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -161,6 +161,16 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
             }
         ]
     },

From ba0839b123e8b9617dcfdfa5ac76eca379917ff7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:03:10 +0000
Subject: [PATCH 747/845] "-Synchronized-Data."

---
 2001/0xxx/CVE-2001-0731.json   |  5 +++++
 2002/0xxx/CVE-2002-0392.json   | 15 +++++++++++++++
 2002/0xxx/CVE-2002-0654.json   |  5 -----
 2002/0xxx/CVE-2002-0661.json   |  5 -----
 2002/0xxx/CVE-2002-0839.json   |  5 -----
 2002/0xxx/CVE-2002-0840.json   | 10 ++++++++++
 2002/0xxx/CVE-2002-0843.json   | 10 ++++++++++
 2002/1xxx/CVE-2002-1156.json   |  5 +++++
 2002/1xxx/CVE-2002-1592.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0017.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0083.json   | 30 ++++++++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0132.json   | 15 ---------------
 2003/0xxx/CVE-2003-0189.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0245.json   | 15 ---------------
 2004/0xxx/CVE-2004-0113.json   | 30 ------------------------------
 2004/0xxx/CVE-2004-0493.json   | 30 ++++++++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0747.json   | 25 +++++++++++++++++++++++++
 2004/0xxx/CVE-2004-0751.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0809.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0811.json   | 25 +++++++++++++++++++++++++
 2004/1xxx/CVE-2004-1834.json   |  5 -----
 2005/1xxx/CVE-2005-1268.json   |  5 -----
 2005/2xxx/CVE-2005-2491.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2700.json   | 20 ++++++++++++++++++++
 2005/2xxx/CVE-2005-2728.json   | 10 ----------
 2005/2xxx/CVE-2005-2970.json   | 20 ++++++++++++++++++++
 2005/3xxx/CVE-2005-3357.json   | 10 ----------
 2006/3xxx/CVE-2006-3747.json   | 15 +++++++++++++++
 2007/3xxx/CVE-2007-3304.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6420.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6421.json   |  5 -----
 2008/0xxx/CVE-2008-0005.json   | 15 +++++++++++++++
 2008/0xxx/CVE-2008-0455.json   |  5 -----
 2009/0xxx/CVE-2009-0023.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1195.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1890.json   | 10 ++++++++++
 2009/2xxx/CVE-2009-2412.json   | 10 ----------
 2009/2xxx/CVE-2009-2699.json   | 10 ----------
 2009/3xxx/CVE-2009-3560.json   | 15 +++++++++++++++
 2009/3xxx/CVE-2009-3720.json   | 30 ++++++++++++++++++++++++++++++
 2010/0xxx/CVE-2010-0010.json   | 10 ++++++++++
 2010/0xxx/CVE-2010-0408.json   |  5 +++++
 2010/0xxx/CVE-2010-0425.json   | 10 ++++++++++
 2010/0xxx/CVE-2010-0434.json   | 20 --------------------
 2010/1xxx/CVE-2010-1452.json   | 10 ----------
 2010/1xxx/CVE-2010-1623.json   | 15 +++++++++++++++
 2010/2xxx/CVE-2010-2068.json   | 15 ---------------
 2010/2xxx/CVE-2010-2791.json   | 15 ---------------
 2011/0xxx/CVE-2011-0419.json   | 25 -------------------------
 2011/3xxx/CVE-2011-3192.json   | 10 ++++++++++
 2011/3xxx/CVE-2011-3368.json   | 10 ++++++++++
 2011/3xxx/CVE-2011-3607.json   | 10 ++++++++++
 2012/0xxx/CVE-2012-0021.json   | 15 ---------------
 2012/0xxx/CVE-2012-0031.json   | 15 ---------------
 2012/0xxx/CVE-2012-0053.json   | 25 -------------------------
 2012/3xxx/CVE-2012-3499.json   | 15 ---------------
 2012/4xxx/CVE-2012-4557.json   | 30 ------------------------------
 2012/4xxx/CVE-2012-4558.json   | 25 +++++++++++++++++++++++++
 2013/1xxx/CVE-2013-1862.json   |  5 +++++
 2014/0xxx/CVE-2014-0118.json   | 10 ----------
 2014/3xxx/CVE-2014-3523.json   | 15 ---------------
 2014/3xxx/CVE-2014-3583.json   | 15 ---------------
 2015/0xxx/CVE-2015-0228.json   | 20 --------------------
 2015/3xxx/CVE-2015-3185.json   | 20 ++++++++++++++++++++
 2016/4xxx/CVE-2016-4975.json   | 15 +++++++++++++++
 2016/8xxx/CVE-2016-8743.json   | 10 ----------
 2017/3xxx/CVE-2017-3167.json   | 15 +++++++++++++++
 2017/3xxx/CVE-2017-3169.json   | 30 ++++++++++++++++++++++++++++++
 2017/7xxx/CVE-2017-7668.json   |  5 +++++
 2017/9xxx/CVE-2017-9798.json   | 25 -------------------------
 2018/1xxx/CVE-2018-1283.json   | 25 +++++++++++++++++++++++++
 2018/1xxx/CVE-2018-1303.json   | 25 -------------------------
 2018/8xxx/CVE-2018-8011.json   | 20 --------------------
 2019/0xxx/CVE-2019-0197.json   | 20 --------------------
 2019/0xxx/CVE-2019-0211.json   | 25 +++++++++++++++++++++++++
 2019/10xxx/CVE-2019-10081.json |  5 +++++
 2019/10xxx/CVE-2019-10092.json | 25 -------------------------
 2020/11xxx/CVE-2020-11993.json | 10 ----------
 78 files changed, 635 insertions(+), 515 deletions(-)

diff --git a/2001/0xxx/CVE-2001-0731.json b/2001/0xxx/CVE-2001-0731.json
index d79b436aa0f..bea56cb8a00 100644
--- a/2001/0xxx/CVE-2001-0731.json
+++ b/2001/0xxx/CVE-2001-0731.json
@@ -101,6 +101,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 8eb662adc95..e6b990e8e6a 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -251,6 +251,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index 9c7fe1ba85e..eb1bd1dc80b 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -121,11 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0661.json b/2002/0xxx/CVE-2002-0661.json
index 11373b081e8..94760f0da0a 100644
--- a/2002/0xxx/CVE-2002-0661.json
+++ b/2002/0xxx/CVE-2002-0661.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0839.json b/2002/0xxx/CVE-2002-0839.json
index 3a9772a2e33..bef68b62dc1 100644
--- a/2002/0xxx/CVE-2002-0839.json
+++ b/2002/0xxx/CVE-2002-0839.json
@@ -156,11 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0840.json b/2002/0xxx/CVE-2002-0840.json
index c6aff684a85..3b1729452b6 100644
--- a/2002/0xxx/CVE-2002-0840.json
+++ b/2002/0xxx/CVE-2002-0840.json
@@ -206,6 +206,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0843.json b/2002/0xxx/CVE-2002-0843.json
index 6699b9c7018..f158e52807e 100644
--- a/2002/0xxx/CVE-2002-0843.json
+++ b/2002/0xxx/CVE-2002-0843.json
@@ -171,6 +171,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1156.json b/2002/1xxx/CVE-2002-1156.json
index 1820e5bc99d..db0091cdf71 100644
--- a/2002/1xxx/CVE-2002-1156.json
+++ b/2002/1xxx/CVE-2002-1156.json
@@ -106,6 +106,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index a47deba61cd..df6b8ca30fc 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -96,6 +96,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 10029e44604..5a84c840a8b 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -96,6 +96,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 23ca8af8f83..56135a09b03 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -111,6 +111,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 3686b03cdcf..19361833730 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -166,21 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 0972b8c1cac..93fc61092dd 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -116,6 +116,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 91084199710..973a399298d 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 0d36631c453..32409e1502d 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -156,36 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index c4fbf102a08..a1cd21705fb 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -136,6 +136,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index e5f79263938..3645de51eaa 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -146,6 +146,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index 29d92a51f7b..f8a19fc812f 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index 18ce4682566..2dd6935e76f 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -116,6 +116,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index ff17438d5a4..5f638543297 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -116,6 +116,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 10aedae087b..23207611d09 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index efc38abaecd..52730f6ffb3 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -176,11 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index a14dbe0c423..5c705b96967 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -371,6 +371,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index ce62c2903ea..244ffe4098b 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -351,6 +351,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 7861382a1c6..5d0b4e06112 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -291,16 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 5f8da2ef98f..829e009d484 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -166,6 +166,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index d0305b28678..a6492574a4a 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -356,16 +356,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index 7bd4b4a533f..e8a7ff3b59e 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -481,6 +481,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 87e41890470..48a4772a580 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -456,6 +456,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6420.json b/2007/6xxx/CVE-2007-6420.json
index fa121d87f38..c0f8606892f 100644
--- a/2007/6xxx/CVE-2007-6420.json
+++ b/2007/6xxx/CVE-2007-6420.json
@@ -191,6 +191,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index dcee4e94f2d..62ba3f44caa 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -201,11 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0005.json b/2008/0xxx/CVE-2008-0005.json
index 23100159196..cbaa0dc7d99 100644
--- a/2008/0xxx/CVE-2008-0005.json
+++ b/2008/0xxx/CVE-2008-0005.json
@@ -341,6 +341,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0455.json b/2008/0xxx/CVE-2008-0455.json
index ba407cd19d5..a55eea4b05e 100644
--- a/2008/0xxx/CVE-2008-0455.json
+++ b/2008/0xxx/CVE-2008-0455.json
@@ -156,11 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/0xxx/CVE-2009-0023.json b/2009/0xxx/CVE-2009-0023.json
index d012abf66dd..15c22679b93 100644
--- a/2009/0xxx/CVE-2009-0023.json
+++ b/2009/0xxx/CVE-2009-0023.json
@@ -306,6 +306,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 4df658a5e99..113ba1e5d88 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -241,6 +241,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 02444d1b377..518d3fdbf54 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -256,6 +256,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 452308d4436..5b04c0a97fd 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -281,16 +281,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index c81db2e18cf..2a6f0a96ec4 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -131,16 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 4d5d3605892..7c844456a88 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -301,6 +301,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 21f8ff8845c..1b9dfedd744 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -451,6 +451,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index ee16e38a2cf..9808af51652 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -156,6 +156,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index b73921368cd..c00f2f6781e 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -256,6 +256,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 1202fb9c757..9a2fb9bdf5d 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -211,6 +211,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index 12e2abbaef7..3d1d72c6e3d 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -291,26 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1452.json b/2010/1xxx/CVE-2010-1452.json
index f70b0b8ab72..060366435de 100644
--- a/2010/1xxx/CVE-2010-1452.json
+++ b/2010/1xxx/CVE-2010-1452.json
@@ -226,16 +226,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/1xxx/CVE-2010-1623.json b/2010/1xxx/CVE-2010-1623.json
index a400db4c22d..aa0082ab71b 100644
--- a/2010/1xxx/CVE-2010-1623.json
+++ b/2010/1xxx/CVE-2010-1623.json
@@ -301,6 +301,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index 3f7a3ab6fae..83c6b5848e4 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -216,21 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 41ae2cc9855..4a7060f1ef3 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -111,21 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index e6521e48ea9..9b9274a2e39 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -316,31 +316,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index d891f3827d4..6f1a2a025af 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -391,6 +391,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index fe4a0aa1f78..8bea3e1527e 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -281,6 +281,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3607.json b/2011/3xxx/CVE-2011-3607.json
index f59374e7db0..cff66c4947d 100644
--- a/2011/3xxx/CVE-2011-3607.json
+++ b/2011/3xxx/CVE-2011-3607.json
@@ -251,6 +251,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index 4b3369167fb..d52ecfc1a6f 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -171,21 +171,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index 4a51ddfb4a7..da021163141 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -236,21 +236,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0053.json b/2012/0xxx/CVE-2012-0053.json
index eeb3870d10c..bf82791581b 100644
--- a/2012/0xxx/CVE-2012-0053.json
+++ b/2012/0xxx/CVE-2012-0053.json
@@ -251,31 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index b52fa8c6705..47b6de1e0cf 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -216,21 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index 7d1aed05fa0..ef89256347a 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -126,36 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index 36ce9a39aae..8e998f490c9 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -186,6 +186,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 287dae03dc1..2b72ddc9e98 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -226,6 +226,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index a53bd575a8b..8fc4a202c9f 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -231,16 +231,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 01641bc40c1..377d3e74488 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -111,21 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3583.json b/2014/3xxx/CVE-2014-3583.json
index d83c4b71c79..5e56ec7a4e5 100644
--- a/2014/3xxx/CVE-2014-3583.json
+++ b/2014/3xxx/CVE-2014-3583.json
@@ -141,21 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0228.json b/2015/0xxx/CVE-2015-0228.json
index eec7820bcbe..c9af2015ff2 100644
--- a/2015/0xxx/CVE-2015-0228.json
+++ b/2015/0xxx/CVE-2015-0228.json
@@ -156,26 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3185.json b/2015/3xxx/CVE-2015-3185.json
index a3777659f2b..a8cd723c91f 100644
--- a/2015/3xxx/CVE-2015-3185.json
+++ b/2015/3xxx/CVE-2015-3185.json
@@ -181,6 +181,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index f3de51dd992..fb5f46abf70 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -154,6 +154,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index a6a60bd1edd..263eca07a63 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -182,16 +182,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index b84fe5b8582..e687b201b60 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -214,6 +214,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index 92573751b84..f887ee4abc6 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -204,6 +204,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 7313e4929da..0771730abb4 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -174,6 +174,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 07e1561659b..9bcebf4a3e7 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -286,31 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 19e84ef79df..4189c426433 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -142,6 +142,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index 5e01b628ff8..63962cac63e 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -142,31 +142,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/8xxx/CVE-2018-8011.json b/2018/8xxx/CVE-2018-8011.json
index 7c83eea6eef..2159bd6292a 100644
--- a/2018/8xxx/CVE-2018-8011.json
+++ b/2018/8xxx/CVE-2018-8011.json
@@ -106,26 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0197.json b/2019/0xxx/CVE-2019-0197.json
index ad6c7fbcdba..8fc64e81aa7 100644
--- a/2019/0xxx/CVE-2019-0197.json
+++ b/2019/0xxx/CVE-2019-0197.json
@@ -158,26 +158,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json
index 4638d9ab722..bec112cfa51 100644
--- a/2019/0xxx/CVE-2019-0211.json
+++ b/2019/0xxx/CVE-2019-0211.json
@@ -263,6 +263,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index abf25eaa694..0c3d5b29fb2 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -133,6 +133,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json
index ffb6d00a69a..116aa538c90 100644
--- a/2019/10xxx/CVE-2019-10092.json
+++ b/2019/10xxx/CVE-2019-10092.json
@@ -178,31 +178,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index ee20bc73e99..fa3f9613216 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -128,16 +128,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From f49ee2983919485e921a9ae962f6ed30edf9aee9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:03:27 +0000
Subject: [PATCH 748/845] "-Synchronized-Data."

---
 2000/0xxx/CVE-2000-0505.json   | 10 ++++++++++
 2001/0xxx/CVE-2001-0731.json   | 10 ----------
 2002/0xxx/CVE-2002-0392.json   | 20 --------------------
 2002/0xxx/CVE-2002-0654.json   | 10 ----------
 2002/0xxx/CVE-2002-0843.json   |  5 +++++
 2002/1xxx/CVE-2002-1593.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0016.json   | 15 ---------------
 2003/0xxx/CVE-2003-0020.json   | 20 ++++++++++++++++++++
 2003/0xxx/CVE-2003-0083.json   |  5 +++++
 2003/0xxx/CVE-2003-0192.json   | 30 ++++++++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0253.json   | 30 ------------------------------
 2003/0xxx/CVE-2003-0460.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0542.json   | 20 ++++++++++++++++++++
 2003/0xxx/CVE-2003-0789.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0987.json   | 10 ----------
 2004/0xxx/CVE-2004-0113.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0174.json   | 15 ---------------
 2004/0xxx/CVE-2004-0488.json   | 15 ---------------
 2004/0xxx/CVE-2004-0492.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0811.json   |  5 -----
 2004/0xxx/CVE-2004-0885.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0940.json   | 25 -------------------------
 2004/0xxx/CVE-2004-0942.json   | 25 +++++++++++++++++++++++++
 2004/1xxx/CVE-2004-1834.json   | 15 +++++++++++++++
 2005/1xxx/CVE-2005-1268.json   | 15 +++++++++++++++
 2005/2xxx/CVE-2005-2491.json   | 15 ---------------
 2005/3xxx/CVE-2005-3352.json   | 10 ++++++++++
 2006/5xxx/CVE-2006-5752.json   | 25 -------------------------
 2007/1xxx/CVE-2007-1862.json   | 15 +++++++++++++++
 2007/5xxx/CVE-2007-5000.json   | 15 +++++++++++++++
 2007/6xxx/CVE-2007-6421.json   | 15 +++++++++++++++
 2008/2xxx/CVE-2008-2939.json   | 15 ---------------
 2009/1xxx/CVE-2009-1191.json   | 25 +++++++++++++++++++++++++
 2009/1xxx/CVE-2009-1891.json   | 25 -------------------------
 2009/1xxx/CVE-2009-1955.json   |  5 -----
 2009/2xxx/CVE-2009-2412.json   | 10 ----------
 2009/2xxx/CVE-2009-2699.json   | 10 ----------
 2009/3xxx/CVE-2009-3094.json   | 30 ------------------------------
 2009/3xxx/CVE-2009-3095.json   | 20 --------------------
 2009/3xxx/CVE-2009-3560.json   | 10 ----------
 2009/3xxx/CVE-2009-3720.json   | 10 ++++++++++
 2010/0xxx/CVE-2010-0408.json   | 10 ----------
 2010/0xxx/CVE-2010-0434.json   | 10 ++++++++++
 2011/0xxx/CVE-2011-0419.json   | 10 ++++++++++
 2011/3xxx/CVE-2011-3192.json   | 15 ---------------
 2011/3xxx/CVE-2011-3348.json   | 15 ---------------
 2012/0xxx/CVE-2012-0021.json   | 25 +++++++++++++++++++++++++
 2012/0xxx/CVE-2012-0883.json   | 30 ++++++++++++++++++++++++++++++
 2012/2xxx/CVE-2012-2687.json   |  5 -----
 2012/4xxx/CVE-2012-4557.json   |  5 +++++
 2012/4xxx/CVE-2012-4558.json   | 10 ----------
 2013/1xxx/CVE-2013-1862.json   | 15 +++++++++++++++
 2013/1xxx/CVE-2013-1896.json   |  5 -----
 2013/2xxx/CVE-2013-2249.json   |  5 -----
 2013/4xxx/CVE-2013-4352.json   |  5 +++++
 2013/5xxx/CVE-2013-5704.json   | 25 -------------------------
 2013/6xxx/CVE-2013-6438.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0098.json   | 10 ----------
 2014/0xxx/CVE-2014-0117.json   | 20 ++++++++++++++++++++
 2014/0xxx/CVE-2014-0118.json   | 15 +++++++++++++++
 2014/0xxx/CVE-2014-0226.json   | 25 +++++++++++++++++++++++++
 2014/0xxx/CVE-2014-0231.json   | 10 ----------
 2014/3xxx/CVE-2014-3523.json   | 20 ++++++++++++++++++++
 2015/0xxx/CVE-2015-0253.json   | 15 ---------------
 2016/1xxx/CVE-2016-1546.json   | 20 ++++++++++++++++++++
 2016/4xxx/CVE-2016-4975.json   | 25 -------------------------
 2016/4xxx/CVE-2016-4979.json   | 10 ----------
 2016/5xxx/CVE-2016-5387.json   | 10 ----------
 2017/15xxx/CVE-2017-15715.json | 10 ++++++++++
 2017/3xxx/CVE-2017-3167.json   | 25 -------------------------
 2017/7xxx/CVE-2017-7668.json   | 25 +++++++++++++++++++++++++
 2017/7xxx/CVE-2017-7679.json   | 25 -------------------------
 2017/9xxx/CVE-2017-9788.json   | 25 -------------------------
 2018/17xxx/CVE-2018-17189.json |  5 +++++
 2019/10xxx/CVE-2019-10097.json | 20 --------------------
 2020/11xxx/CVE-2020-11985.json |  5 +++++
 2020/1xxx/CVE-2020-1927.json   | 25 -------------------------
 2020/9xxx/CVE-2020-9490.json   | 20 ++++++++++++++++++++
 78 files changed, 595 insertions(+), 610 deletions(-)

diff --git a/2000/0xxx/CVE-2000-0505.json b/2000/0xxx/CVE-2000-0505.json
index 26f1f18085e..53caf1ebceb 100644
--- a/2000/0xxx/CVE-2000-0505.json
+++ b/2000/0xxx/CVE-2000-0505.json
@@ -71,6 +71,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0731.json b/2001/0xxx/CVE-2001-0731.json
index bea56cb8a00..b9a5dc3b644 100644
--- a/2001/0xxx/CVE-2001-0731.json
+++ b/2001/0xxx/CVE-2001-0731.json
@@ -96,16 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index e6b990e8e6a..038158289f2 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -246,26 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0654.json b/2002/0xxx/CVE-2002-0654.json
index eb1bd1dc80b..97b3a97caf8 100644
--- a/2002/0xxx/CVE-2002-0654.json
+++ b/2002/0xxx/CVE-2002-0654.json
@@ -111,16 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0843.json b/2002/0xxx/CVE-2002-0843.json
index f158e52807e..bf3a092c82c 100644
--- a/2002/0xxx/CVE-2002-0843.json
+++ b/2002/0xxx/CVE-2002-0843.json
@@ -181,6 +181,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index 993b12bb1a3..a799abebfcb 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -101,6 +101,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index a7626f33019..a4579b6c73c 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -126,21 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 7536f1c1381..2df2191d3b2 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -206,6 +206,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 56135a09b03..1de92e6943a 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -141,6 +141,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index 3b593f6a57e..e1f94ef4d1e 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -111,6 +111,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 4f9e33ca566..d58f9735bcc 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -96,36 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index de3b54acf9c..f7997f8d2dc 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -76,6 +76,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 851f4e2d908..82f0a4681d3 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -276,6 +276,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index d8a320cbc84..0479216e3bb 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -161,6 +161,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index a664ad2f402..1a07dc1616a 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -141,16 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 32409e1502d..83836e9dd01 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -156,6 +156,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index 603f1afd20e..cb442fab2f0 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -196,21 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index d7f4c0ebd2c..d4f6925f78b 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -186,21 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 0c66d182274..2d3d7769f41 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -156,6 +156,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index 5f638543297..c2ea1f48855 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index 497474d3c4a..bb54e223e60 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -171,6 +171,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index e8c01715d2a..8afb434c39d 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -126,31 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index faf60e29857..e57482172cd 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -146,6 +146,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 23207611d09..4fa898b1d6e 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index 52730f6ffb3..63dd3123ceb 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -176,6 +176,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index 5c705b96967..05b66822408 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -366,21 +366,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index e18b9daa3a5..10bb0eeff71 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -441,6 +441,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index c96fe021f20..fd986cde4e9 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -411,31 +411,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index 59f894dfa28..d375b84d6d3 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -171,6 +171,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index d365be614e5..0b248521282 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -506,6 +506,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6421.json b/2007/6xxx/CVE-2007-6421.json
index 62ba3f44caa..3fdda9c513c 100644
--- a/2007/6xxx/CVE-2007-6421.json
+++ b/2007/6xxx/CVE-2007-6421.json
@@ -201,6 +201,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2939.json b/2008/2xxx/CVE-2008-2939.json
index 7bd40852787..33efbeaa861 100644
--- a/2008/2xxx/CVE-2008-2939.json
+++ b/2008/2xxx/CVE-2008-2939.json
@@ -336,21 +336,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 7e40e675980..97e37839ee2 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -176,6 +176,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index bf4e231c5c4..37f1cd247cd 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -286,31 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index a768832da9d..3f079b48a61 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -321,11 +321,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index 5b04c0a97fd..a01f4c56122 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -271,16 +271,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 2a6f0a96ec4..1159e4565ef 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -121,16 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index cf728068936..a0af195eebc 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -206,36 +206,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 50f8f0ed9f9..9a1eea1565c 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -221,26 +221,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 7c844456a88..c28be6088bf 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -306,16 +306,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 1b9dfedd744..6fd593eef8f 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -481,6 +481,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index c00f2f6781e..f4089f73d34 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -251,16 +251,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index 3d1d72c6e3d..d22280f3969 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -291,6 +291,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index 9b9274a2e39..08a0247181a 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -316,6 +316,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3192.json b/2011/3xxx/CVE-2011-3192.json
index 6f1a2a025af..469a71d3c47 100644
--- a/2011/3xxx/CVE-2011-3192.json
+++ b/2011/3xxx/CVE-2011-3192.json
@@ -386,21 +386,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index 23be6681bf2..17ef5db1419 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -181,21 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0021.json b/2012/0xxx/CVE-2012-0021.json
index d52ecfc1a6f..bc6c7c3ab51 100644
--- a/2012/0xxx/CVE-2012-0021.json
+++ b/2012/0xxx/CVE-2012-0021.json
@@ -171,6 +171,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0883.json b/2012/0xxx/CVE-2012-0883.json
index ec78cefa185..89dc09dd09c 100644
--- a/2012/0xxx/CVE-2012-0883.json
+++ b/2012/0xxx/CVE-2012-0883.json
@@ -181,6 +181,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/2xxx/CVE-2012-2687.json b/2012/2xxx/CVE-2012-2687.json
index 13d7c700bf2..85ae846b3cb 100644
--- a/2012/2xxx/CVE-2012-2687.json
+++ b/2012/2xxx/CVE-2012-2687.json
@@ -216,11 +216,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index ef89256347a..d7ad02c142e 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -126,6 +126,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4558.json b/2012/4xxx/CVE-2012-4558.json
index 8e998f490c9..13f48a6cf2c 100644
--- a/2012/4xxx/CVE-2012-4558.json
+++ b/2012/4xxx/CVE-2012-4558.json
@@ -201,16 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1862.json b/2013/1xxx/CVE-2013-1862.json
index 2b72ddc9e98..3df3cec71a7 100644
--- a/2013/1xxx/CVE-2013-1862.json
+++ b/2013/1xxx/CVE-2013-1862.json
@@ -231,6 +231,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 48d3fced505..5d97402be1d 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -201,11 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/2xxx/CVE-2013-2249.json b/2013/2xxx/CVE-2013-2249.json
index 2a4e00efdae..6be2a9add5c 100644
--- a/2013/2xxx/CVE-2013-2249.json
+++ b/2013/2xxx/CVE-2013-2249.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 467596d0f43..02067a8dd1b 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -111,6 +111,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/5xxx/CVE-2013-5704.json b/2013/5xxx/CVE-2013-5704.json
index c87c29eda37..9d3ba9683ec 100644
--- a/2013/5xxx/CVE-2013-5704.json
+++ b/2013/5xxx/CVE-2013-5704.json
@@ -261,31 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/6xxx/CVE-2013-6438.json b/2013/6xxx/CVE-2013-6438.json
index 5b135f27411..5935760b615 100644
--- a/2013/6xxx/CVE-2013-6438.json
+++ b/2013/6xxx/CVE-2013-6438.json
@@ -261,6 +261,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0098.json b/2014/0xxx/CVE-2014-0098.json
index f45f87fc0b6..6ee92f142f4 100644
--- a/2014/0xxx/CVE-2014-0098.json
+++ b/2014/0xxx/CVE-2014-0098.json
@@ -266,16 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0117.json b/2014/0xxx/CVE-2014-0117.json
index f1109ccd587..4be1ba0dc02 100644
--- a/2014/0xxx/CVE-2014-0117.json
+++ b/2014/0xxx/CVE-2014-0117.json
@@ -136,6 +136,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index 8fc4a202c9f..ae11de6e6fa 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -231,6 +231,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index df1e2f6b5c9..8b8697c784f 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -266,6 +266,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0231.json b/2014/0xxx/CVE-2014-0231.json
index abbdd5409d4..1500df80004 100644
--- a/2014/0xxx/CVE-2014-0231.json
+++ b/2014/0xxx/CVE-2014-0231.json
@@ -261,16 +261,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/3xxx/CVE-2014-3523.json b/2014/3xxx/CVE-2014-3523.json
index 377d3e74488..b6dd95c6832 100644
--- a/2014/3xxx/CVE-2014-3523.json
+++ b/2014/3xxx/CVE-2014-3523.json
@@ -111,6 +111,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index 9e1002bd763..de836ed7bc4 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -146,21 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index f53945aa18d..5f97e4415a0 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -121,6 +121,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index fb5f46abf70..9d01e8dd0fe 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -144,31 +144,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index e1ee30e910e..c0cbf4bdaaf 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -141,16 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index 9c31e64f189..4b1ce4ea4c4 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -266,16 +266,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 32dc1b77caa..87661b68e1c 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -162,6 +162,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index e687b201b60..b158a38b1a6 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -204,31 +204,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 0771730abb4..040f5279b74 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -179,6 +179,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index a7c530fcad9..6f77512b29b 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -214,31 +214,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index d52d9d7ef95..481af969521 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -230,31 +230,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 297e45f3026..10cafa19572 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -187,6 +187,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index 05f614ae133..a04e3fbd586 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -88,26 +88,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index 79114da19cc..4190153a6f2 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -93,6 +93,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index a0efd4c3ee6..c1998391db5 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -118,31 +118,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 8f6ed041ee2..ca664f5f95b 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -138,6 +138,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888203 - /httpd/site/trunk/content/security/json/CVE-2020-9490.json",
+                "url": "https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 40c99ef00f12d24f07b9aab422e00636fbaa27b1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:03:44 +0000
Subject: [PATCH 749/845] "-Synchronized-Data."

---
 2000/1xxx/CVE-2000-1205.json   |  5 -----
 2001/0xxx/CVE-2001-0730.json   | 10 ----------
 2002/0xxx/CVE-2002-0392.json   | 10 ++++++++++
 2002/0xxx/CVE-2002-0839.json   | 10 ----------
 2003/0xxx/CVE-2003-0017.json   | 15 ---------------
 2003/0xxx/CVE-2003-0020.json   |  5 +++++
 2003/0xxx/CVE-2003-0083.json   | 20 --------------------
 2003/0xxx/CVE-2003-0132.json   | 15 ---------------
 2003/0xxx/CVE-2003-0134.json   |  5 -----
 2003/0xxx/CVE-2003-0189.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0192.json   |  5 -----
 2003/0xxx/CVE-2003-0245.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0253.json   | 25 +++++++++++++++++++++++++
 2003/0xxx/CVE-2003-0254.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0460.json   | 25 -------------------------
 2003/0xxx/CVE-2003-0542.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0113.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0174.json   | 20 --------------------
 2004/0xxx/CVE-2004-0488.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0492.json   |  5 -----
 2004/0xxx/CVE-2004-0493.json   | 20 --------------------
 2004/0xxx/CVE-2004-0747.json   | 20 --------------------
 2004/0xxx/CVE-2004-0748.json   |  5 -----
 2004/0xxx/CVE-2004-0751.json   |  5 -----
 2004/0xxx/CVE-2004-0786.json   |  5 -----
 2004/0xxx/CVE-2004-0809.json   | 10 ++++++++++
 2004/0xxx/CVE-2004-0811.json   | 15 ---------------
 2004/0xxx/CVE-2004-0885.json   | 15 +++++++++++++++
 2004/0xxx/CVE-2004-0940.json   | 20 ++++++++++++++++++++
 2004/0xxx/CVE-2004-0942.json   | 15 ---------------
 2004/1xxx/CVE-2004-1834.json   |  5 -----
 2005/1xxx/CVE-2005-1268.json   |  5 -----
 2005/2xxx/CVE-2005-2088.json   |  5 -----
 2005/2xxx/CVE-2005-2491.json   | 10 ++++++++++
 2005/3xxx/CVE-2005-3352.json   | 15 ---------------
 2006/5xxx/CVE-2006-5752.json   | 20 --------------------
 2007/1xxx/CVE-2007-1863.json   | 25 -------------------------
 2008/2xxx/CVE-2008-2364.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1195.json   | 15 +++++++++++++++
 2009/1xxx/CVE-2009-1890.json   | 15 +++++++++++++++
 2009/1xxx/CVE-2009-1891.json   | 10 ++++++++++
 2009/3xxx/CVE-2009-3095.json   | 20 --------------------
 2009/3xxx/CVE-2009-3560.json   | 20 ++++++++++++++++++++
 2010/0xxx/CVE-2010-0434.json   | 25 +++++++++++++++++++++++++
 2011/0xxx/CVE-2011-0419.json   | 15 ---------------
 2012/0xxx/CVE-2012-0031.json   | 25 +++++++++++++++++++++++++
 2013/4xxx/CVE-2013-4352.json   | 20 --------------------
 2014/0xxx/CVE-2014-0226.json   | 10 ++++++++++
 2015/3xxx/CVE-2015-3183.json   | 20 --------------------
 2016/0xxx/CVE-2016-0736.json   | 10 ++++++++++
 2016/2xxx/CVE-2016-2161.json   |  5 -----
 2016/4xxx/CVE-2016-4975.json   | 15 +++++++++++++++
 2016/4xxx/CVE-2016-4979.json   | 15 +++++++++++++++
 2016/5xxx/CVE-2016-5387.json   | 15 +++++++++++++++
 2016/8xxx/CVE-2016-8743.json   | 25 +++++++++++++++++++++++++
 2017/15xxx/CVE-2017-15710.json | 10 ++++++++++
 2018/17xxx/CVE-2018-17199.json | 20 --------------------
 2018/1xxx/CVE-2018-1312.json   | 25 +++++++++++++++++++++++++
 2018/1xxx/CVE-2018-1333.json   | 20 --------------------
 2019/0xxx/CVE-2019-0190.json   | 20 --------------------
 2019/0xxx/CVE-2019-0196.json   |  5 +++++
 2019/0xxx/CVE-2019-0217.json   | 25 +++++++++++++++++++++++++
 2019/10xxx/CVE-2019-10081.json | 25 -------------------------
 2019/10xxx/CVE-2019-10097.json | 25 +++++++++++++++++++++++++
 2019/9xxx/CVE-2019-9517.json   | 25 +++++++++++++++++++++++++
 2020/11xxx/CVE-2020-11984.json | 25 -------------------------
 2020/11xxx/CVE-2020-11985.json | 20 --------------------
 2020/11xxx/CVE-2020-11993.json | 25 +++++++++++++++++++++++++
 2020/1xxx/CVE-2020-1927.json   | 20 ++++++++++++++++++++
 2020/1xxx/CVE-2020-1934.json   | 20 ++++++++++++++++++++
 2020/9xxx/CVE-2020-9490.json   | 10 ----------
 71 files changed, 545 insertions(+), 515 deletions(-)

diff --git a/2000/1xxx/CVE-2000-1205.json b/2000/1xxx/CVE-2000-1205.json
index 2d8cbe72ff8..82808bc802b 100644
--- a/2000/1xxx/CVE-2000-1205.json
+++ b/2000/1xxx/CVE-2000-1205.json
@@ -86,11 +86,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0730.json b/2001/0xxx/CVE-2001-0730.json
index 834f731d138..f5030ecbb93 100644
--- a/2001/0xxx/CVE-2001-0730.json
+++ b/2001/0xxx/CVE-2001-0730.json
@@ -91,16 +91,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0392.json b/2002/0xxx/CVE-2002-0392.json
index 038158289f2..6fcb2c3f8c6 100644
--- a/2002/0xxx/CVE-2002-0392.json
+++ b/2002/0xxx/CVE-2002-0392.json
@@ -246,6 +246,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0839.json b/2002/0xxx/CVE-2002-0839.json
index bef68b62dc1..fb5142e3d4b 100644
--- a/2002/0xxx/CVE-2002-0839.json
+++ b/2002/0xxx/CVE-2002-0839.json
@@ -146,16 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 5a84c840a8b..0e1e3c457d9 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -91,21 +91,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index 2df2191d3b2..c54d9e66baa 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -226,6 +226,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 1de92e6943a..1891eab849f 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -126,26 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index 19361833730..e28711658f9 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -151,21 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index 3accedf3a68..94f676d7328 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -116,11 +116,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index 93fc61092dd..c143dbc22a4 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index e1f94ef4d1e..6eaffc55cc6 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index 973a399298d..e71fad12eeb 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -141,6 +141,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index d58f9735bcc..2e11408e670 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -96,6 +96,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index 7bd07ab0ffd..d73ff69eef1 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -111,6 +111,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index f7997f8d2dc..c286af2eb03 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -66,31 +66,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 82f0a4681d3..86d5e0c589f 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -296,6 +296,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index 83836e9dd01..e943bd2dd98 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -171,6 +171,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index cb442fab2f0..030202a06cd 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -176,26 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0488.json b/2004/0xxx/CVE-2004-0488.json
index d4f6925f78b..b9982f66629 100644
--- a/2004/0xxx/CVE-2004-0488.json
+++ b/2004/0xxx/CVE-2004-0488.json
@@ -186,6 +186,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0492.json b/2004/0xxx/CVE-2004-0492.json
index 2d3d7769f41..f0565130e97 100644
--- a/2004/0xxx/CVE-2004-0492.json
+++ b/2004/0xxx/CVE-2004-0492.json
@@ -161,11 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0493.json b/2004/0xxx/CVE-2004-0493.json
index a1cd21705fb..c727450735e 100644
--- a/2004/0xxx/CVE-2004-0493.json
+++ b/2004/0xxx/CVE-2004-0493.json
@@ -146,26 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0747.json b/2004/0xxx/CVE-2004-0747.json
index 3645de51eaa..40c170fe7d7 100644
--- a/2004/0xxx/CVE-2004-0747.json
+++ b/2004/0xxx/CVE-2004-0747.json
@@ -151,26 +151,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0748.json b/2004/0xxx/CVE-2004-0748.json
index fb06733159b..ddf1ec94c7c 100644
--- a/2004/0xxx/CVE-2004-0748.json
+++ b/2004/0xxx/CVE-2004-0748.json
@@ -126,11 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0751.json b/2004/0xxx/CVE-2004-0751.json
index f8a19fc812f..bd1f509978e 100644
--- a/2004/0xxx/CVE-2004-0751.json
+++ b/2004/0xxx/CVE-2004-0751.json
@@ -131,11 +131,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0786.json b/2004/0xxx/CVE-2004-0786.json
index 0edf706f3e1..8d0084ba455 100644
--- a/2004/0xxx/CVE-2004-0786.json
+++ b/2004/0xxx/CVE-2004-0786.json
@@ -141,11 +141,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0809.json b/2004/0xxx/CVE-2004-0809.json
index 2dd6935e76f..018e727a5b8 100644
--- a/2004/0xxx/CVE-2004-0809.json
+++ b/2004/0xxx/CVE-2004-0809.json
@@ -131,6 +131,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0811.json b/2004/0xxx/CVE-2004-0811.json
index c2ea1f48855..eec28e0e670 100644
--- a/2004/0xxx/CVE-2004-0811.json
+++ b/2004/0xxx/CVE-2004-0811.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0885.json b/2004/0xxx/CVE-2004-0885.json
index bb54e223e60..df992bf0b4f 100644
--- a/2004/0xxx/CVE-2004-0885.json
+++ b/2004/0xxx/CVE-2004-0885.json
@@ -181,6 +181,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0940.json b/2004/0xxx/CVE-2004-0940.json
index 8afb434c39d..67123e61d0a 100644
--- a/2004/0xxx/CVE-2004-0940.json
+++ b/2004/0xxx/CVE-2004-0940.json
@@ -126,6 +126,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0942.json b/2004/0xxx/CVE-2004-0942.json
index e57482172cd..8c51dd9a269 100644
--- a/2004/0xxx/CVE-2004-0942.json
+++ b/2004/0xxx/CVE-2004-0942.json
@@ -156,21 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/1xxx/CVE-2004-1834.json b/2004/1xxx/CVE-2004-1834.json
index 4fa898b1d6e..ff092666de2 100644
--- a/2004/1xxx/CVE-2004-1834.json
+++ b/2004/1xxx/CVE-2004-1834.json
@@ -146,11 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/1xxx/CVE-2005-1268.json b/2005/1xxx/CVE-2005-1268.json
index 63dd3123ceb..df7a6eec1f2 100644
--- a/2005/1xxx/CVE-2005-1268.json
+++ b/2005/1xxx/CVE-2005-1268.json
@@ -186,11 +186,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2088.json b/2005/2xxx/CVE-2005-2088.json
index f4431d59797..d31986c890d 100644
--- a/2005/2xxx/CVE-2005-2088.json
+++ b/2005/2xxx/CVE-2005-2088.json
@@ -331,11 +331,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index 05b66822408..fc379b48e04 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -366,6 +366,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 10bb0eeff71..0a3fb4761d1 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -436,21 +436,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index fd986cde4e9..4caf359228c 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -391,26 +391,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 3b84cf61279..916a619707c 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -336,31 +336,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/2xxx/CVE-2008-2364.json b/2008/2xxx/CVE-2008-2364.json
index 65c70f6eaa2..4dd8e5d4080 100644
--- a/2008/2xxx/CVE-2008-2364.json
+++ b/2008/2xxx/CVE-2008-2364.json
@@ -356,6 +356,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1195.json b/2009/1xxx/CVE-2009-1195.json
index 113ba1e5d88..80872cb4cf6 100644
--- a/2009/1xxx/CVE-2009-1195.json
+++ b/2009/1xxx/CVE-2009-1195.json
@@ -251,6 +251,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1890.json b/2009/1xxx/CVE-2009-1890.json
index 518d3fdbf54..78d4e0b64b8 100644
--- a/2009/1xxx/CVE-2009-1890.json
+++ b/2009/1xxx/CVE-2009-1890.json
@@ -266,6 +266,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1891.json b/2009/1xxx/CVE-2009-1891.json
index 37f1cd247cd..8a19fe6f84e 100644
--- a/2009/1xxx/CVE-2009-1891.json
+++ b/2009/1xxx/CVE-2009-1891.json
@@ -286,6 +286,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 9a1eea1565c..3e5d070f3c3 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -201,26 +201,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index c28be6088bf..4c7b41ecff7 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -306,6 +306,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0434.json b/2010/0xxx/CVE-2010-0434.json
index d22280f3969..9c6575bfb0d 100644
--- a/2010/0xxx/CVE-2010-0434.json
+++ b/2010/0xxx/CVE-2010-0434.json
@@ -301,6 +301,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index 08a0247181a..c42b2d36807 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -311,21 +311,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/0xxx/CVE-2012-0031.json b/2012/0xxx/CVE-2012-0031.json
index da021163141..88ee8d6ca81 100644
--- a/2012/0xxx/CVE-2012-0031.json
+++ b/2012/0xxx/CVE-2012-0031.json
@@ -236,6 +236,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/4xxx/CVE-2013-4352.json b/2013/4xxx/CVE-2013-4352.json
index 02067a8dd1b..64f214af238 100644
--- a/2013/4xxx/CVE-2013-4352.json
+++ b/2013/4xxx/CVE-2013-4352.json
@@ -96,26 +96,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0226.json b/2014/0xxx/CVE-2014-0226.json
index 8b8697c784f..2aa04bb9d08 100644
--- a/2014/0xxx/CVE-2014-0226.json
+++ b/2014/0xxx/CVE-2014-0226.json
@@ -291,6 +291,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/3xxx/CVE-2015-3183.json b/2015/3xxx/CVE-2015-3183.json
index b26ef6efcf2..5edd23877dc 100644
--- a/2015/3xxx/CVE-2015-3183.json
+++ b/2015/3xxx/CVE-2015-3183.json
@@ -286,26 +286,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/0xxx/CVE-2016-0736.json b/2016/0xxx/CVE-2016-0736.json
index fddaf553c41..c2614aa1a94 100644
--- a/2016/0xxx/CVE-2016-0736.json
+++ b/2016/0xxx/CVE-2016-0736.json
@@ -162,6 +162,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/2xxx/CVE-2016-2161.json b/2016/2xxx/CVE-2016-2161.json
index 57d937db7c5..6aa4a6e19fd 100644
--- a/2016/2xxx/CVE-2016-2161.json
+++ b/2016/2xxx/CVE-2016-2161.json
@@ -162,11 +162,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4975.json b/2016/4xxx/CVE-2016-4975.json
index 9d01e8dd0fe..dc67e30dcce 100644
--- a/2016/4xxx/CVE-2016-4975.json
+++ b/2016/4xxx/CVE-2016-4975.json
@@ -144,6 +144,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/4xxx/CVE-2016-4979.json b/2016/4xxx/CVE-2016-4979.json
index c0cbf4bdaaf..1844d6d81c5 100644
--- a/2016/4xxx/CVE-2016-4979.json
+++ b/2016/4xxx/CVE-2016-4979.json
@@ -141,6 +141,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json
index 4b1ce4ea4c4..f331bfb5528 100644
--- a/2016/5xxx/CVE-2016-5387.json
+++ b/2016/5xxx/CVE-2016-5387.json
@@ -266,6 +266,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index 263eca07a63..2a355442c1b 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -182,6 +182,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 4d98d6afd0a..0b3c58db3b1 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -173,6 +173,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17199.json b/2018/17xxx/CVE-2018-17199.json
index 67eae0d697d..28e36377c30 100644
--- a/2018/17xxx/CVE-2018-17199.json
+++ b/2018/17xxx/CVE-2018-17199.json
@@ -157,26 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 4cc10660edd..0e6fd0bdd21 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -157,6 +157,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index 6cf3d320c72..2646af159ee 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -136,26 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0190.json b/2019/0xxx/CVE-2019-0190.json
index 3695492cabc..d4116794d8e 100644
--- a/2019/0xxx/CVE-2019-0190.json
+++ b/2019/0xxx/CVE-2019-0190.json
@@ -107,26 +107,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/0xxx/CVE-2019-0196.json b/2019/0xxx/CVE-2019-0196.json
index fd564553197..fa0fec4106b 100644
--- a/2019/0xxx/CVE-2019-0196.json
+++ b/2019/0xxx/CVE-2019-0196.json
@@ -208,6 +208,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/0xxx/CVE-2019-0217.json b/2019/0xxx/CVE-2019-0217.json
index d20db6e688d..4e5b82f64a8 100644
--- a/2019/0xxx/CVE-2019-0217.json
+++ b/2019/0xxx/CVE-2019-0217.json
@@ -203,6 +203,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json
index 0c3d5b29fb2..8f936e0ccd1 100644
--- a/2019/10xxx/CVE-2019-10081.json
+++ b/2019/10xxx/CVE-2019-10081.json
@@ -113,31 +113,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json
index a04e3fbd586..da93a4752c6 100644
--- a/2019/10xxx/CVE-2019-10097.json
+++ b/2019/10xxx/CVE-2019-10097.json
@@ -88,6 +88,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json
index 82c0381db76..b84ee58c36e 100644
--- a/2019/9xxx/CVE-2019-9517.json
+++ b/2019/9xxx/CVE-2019-9517.json
@@ -278,6 +278,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 7f92162cf82..6c32a0defa2 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -153,31 +153,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml",
-                "url": "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11985.json b/2020/11xxx/CVE-2020-11985.json
index 4190153a6f2..a3afd2c8f30 100644
--- a/2020/11xxx/CVE-2020-11985.json
+++ b/2020/11xxx/CVE-2020-11985.json
@@ -78,26 +78,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index fa3f9613216..b2376274f31 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -128,6 +128,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index c1998391db5..9334a281a6a 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -118,6 +118,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index 6b6696d4869..c850ea9b5a1 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -103,6 +103,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index ca664f5f95b..73ac1bf050d 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -148,16 +148,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888203 - /httpd/site/trunk/content/security/json/CVE-2020-9490.json",
-                "url": "https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 35ba7916d638ef044e768dbd2578dcd12e152ce2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:04:00 +0000
Subject: [PATCH 750/845] "-Synchronized-Data."

---
 2000/1xxx/CVE-2000-1204.json   |  5 -----
 2001/0xxx/CVE-2001-0729.json   |  5 -----
 2001/0xxx/CVE-2001-0925.json   | 10 ++++++++++
 2001/1xxx/CVE-2001-1342.json   |  5 +++++
 2002/0xxx/CVE-2002-0061.json   | 10 ++++++++++
 2002/1xxx/CVE-2002-1592.json   |  5 -----
 2002/1xxx/CVE-2002-1593.json   |  5 -----
 2003/0xxx/CVE-2003-0016.json   |  5 -----
 2003/0xxx/CVE-2003-0020.json   | 20 -------------------
 2003/0xxx/CVE-2003-0132.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0134.json   | 15 ---------------
 2003/0xxx/CVE-2003-0189.json   | 15 ---------------
 2003/0xxx/CVE-2003-0192.json   | 15 ---------------
 2003/0xxx/CVE-2003-0245.json   | 15 ---------------
 2003/0xxx/CVE-2003-0253.json   | 15 ---------------
 2003/0xxx/CVE-2003-0254.json   | 15 ---------------
 2003/0xxx/CVE-2003-0460.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0542.json   | 15 ---------------
 2003/0xxx/CVE-2003-0789.json   | 20 -------------------
 2003/0xxx/CVE-2003-0987.json   | 15 +++++++++++++++
 2003/0xxx/CVE-2003-0993.json   |  5 +++++
 2004/0xxx/CVE-2004-0113.json   | 15 ---------------
 2004/0xxx/CVE-2004-0174.json   | 30 +++++++++++++++++++++++++++++
 2005/2xxx/CVE-2005-2491.json   | 15 +++++++++++++++
 2005/2xxx/CVE-2005-2700.json   | 25 ------------------------
 2005/2xxx/CVE-2005-2728.json   | 15 +++++++++++++++
 2005/2xxx/CVE-2005-2970.json   |  5 -----
 2005/3xxx/CVE-2005-3352.json   | 30 +++++++++++++++++++++++++++++
 2005/3xxx/CVE-2005-3357.json   | 15 +++++++++++++++
 2006/3xxx/CVE-2006-3747.json   |  5 -----
 2006/3xxx/CVE-2006-3918.json   | 15 +++++++++++++++
 2006/5xxx/CVE-2006-5752.json   | 35 ++++++++++++++++++++++++++++++++++
 2007/1xxx/CVE-2007-1862.json   | 10 ----------
 2007/1xxx/CVE-2007-1863.json   |  5 -----
 2007/3xxx/CVE-2007-3304.json   | 15 +++++++++++++++
 2007/3xxx/CVE-2007-3847.json   | 15 +++++++++++++++
 2007/5xxx/CVE-2007-5000.json   | 10 ++++++++++
 2007/6xxx/CVE-2007-6422.json   | 15 +++++++++++++++
 2008/0xxx/CVE-2008-0456.json   | 25 ++++++++++++++++++++++++
 2009/1xxx/CVE-2009-1191.json   |  5 -----
 2009/1xxx/CVE-2009-1956.json   | 15 ---------------
 2009/2xxx/CVE-2009-2412.json   | 15 ---------------
 2009/2xxx/CVE-2009-2699.json   |  5 +++++
 2009/3xxx/CVE-2009-3094.json   |  5 +++++
 2009/3xxx/CVE-2009-3095.json   |  5 +++++
 2009/3xxx/CVE-2009-3720.json   | 35 ----------------------------------
 2010/0xxx/CVE-2010-0010.json   | 20 -------------------
 2010/0xxx/CVE-2010-0408.json   |  5 -----
 2011/3xxx/CVE-2011-3348.json   |  5 -----
 2011/3xxx/CVE-2011-3368.json   | 25 ++++++++++++++++++++++++
 2014/0xxx/CVE-2014-0118.json   | 10 ++++++++++
 2015/0xxx/CVE-2015-0253.json   | 20 +++++++++++++++++++
 2016/1xxx/CVE-2016-1546.json   |  5 -----
 2016/8xxx/CVE-2016-8740.json   | 10 ----------
 2016/8xxx/CVE-2016-8743.json   |  5 +++++
 2017/15xxx/CVE-2017-15710.json |  5 +++++
 2017/15xxx/CVE-2017-15715.json |  5 +++++
 2017/3xxx/CVE-2017-3167.json   | 15 +++++++++++++++
 2017/3xxx/CVE-2017-3169.json   |  5 +++++
 2017/7xxx/CVE-2017-7659.json   | 15 ---------------
 2017/7xxx/CVE-2017-7668.json   |  5 +++++
 2017/7xxx/CVE-2017-7679.json   | 10 ++++++++++
 2017/9xxx/CVE-2017-9788.json   | 30 +++++++++++++++++++++++++++++
 2017/9xxx/CVE-2017-9789.json   |  5 +++++
 2017/9xxx/CVE-2017-9798.json   | 30 +++++++++++++++++++++++++++++
 2018/11xxx/CVE-2018-11763.json | 15 +++++++++++++++
 2018/17xxx/CVE-2018-17189.json | 10 ----------
 2018/1xxx/CVE-2018-1283.json   | 10 ----------
 2018/1xxx/CVE-2018-1301.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1302.json   | 10 ----------
 2018/1xxx/CVE-2018-1303.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1312.json   | 10 ----------
 2018/1xxx/CVE-2018-1333.json   | 15 +++++++++++++++
 2020/9xxx/CVE-2020-9490.json   | 15 +++++++++++++++
 2021/29xxx/CVE-2021-29097.json |  5 -----
 75 files changed, 565 insertions(+), 410 deletions(-)

diff --git a/2000/1xxx/CVE-2000-1204.json b/2000/1xxx/CVE-2000-1204.json
index 5a2580a44de..9951f290623 100644
--- a/2000/1xxx/CVE-2000-1204.json
+++ b/2000/1xxx/CVE-2000-1204.json
@@ -61,11 +61,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0729.json b/2001/0xxx/CVE-2001-0729.json
index 33ea27d56f0..c7d25d27db2 100644
--- a/2001/0xxx/CVE-2001-0729.json
+++ b/2001/0xxx/CVE-2001-0729.json
@@ -81,11 +81,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/0xxx/CVE-2001-0925.json b/2001/0xxx/CVE-2001-0925.json
index 9a97a91fc32..dd9107cca86 100644
--- a/2001/0xxx/CVE-2001-0925.json
+++ b/2001/0xxx/CVE-2001-0925.json
@@ -106,6 +106,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2001/1xxx/CVE-2001-1342.json b/2001/1xxx/CVE-2001-1342.json
index 7f7fa8dd05a..4cdc7724204 100644
--- a/2001/1xxx/CVE-2001-1342.json
+++ b/2001/1xxx/CVE-2001-1342.json
@@ -91,6 +91,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/0xxx/CVE-2002-0061.json b/2002/0xxx/CVE-2002-0061.json
index 216b81612b9..ff19915c208 100644
--- a/2002/0xxx/CVE-2002-0061.json
+++ b/2002/0xxx/CVE-2002-0061.json
@@ -81,6 +81,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1592.json b/2002/1xxx/CVE-2002-1592.json
index df6b8ca30fc..a27ed17115c 100644
--- a/2002/1xxx/CVE-2002-1592.json
+++ b/2002/1xxx/CVE-2002-1592.json
@@ -106,11 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2002/1xxx/CVE-2002-1593.json b/2002/1xxx/CVE-2002-1593.json
index a799abebfcb..a569e22d3ff 100644
--- a/2002/1xxx/CVE-2002-1593.json
+++ b/2002/1xxx/CVE-2002-1593.json
@@ -111,11 +111,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0016.json b/2003/0xxx/CVE-2003-0016.json
index a4579b6c73c..2257d777ada 100644
--- a/2003/0xxx/CVE-2003-0016.json
+++ b/2003/0xxx/CVE-2003-0016.json
@@ -121,11 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0020.json b/2003/0xxx/CVE-2003-0020.json
index c54d9e66baa..d60a3e8fff1 100644
--- a/2003/0xxx/CVE-2003-0020.json
+++ b/2003/0xxx/CVE-2003-0020.json
@@ -211,26 +211,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0132.json b/2003/0xxx/CVE-2003-0132.json
index e28711658f9..e1eddf688f2 100644
--- a/2003/0xxx/CVE-2003-0132.json
+++ b/2003/0xxx/CVE-2003-0132.json
@@ -151,6 +151,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0134.json b/2003/0xxx/CVE-2003-0134.json
index 94f676d7328..25d26121892 100644
--- a/2003/0xxx/CVE-2003-0134.json
+++ b/2003/0xxx/CVE-2003-0134.json
@@ -101,21 +101,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0189.json b/2003/0xxx/CVE-2003-0189.json
index c143dbc22a4..4b85231437d 100644
--- a/2003/0xxx/CVE-2003-0189.json
+++ b/2003/0xxx/CVE-2003-0189.json
@@ -126,21 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0192.json b/2003/0xxx/CVE-2003-0192.json
index 6eaffc55cc6..be8a509622c 100644
--- a/2003/0xxx/CVE-2003-0192.json
+++ b/2003/0xxx/CVE-2003-0192.json
@@ -121,21 +121,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0245.json b/2003/0xxx/CVE-2003-0245.json
index e71fad12eeb..050f6790cb8 100644
--- a/2003/0xxx/CVE-2003-0245.json
+++ b/2003/0xxx/CVE-2003-0245.json
@@ -136,21 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0253.json b/2003/0xxx/CVE-2003-0253.json
index 2e11408e670..115c263a790 100644
--- a/2003/0xxx/CVE-2003-0253.json
+++ b/2003/0xxx/CVE-2003-0253.json
@@ -106,21 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0254.json b/2003/0xxx/CVE-2003-0254.json
index d73ff69eef1..7a38e150994 100644
--- a/2003/0xxx/CVE-2003-0254.json
+++ b/2003/0xxx/CVE-2003-0254.json
@@ -106,21 +106,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0460.json b/2003/0xxx/CVE-2003-0460.json
index c286af2eb03..033c6dd549e 100644
--- a/2003/0xxx/CVE-2003-0460.json
+++ b/2003/0xxx/CVE-2003-0460.json
@@ -66,6 +66,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0542.json b/2003/0xxx/CVE-2003-0542.json
index 86d5e0c589f..d03ba6bf77e 100644
--- a/2003/0xxx/CVE-2003-0542.json
+++ b/2003/0xxx/CVE-2003-0542.json
@@ -291,21 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0789.json b/2003/0xxx/CVE-2003-0789.json
index 0479216e3bb..ad909d256d5 100644
--- a/2003/0xxx/CVE-2003-0789.json
+++ b/2003/0xxx/CVE-2003-0789.json
@@ -156,26 +156,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0987.json b/2003/0xxx/CVE-2003-0987.json
index 1a07dc1616a..ddd8dd14365 100644
--- a/2003/0xxx/CVE-2003-0987.json
+++ b/2003/0xxx/CVE-2003-0987.json
@@ -141,6 +141,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0993.json b/2003/0xxx/CVE-2003-0993.json
index 98056ecff7b..a0c50e77ee4 100644
--- a/2003/0xxx/CVE-2003-0993.json
+++ b/2003/0xxx/CVE-2003-0993.json
@@ -141,6 +141,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0113.json b/2004/0xxx/CVE-2004-0113.json
index e943bd2dd98..867ff378ef5 100644
--- a/2004/0xxx/CVE-2004-0113.json
+++ b/2004/0xxx/CVE-2004-0113.json
@@ -166,21 +166,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2004/0xxx/CVE-2004-0174.json b/2004/0xxx/CVE-2004-0174.json
index 030202a06cd..4ab3a3870e1 100644
--- a/2004/0xxx/CVE-2004-0174.json
+++ b/2004/0xxx/CVE-2004-0174.json
@@ -176,6 +176,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2491.json b/2005/2xxx/CVE-2005-2491.json
index fc379b48e04..effa603f778 100644
--- a/2005/2xxx/CVE-2005-2491.json
+++ b/2005/2xxx/CVE-2005-2491.json
@@ -376,6 +376,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index 244ffe4098b..2d5ff8982f5 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -346,31 +346,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2728.json b/2005/2xxx/CVE-2005-2728.json
index 5d0b4e06112..f062405d29f 100644
--- a/2005/2xxx/CVE-2005-2728.json
+++ b/2005/2xxx/CVE-2005-2728.json
@@ -291,6 +291,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 829e009d484..53340c808cb 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -181,11 +181,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index 0a3fb4761d1..f306faae835 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -436,6 +436,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3357.json b/2005/3xxx/CVE-2005-3357.json
index a6492574a4a..48c0c9a853f 100644
--- a/2005/3xxx/CVE-2005-3357.json
+++ b/2005/3xxx/CVE-2005-3357.json
@@ -356,6 +356,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3747.json b/2006/3xxx/CVE-2006-3747.json
index e8a7ff3b59e..ff53ab8d2e9 100644
--- a/2006/3xxx/CVE-2006-3747.json
+++ b/2006/3xxx/CVE-2006-3747.json
@@ -491,11 +491,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/3xxx/CVE-2006-3918.json b/2006/3xxx/CVE-2006-3918.json
index 8e35e8551b9..fcb6a5a1ea3 100644
--- a/2006/3xxx/CVE-2006-3918.json
+++ b/2006/3xxx/CVE-2006-3918.json
@@ -311,6 +311,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index 4caf359228c..fa460bd26a4 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -391,6 +391,41 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1862.json b/2007/1xxx/CVE-2007-1862.json
index d375b84d6d3..94f8116aee5 100644
--- a/2007/1xxx/CVE-2007-1862.json
+++ b/2007/1xxx/CVE-2007-1862.json
@@ -176,16 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/1xxx/CVE-2007-1863.json b/2007/1xxx/CVE-2007-1863.json
index 916a619707c..f91eb48088f 100644
--- a/2007/1xxx/CVE-2007-1863.json
+++ b/2007/1xxx/CVE-2007-1863.json
@@ -331,11 +331,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3304.json b/2007/3xxx/CVE-2007-3304.json
index 48a4772a580..e1a1435fedd 100644
--- a/2007/3xxx/CVE-2007-3304.json
+++ b/2007/3xxx/CVE-2007-3304.json
@@ -466,6 +466,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index c1281ec5f58..baf4e0639f1 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -416,6 +416,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/5xxx/CVE-2007-5000.json b/2007/5xxx/CVE-2007-5000.json
index 0b248521282..86e8679afc1 100644
--- a/2007/5xxx/CVE-2007-5000.json
+++ b/2007/5xxx/CVE-2007-5000.json
@@ -521,6 +521,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6422.json b/2007/6xxx/CVE-2007-6422.json
index 9adc7583f6b..68996687be4 100644
--- a/2007/6xxx/CVE-2007-6422.json
+++ b/2007/6xxx/CVE-2007-6422.json
@@ -191,6 +191,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2008/0xxx/CVE-2008-0456.json b/2008/0xxx/CVE-2008-0456.json
index 4b2f64f7d7c..a54f67efd00 100644
--- a/2008/0xxx/CVE-2008-0456.json
+++ b/2008/0xxx/CVE-2008-0456.json
@@ -146,6 +146,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1191.json b/2009/1xxx/CVE-2009-1191.json
index 97e37839ee2..5321b42a5dc 100644
--- a/2009/1xxx/CVE-2009-1191.json
+++ b/2009/1xxx/CVE-2009-1191.json
@@ -196,11 +196,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index b0cfd39b4d0..a3c09674434 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -276,21 +276,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2412.json b/2009/2xxx/CVE-2009-2412.json
index a01f4c56122..b9c59a24236 100644
--- a/2009/2xxx/CVE-2009-2412.json
+++ b/2009/2xxx/CVE-2009-2412.json
@@ -256,21 +256,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/2xxx/CVE-2009-2699.json b/2009/2xxx/CVE-2009-2699.json
index 1159e4565ef..634453cb691 100644
--- a/2009/2xxx/CVE-2009-2699.json
+++ b/2009/2xxx/CVE-2009-2699.json
@@ -121,6 +121,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3094.json b/2009/3xxx/CVE-2009-3094.json
index a0af195eebc..00de8e6ed01 100644
--- a/2009/3xxx/CVE-2009-3094.json
+++ b/2009/3xxx/CVE-2009-3094.json
@@ -206,6 +206,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3095.json b/2009/3xxx/CVE-2009-3095.json
index 3e5d070f3c3..72ee0adf35c 100644
--- a/2009/3xxx/CVE-2009-3095.json
+++ b/2009/3xxx/CVE-2009-3095.json
@@ -201,6 +201,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3720.json b/2009/3xxx/CVE-2009-3720.json
index 6fd593eef8f..0b8044cbfe4 100644
--- a/2009/3xxx/CVE-2009-3720.json
+++ b/2009/3xxx/CVE-2009-3720.json
@@ -456,41 +456,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0010.json b/2010/0xxx/CVE-2010-0010.json
index 9808af51652..8c77d630ed8 100644
--- a/2010/0xxx/CVE-2010-0010.json
+++ b/2010/0xxx/CVE-2010-0010.json
@@ -146,26 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0408.json b/2010/0xxx/CVE-2010-0408.json
index f4089f73d34..f7fc40069b9 100644
--- a/2010/0xxx/CVE-2010-0408.json
+++ b/2010/0xxx/CVE-2010-0408.json
@@ -246,11 +246,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3348.json b/2011/3xxx/CVE-2011-3348.json
index 17ef5db1419..eaf54387f43 100644
--- a/2011/3xxx/CVE-2011-3348.json
+++ b/2011/3xxx/CVE-2011-3348.json
@@ -176,11 +176,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 8bea3e1527e..6eb9a3135e7 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -291,6 +291,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2014/0xxx/CVE-2014-0118.json b/2014/0xxx/CVE-2014-0118.json
index ae11de6e6fa..eef0b6dbd56 100644
--- a/2014/0xxx/CVE-2014-0118.json
+++ b/2014/0xxx/CVE-2014-0118.json
@@ -246,6 +246,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2015/0xxx/CVE-2015-0253.json b/2015/0xxx/CVE-2015-0253.json
index de836ed7bc4..6a7324882fc 100644
--- a/2015/0xxx/CVE-2015-0253.json
+++ b/2015/0xxx/CVE-2015-0253.json
@@ -146,6 +146,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/1xxx/CVE-2016-1546.json b/2016/1xxx/CVE-2016-1546.json
index 5f97e4415a0..b409b1eb2af 100644
--- a/2016/1xxx/CVE-2016-1546.json
+++ b/2016/1xxx/CVE-2016-1546.json
@@ -136,11 +136,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json
index 8fd4103b053..f2cdf40e401 100644
--- a/2016/8xxx/CVE-2016-8740.json
+++ b/2016/8xxx/CVE-2016-8740.json
@@ -146,16 +146,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index 2a355442c1b..968d1402959 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -207,6 +207,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15710.json b/2017/15xxx/CVE-2017-15710.json
index 0b3c58db3b1..35313f16292 100644
--- a/2017/15xxx/CVE-2017-15710.json
+++ b/2017/15xxx/CVE-2017-15710.json
@@ -183,6 +183,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/15xxx/CVE-2017-15715.json b/2017/15xxx/CVE-2017-15715.json
index 87661b68e1c..dec5ee76f4e 100644
--- a/2017/15xxx/CVE-2017-15715.json
+++ b/2017/15xxx/CVE-2017-15715.json
@@ -172,6 +172,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index b158a38b1a6..0be78dfe52a 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -204,6 +204,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3169.json b/2017/3xxx/CVE-2017-3169.json
index f887ee4abc6..05536703614 100644
--- a/2017/3xxx/CVE-2017-3169.json
+++ b/2017/3xxx/CVE-2017-3169.json
@@ -234,6 +234,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index 01c77cda418..c0369f74bb3 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -126,21 +126,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7668.json b/2017/7xxx/CVE-2017-7668.json
index 040f5279b74..7ff1c1cb33f 100644
--- a/2017/7xxx/CVE-2017-7668.json
+++ b/2017/7xxx/CVE-2017-7668.json
@@ -204,6 +204,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 6f77512b29b..65ecccda8c6 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -214,6 +214,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json
index 481af969521..df102d5041f 100644
--- a/2017/9xxx/CVE-2017-9788.json
+++ b/2017/9xxx/CVE-2017-9788.json
@@ -230,6 +230,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json
index 60957814b8a..476b799f269 100644
--- a/2017/9xxx/CVE-2017-9789.json
+++ b/2017/9xxx/CVE-2017-9789.json
@@ -137,6 +137,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/9xxx/CVE-2017-9798.json b/2017/9xxx/CVE-2017-9798.json
index 9bcebf4a3e7..e068b6c75a1 100644
--- a/2017/9xxx/CVE-2017-9798.json
+++ b/2017/9xxx/CVE-2017-9798.json
@@ -286,6 +286,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index 645ab01fa55..bd36d1305b7 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -147,6 +147,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/17xxx/CVE-2018-17189.json b/2018/17xxx/CVE-2018-17189.json
index 10cafa19572..fea3d369755 100644
--- a/2018/17xxx/CVE-2018-17189.json
+++ b/2018/17xxx/CVE-2018-17189.json
@@ -182,16 +182,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 4189c426433..952a8ea74a3 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -157,16 +157,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index e00919c0231..842dfb217de 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -152,6 +152,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1302.json b/2018/1xxx/CVE-2018-1302.json
index 59156afd0be..8183a82e38b 100644
--- a/2018/1xxx/CVE-2018-1302.json
+++ b/2018/1xxx/CVE-2018-1302.json
@@ -142,16 +142,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1303.json b/2018/1xxx/CVE-2018-1303.json
index 63962cac63e..6732682e209 100644
--- a/2018/1xxx/CVE-2018-1303.json
+++ b/2018/1xxx/CVE-2018-1303.json
@@ -142,6 +142,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1312.json b/2018/1xxx/CVE-2018-1312.json
index 0e6fd0bdd21..c03e67bf6b0 100644
--- a/2018/1xxx/CVE-2018-1312.json
+++ b/2018/1xxx/CVE-2018-1312.json
@@ -172,16 +172,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
-                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1333.json b/2018/1xxx/CVE-2018-1333.json
index 2646af159ee..b8b77830916 100644
--- a/2018/1xxx/CVE-2018-1333.json
+++ b/2018/1xxx/CVE-2018-1333.json
@@ -136,6 +136,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json
index 73ac1bf050d..49231eea8ab 100644
--- a/2020/9xxx/CVE-2020-9490.json
+++ b/2020/9xxx/CVE-2020-9490.json
@@ -148,6 +148,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888203 - /httpd/site/trunk/content/security/json/CVE-2020-9490.json",
+                "url": "https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073148 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-9490.json",
+                "url": "https://lists.apache.org/thread.html/ra4da876037477c06f2677d7a1e10b5a8613000fca99c813958070fe9@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index 7094bac30eb..b038d8cf808 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -192,11 +192,6 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
-            },
-            {
-                "refsource": "MISC",
-                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/",
-                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-366/"
             }
         ]
     },

From 66039164e717c388da1b2793cae7843ec7d9b3a2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 13:04:16 +0000
Subject: [PATCH 751/845] "-Synchronized-Data."

---
 2003/0xxx/CVE-2003-0017.json   | 10 ++++++++++
 2003/0xxx/CVE-2003-0083.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2700.json   | 10 ++++++++++
 2005/2xxx/CVE-2005-2970.json   | 20 -------------------
 2005/3xxx/CVE-2005-3352.json   | 20 -------------------
 2006/5xxx/CVE-2006-5752.json   | 20 -------------------
 2007/3xxx/CVE-2007-3847.json   | 20 -------------------
 2007/6xxx/CVE-2007-6388.json   | 10 ++++++++++
 2009/1xxx/CVE-2009-1955.json   |  5 -----
 2009/1xxx/CVE-2009-1956.json   | 20 +++++++++++++++++++
 2009/3xxx/CVE-2009-3560.json   | 35 ----------------------------------
 2010/0xxx/CVE-2010-0425.json   | 15 ---------------
 2012/3xxx/CVE-2012-3499.json   | 20 +++++++++++++++++++
 2012/4xxx/CVE-2012-4557.json   | 20 +++++++++++++++++++
 2013/1xxx/CVE-2013-1896.json   | 25 ++++++++++++++++++++++++
 2017/3xxx/CVE-2017-3167.json   | 15 +++++++++++++++
 2017/7xxx/CVE-2017-7659.json   | 10 ++++++++++
 2017/7xxx/CVE-2017-7679.json   | 20 +++++++++++++++++++
 2018/11xxx/CVE-2018-11763.json | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1283.json   | 15 +++++++++++++++
 2018/1xxx/CVE-2018-1301.json   | 15 +++++++++++++++
 2019/10xxx/CVE-2019-10098.json |  5 +++++
 22 files changed, 220 insertions(+), 135 deletions(-)

diff --git a/2003/0xxx/CVE-2003-0017.json b/2003/0xxx/CVE-2003-0017.json
index 0e1e3c457d9..cd23d40ffa8 100644
--- a/2003/0xxx/CVE-2003-0017.json
+++ b/2003/0xxx/CVE-2003-0017.json
@@ -91,6 +91,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2003/0xxx/CVE-2003-0083.json b/2003/0xxx/CVE-2003-0083.json
index 1891eab849f..5dacade03ca 100644
--- a/2003/0xxx/CVE-2003-0083.json
+++ b/2003/0xxx/CVE-2003-0083.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2700.json b/2005/2xxx/CVE-2005-2700.json
index 2d5ff8982f5..47437094513 100644
--- a/2005/2xxx/CVE-2005-2700.json
+++ b/2005/2xxx/CVE-2005-2700.json
@@ -346,6 +346,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/2xxx/CVE-2005-2970.json b/2005/2xxx/CVE-2005-2970.json
index 53340c808cb..e2e433d6682 100644
--- a/2005/2xxx/CVE-2005-2970.json
+++ b/2005/2xxx/CVE-2005-2970.json
@@ -161,26 +161,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2005/3xxx/CVE-2005-3352.json b/2005/3xxx/CVE-2005-3352.json
index f306faae835..7ace5d1154e 100644
--- a/2005/3xxx/CVE-2005-3352.json
+++ b/2005/3xxx/CVE-2005-3352.json
@@ -446,26 +446,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2006/5xxx/CVE-2006-5752.json b/2006/5xxx/CVE-2006-5752.json
index fa460bd26a4..960da394151 100644
--- a/2006/5xxx/CVE-2006-5752.json
+++ b/2006/5xxx/CVE-2006-5752.json
@@ -406,26 +406,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/3xxx/CVE-2007-3847.json b/2007/3xxx/CVE-2007-3847.json
index baf4e0639f1..d4f2ea44eca 100644
--- a/2007/3xxx/CVE-2007-3847.json
+++ b/2007/3xxx/CVE-2007-3847.json
@@ -411,26 +411,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2007/6xxx/CVE-2007-6388.json b/2007/6xxx/CVE-2007-6388.json
index 74c0c467486..2928e333299 100644
--- a/2007/6xxx/CVE-2007-6388.json
+++ b/2007/6xxx/CVE-2007-6388.json
@@ -491,6 +491,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1955.json b/2009/1xxx/CVE-2009-1955.json
index 3f079b48a61..84a440e4ca1 100644
--- a/2009/1xxx/CVE-2009-1955.json
+++ b/2009/1xxx/CVE-2009-1955.json
@@ -316,11 +316,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/1xxx/CVE-2009-1956.json b/2009/1xxx/CVE-2009-1956.json
index a3c09674434..f3640690c8c 100644
--- a/2009/1xxx/CVE-2009-1956.json
+++ b/2009/1xxx/CVE-2009-1956.json
@@ -276,6 +276,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2009/3xxx/CVE-2009-3560.json b/2009/3xxx/CVE-2009-3560.json
index 4c7b41ecff7..a8fb059def6 100644
--- a/2009/3xxx/CVE-2009-3560.json
+++ b/2009/3xxx/CVE-2009-3560.json
@@ -291,41 +291,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
-                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
-                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/0xxx/CVE-2010-0425.json b/2010/0xxx/CVE-2010-0425.json
index 9a2fb9bdf5d..e140e209ed6 100644
--- a/2010/0xxx/CVE-2010-0425.json
+++ b/2010/0xxx/CVE-2010-0425.json
@@ -206,21 +206,6 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/",
                 "url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
-                "url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
-            },
-            {
-                "refsource": "MLIST",
-                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
-                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/3xxx/CVE-2012-3499.json b/2012/3xxx/CVE-2012-3499.json
index 47b6de1e0cf..25ccb88de35 100644
--- a/2012/3xxx/CVE-2012-3499.json
+++ b/2012/3xxx/CVE-2012-3499.json
@@ -216,6 +216,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2012/4xxx/CVE-2012-4557.json b/2012/4xxx/CVE-2012-4557.json
index d7ad02c142e..32a4c93ac76 100644
--- a/2012/4xxx/CVE-2012-4557.json
+++ b/2012/4xxx/CVE-2012-4557.json
@@ -131,6 +131,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2013/1xxx/CVE-2013-1896.json b/2013/1xxx/CVE-2013-1896.json
index 5d97402be1d..358e30a2b2e 100644
--- a/2013/1xxx/CVE-2013-1896.json
+++ b/2013/1xxx/CVE-2013-1896.json
@@ -201,6 +201,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/3xxx/CVE-2017-3167.json b/2017/3xxx/CVE-2017-3167.json
index 0be78dfe52a..e898e072b46 100644
--- a/2017/3xxx/CVE-2017-3167.json
+++ b/2017/3xxx/CVE-2017-3167.json
@@ -219,6 +219,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json
index c0369f74bb3..a7f0c711260 100644
--- a/2017/7xxx/CVE-2017-7659.json
+++ b/2017/7xxx/CVE-2017-7659.json
@@ -126,6 +126,16 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2017/7xxx/CVE-2017-7679.json b/2017/7xxx/CVE-2017-7679.json
index 65ecccda8c6..2b0ab82ab01 100644
--- a/2017/7xxx/CVE-2017-7679.json
+++ b/2017/7xxx/CVE-2017-7679.json
@@ -224,6 +224,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json
index bd36d1305b7..3cd4079f00e 100644
--- a/2018/11xxx/CVE-2018-11763.json
+++ b/2018/11xxx/CVE-2018-11763.json
@@ -162,6 +162,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1283.json b/2018/1xxx/CVE-2018-1283.json
index 952a8ea74a3..91ebee2c413 100644
--- a/2018/1xxx/CVE-2018-1283.json
+++ b/2018/1xxx/CVE-2018-1283.json
@@ -157,6 +157,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2018/1xxx/CVE-2018-1301.json b/2018/1xxx/CVE-2018-1301.json
index 842dfb217de..ec0f6578fe8 100644
--- a/2018/1xxx/CVE-2018-1301.json
+++ b/2018/1xxx/CVE-2018-1301.json
@@ -167,6 +167,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json
index 776e054e766..9dc0568b2e8 100644
--- a/2019/10xxx/CVE-2019-10098.json
+++ b/2019/10xxx/CVE-2019-10098.json
@@ -88,6 +88,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },

From 050835098862c539b29ea0a60b9887cc20bf17d2 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Tue, 30 Mar 2021 09:37:08 -0400
Subject: [PATCH 752/845] Update CVE-2021-29093.json

updated cvss version
---
 2021/29xxx/CVE-2021-29093.json | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29093.json b/2021/29xxx/CVE-2021-29093.json
index e6955a0e8fe..c3af0c47fbe 100644
--- a/2021/29xxx/CVE-2021-29093.json
+++ b/2021/29xxx/CVE-2021-29093.json
@@ -59,7 +59,7 @@
             "scope": "UNCHANGED",
             "userInteraction": "REQUIRED",
             "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
-            "version": "3.0"
+            "version": "3.1"
         }
     },
     "problemtype": {
@@ -86,4 +86,4 @@
     "source": {
         "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 7170f97190fc12ed3dd95b2d64dbd769630ac52b Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Tue, 30 Mar 2021 09:37:53 -0400
Subject: [PATCH 753/845] Update CVE-2021-29094.json

updated cvss version
---
 2021/29xxx/CVE-2021-29094.json | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29094.json b/2021/29xxx/CVE-2021-29094.json
index aa4a47a570a..1575d095be7 100644
--- a/2021/29xxx/CVE-2021-29094.json
+++ b/2021/29xxx/CVE-2021-29094.json
@@ -59,7 +59,7 @@
             "scope": "UNCHANGED",
             "userInteraction": "REQUIRED",
             "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
-            "version": "3.0"
+            "version": "3.1"
         }
     },
     "problemtype": {
@@ -86,4 +86,4 @@
     "source": {
         "discovery": "INTERNAL"
     }
-}
\ No newline at end of file
+}

From 9dff2e585f4926facde680de697bdee03466062f Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Tue, 30 Mar 2021 09:39:02 -0400
Subject: [PATCH 754/845] Update CVE-2021-29095.json

updated cvss version
---
 2021/29xxx/CVE-2021-29095.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/29xxx/CVE-2021-29095.json b/2021/29xxx/CVE-2021-29095.json
index 23ea7217681..482f08d6850 100644
--- a/2021/29xxx/CVE-2021-29095.json
+++ b/2021/29xxx/CVE-2021-29095.json
@@ -59,7 +59,7 @@
             "scope": "UNCHANGED",
             "userInteraction": "REQUIRED",
             "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
-            "version": "3.0"
+            "version": "3.1"
         }
     },
     "problemtype": {

From 3de65228868fe315ca3c272ae3d4c0bf695ae41b Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Tue, 30 Mar 2021 09:40:15 -0400
Subject: [PATCH 755/845] Update CVE-2021-29096.json

updated cvss version
---
 2021/29xxx/CVE-2021-29096.json | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29096.json b/2021/29xxx/CVE-2021-29096.json
index 129cb31c68c..fd4ef5344f0 100644
--- a/2021/29xxx/CVE-2021-29096.json
+++ b/2021/29xxx/CVE-2021-29096.json
@@ -135,7 +135,7 @@
             "scope": "UNCHANGED",
             "userInteraction": "REQUIRED",
             "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-            "version": "3.0"
+            "version": "3.1"
         }
     },
     "problemtype": {
@@ -167,4 +167,4 @@
     "source": {
         "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From 7e16e6624d153543fda3dc5d73b6615d774b82f3 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Tue, 30 Mar 2021 09:40:54 -0400
Subject: [PATCH 756/845] Update CVE-2021-29097.json

updated cvss version
---
 2021/29xxx/CVE-2021-29097.json | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29097.json b/2021/29xxx/CVE-2021-29097.json
index b038d8cf808..23d39a80458 100644
--- a/2021/29xxx/CVE-2021-29097.json
+++ b/2021/29xxx/CVE-2021-29097.json
@@ -123,7 +123,7 @@
             "scope": "UNCHANGED",
             "userInteraction": "REQUIRED",
             "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-            "version": "3.0"
+            "version": "3.1"
         }
     },
     "problemtype": {
@@ -198,4 +198,4 @@
     "source": {
         "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From fd816441e1eb084508943e29b85c813a1a628748 Mon Sep 17 00:00:00 2001
From: Randall Williams 
Date: Tue, 30 Mar 2021 09:42:17 -0400
Subject: [PATCH 757/845] Update CVE-2021-29098.json

updated cvss version
---
 2021/29xxx/CVE-2021-29098.json | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29098.json b/2021/29xxx/CVE-2021-29098.json
index 3c61d72b8d7..6425fce1780 100644
--- a/2021/29xxx/CVE-2021-29098.json
+++ b/2021/29xxx/CVE-2021-29098.json
@@ -135,7 +135,7 @@
             "scope": "UNCHANGED",
             "userInteraction": "REQUIRED",
             "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-            "version": "3.0"
+            "version": "3.1"
         }
     },
     "problemtype": {
@@ -177,4 +177,4 @@
     "source": {
         "discovery": "EXTERNAL"
     }
-}
\ No newline at end of file
+}

From da88353c62601464bc59f977f55267bdb503d778 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 14:00:39 +0000
Subject: [PATCH 758/845] "-Synchronized-Data."

---
 2020/15xxx/CVE-2020-15075.json | 50 ++++++++++++++++++++++++++--
 2021/26xxx/CVE-2021-26810.json | 61 ++++++++++++++++++++++++++++++----
 2021/3xxx/CVE-2021-3190.json   |  5 +++
 3 files changed, 107 insertions(+), 9 deletions(-)

diff --git a/2020/15xxx/CVE-2020-15075.json b/2020/15xxx/CVE-2020-15075.json
index eac049a1122..d94db47bacb 100644
--- a/2020/15xxx/CVE-2020-15075.json
+++ b/2020/15xxx/CVE-2020-15075.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-15075",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@openvpn.net",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenVPN Connect",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "3.2.6 and prior versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-61: UNIX Symbolic Link (Symlink) Following"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/",
+                "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26810.json b/2021/26xxx/CVE-2021-26810.json
index 27bad7f7f66..031db7ab45b 100644
--- a/2021/26xxx/CVE-2021-26810.json
+++ b/2021/26xxx/CVE-2021-26810.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26810",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26810",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.dlink.com/en/security-bulletin/",
+                "refsource": "MISC",
+                "name": "https://www.dlink.com/en/security-bulletin/"
+            },
+            {
+                "url": "https://github.com/GD008/vuln/blob/main/DIR-816.md",
+                "refsource": "MISC",
+                "name": "https://github.com/GD008/vuln/blob/main/DIR-816.md"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3190.json b/2021/3xxx/CVE-2021-3190.json
index 5ba5c97c2dc..97b3a788ba5 100644
--- a/2021/3xxx/CVE-2021-3190.json
+++ b/2021/3xxx/CVE-2021-3190.json
@@ -71,6 +71,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://github.com/omrilotan/async-git/pull/14",
                 "url": "https://github.com/omrilotan/async-git/pull/14"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4772",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4772"
             }
         ]
     }

From 405f899ed1947822cd4d1c27d9f310d2f1e86b9f Mon Sep 17 00:00:00 2001
From: zdi-team 
Date: Tue, 30 Mar 2021 09:34:29 -0500
Subject: [PATCH 759/845] ZDI assigns the following CVEs:

M  2021/27xxx/CVE-2021-27261.json
M  2021/27xxx/CVE-2021-27262.json
M  2021/27xxx/CVE-2021-27263.json
M  2021/27xxx/CVE-2021-27264.json
M  2021/27xxx/CVE-2021-27265.json
M  2021/27xxx/CVE-2021-27266.json
M  2021/27xxx/CVE-2021-27267.json
M  2021/27xxx/CVE-2021-27268.json
M  2021/27xxx/CVE-2021-27269.json
M  2021/27xxx/CVE-2021-27270.json
M  2021/27xxx/CVE-2021-27271.json
---
 2021/27xxx/CVE-2021-27261.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27262.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27263.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27264.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27265.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27266.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27267.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27268.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27269.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27270.json | 84 +++++++++++++++++++++++++++-------
 2021/27xxx/CVE-2021-27271.json | 84 +++++++++++++++++++++++++++-------
 11 files changed, 748 insertions(+), 176 deletions(-)

diff --git a/2021/27xxx/CVE-2021-27261.json b/2021/27xxx/CVE-2021-27261.json
index e469141651f..c36cb2d0ac3 100644
--- a/2021/27xxx/CVE-2021-27261.json
+++ b/2021/27xxx/CVE-2021-27261.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27261",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27261",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12269."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-343/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27262.json b/2021/27xxx/CVE-2021-27262.json
index ace70d425ca..a18a086fa4d 100644
--- a/2021/27xxx/CVE-2021-27262.json
+++ b/2021/27xxx/CVE-2021-27262.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27262",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27262",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12270."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-344/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27263.json b/2021/27xxx/CVE-2021-27263.json
index 0b78d81f9e7..3c7e50c011b 100644
--- a/2021/27xxx/CVE-2021-27263.json
+++ b/2021/27xxx/CVE-2021-27263.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27263",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27263",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12290."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-345/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27264.json b/2021/27xxx/CVE-2021-27264.json
index f28dcfc61eb..5987450f0f4 100644
--- a/2021/27xxx/CVE-2021-27264.json
+++ b/2021/27xxx/CVE-2021-27264.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27264",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27264",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12291."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-346/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27265.json b/2021/27xxx/CVE-2021-27265.json
index acda12e1294..7ba532d913a 100644
--- a/2021/27xxx/CVE-2021-27265.json
+++ b/2021/27xxx/CVE-2021-27265.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27265",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27265",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12292."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-347/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27266.json b/2021/27xxx/CVE-2021-27266.json
index 7a9330b6152..894d354f422 100644
--- a/2021/27xxx/CVE-2021-27266.json
+++ b/2021/27xxx/CVE-2021-27266.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27266",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27266",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12293."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-348/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27267.json b/2021/27xxx/CVE-2021-27267.json
index 38f574b3db2..b2c98dc071b 100644
--- a/2021/27xxx/CVE-2021-27267.json
+++ b/2021/27xxx/CVE-2021-27267.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27267",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27267",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12294."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-416: Use After Free"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-349/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27268.json b/2021/27xxx/CVE-2021-27268.json
index a8e56c1e042..674d440883e 100644
--- a/2021/27xxx/CVE-2021-27268.json
+++ b/2021/27xxx/CVE-2021-27268.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27268",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27268",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12295."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-416: Use After Free"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-350/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27269.json b/2021/27xxx/CVE-2021-27269.json
index 7260869a225..5801dc79b31 100644
--- a/2021/27xxx/CVE-2021-27269.json
+++ b/2021/27xxx/CVE-2021-27269.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27269",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27269",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-12390."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-787: Out-of-bounds Write"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-351/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27270.json b/2021/27xxx/CVE-2021-27270.json
index 6991f5bdccc..3fb3ebad2f4 100644
--- a/2021/27xxx/CVE-2021-27270.json
+++ b/2021/27xxx/CVE-2021-27270.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27270",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27270",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "cece",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12230."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-125: Out-of-bounds Read"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-352/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}
diff --git a/2021/27xxx/CVE-2021-27271.json b/2021/27xxx/CVE-2021-27271.json
index dc8834f33cc..ce645369266 100644
--- a/2021/27xxx/CVE-2021-27271.json
+++ b/2021/27xxx/CVE-2021-27271.json
@@ -1,18 +1,70 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-27271",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
-            {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
-            }
-        ]
+  "CVE_data_meta": {
+    "ASSIGNER": "zdi-disclosures@trendmicro.com",
+    "ID": "CVE-2021-27271",
+    "STATE": "PUBLIC"
+  },
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "product": {
+            "product_data": [
+              {
+                "product_name": "PhantomPDF",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_value": "10.1.0.37527"
+                    }
+                  ]
+                }
+              }
+            ]
+          },
+          "vendor_name": "Foxit"
+        }
+      ]
     }
-}
\ No newline at end of file
+  },
+  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+  "data_format": "MITRE",
+  "data_type": "CVE",
+  "data_version": "4.0",
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12438."
+      }
+    ]
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
+          }
+        ]
+      }
+    ]
+  },
+  "references": {
+    "reference_data": [
+      {
+        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-353/"
+      },
+      {
+        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
+      }
+    ]
+  },
+  "impact": {
+    "cvss": {
+      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+      "version": "3.0"
+    }
+  }
+}

From dcf974ec41e8a642d8a4772600967b2c3e5387f2 Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Tue, 30 Mar 2021 17:56:09 +0300
Subject: [PATCH 760/845] Adds CVE-2021-23363

---
 2021/23xxx/CVE-2021-23363.json | 84 ++++++++++++++++++++++++++++++++--
 1 file changed, 80 insertions(+), 4 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23363.json b/2021/23xxx/CVE-2021-23363.json
index 0f2ebc2f52e..b299a29d2a0 100644
--- a/2021/23xxx/CVE-2021-23363.json
+++ b/2021/23xxx/CVE-2021-23363.json
@@ -3,16 +3,92 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-30T14:56:07.068607Z",
         "ID": "CVE-2021-23363",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Arbitrary Command Injection"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "kill-by-port",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "0.0.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Arbitrary Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "This affects the package kill-by-port before 0.0.2.\n If (attacker-controlled) user input is given to the killByPort  function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P",
+            "baseScore": 6.3,
+            "baseSeverity": "MEDIUM",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "LOW",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "availabilityImpact": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "OmniTaint"
+        }
+    ]
 }
\ No newline at end of file

From e08ed84a59fd162ae601a3509b8e20868d6fc1c8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 15:00:43 +0000
Subject: [PATCH 761/845] "-Synchronized-Data."

---
 2020/1xxx/CVE-2020-1927.json   |  20 +++++
 2020/1xxx/CVE-2020-1934.json   |  20 +++++
 2021/21xxx/CVE-2021-21628.json |   5 ++
 2021/21xxx/CVE-2021-21629.json |   5 ++
 2021/21xxx/CVE-2021-21630.json |   5 ++
 2021/21xxx/CVE-2021-21631.json |   5 ++
 2021/21xxx/CVE-2021-21632.json |   5 ++
 2021/21xxx/CVE-2021-21633.json |   5 ++
 2021/21xxx/CVE-2021-21634.json |   5 ++
 2021/21xxx/CVE-2021-21635.json |   5 ++
 2021/21xxx/CVE-2021-21636.json |   5 ++
 2021/21xxx/CVE-2021-21637.json |   5 ++
 2021/21xxx/CVE-2021-21638.json |   5 ++
 2021/27xxx/CVE-2021-27261.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27262.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27263.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27264.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27265.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27266.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27267.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27268.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27269.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27270.json | 132 +++++++++++++++++----------------
 2021/27xxx/CVE-2021-27271.json | 132 +++++++++++++++++----------------
 24 files changed, 843 insertions(+), 704 deletions(-)

diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json
index 9334a281a6a..55edd53c110 100644
--- a/2020/1xxx/CVE-2020-1927.json
+++ b/2020/1xxx/CVE-2020-1927.json
@@ -138,6 +138,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073158 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-1927.json security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888215 - /httpd/site/trunk/content/security/json/CVE-2020-1927.json",
+                "url": "https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json
index c850ea9b5a1..7ec5d764292 100644
--- a/2020/1xxx/CVE-2020-1934.json
+++ b/2020/1xxx/CVE-2020-1934.json
@@ -123,6 +123,26 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073157 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-1934.json security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888213 - /httpd/site/trunk/content/security/json/CVE-2020-1934.json",
+                "url": "https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21628.json b/2021/21xxx/CVE-2021-21628.json
index 048f5a9abbe..bdda1fc2d65 100644
--- a/2021/21xxx/CVE-2021-21628.json
+++ b/2021/21xxx/CVE-2021-21628.json
@@ -57,6 +57,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21629.json b/2021/21xxx/CVE-2021-21629.json
index e516db96ff5..9b105ccfcc0 100644
--- a/2021/21xxx/CVE-2021-21629.json
+++ b/2021/21xxx/CVE-2021-21629.json
@@ -57,6 +57,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2257",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2257",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21630.json b/2021/21xxx/CVE-2021-21630.json
index 7377a4117cc..8ade5aaf0e3 100644
--- a/2021/21xxx/CVE-2021-21630.json
+++ b/2021/21xxx/CVE-2021-21630.json
@@ -57,6 +57,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21631.json b/2021/21xxx/CVE-2021-21631.json
index a41271faeec..b9890df31e2 100644
--- a/2021/21xxx/CVE-2021-21631.json
+++ b/2021/21xxx/CVE-2021-21631.json
@@ -57,6 +57,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2246",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2246",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21632.json b/2021/21xxx/CVE-2021-21632.json
index f21ef5ae06b..f64fa87f7fd 100644
--- a/2021/21xxx/CVE-2021-21632.json
+++ b/2021/21xxx/CVE-2021-21632.json
@@ -61,6 +61,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21633.json b/2021/21xxx/CVE-2021-21633.json
index b981d1cdb39..3d140bafe3d 100644
--- a/2021/21xxx/CVE-2021-21633.json
+++ b/2021/21xxx/CVE-2021-21633.json
@@ -61,6 +61,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21634.json b/2021/21xxx/CVE-2021-21634.json
index 04aff293357..a65a611163b 100644
--- a/2021/21xxx/CVE-2021-21634.json
+++ b/2021/21xxx/CVE-2021-21634.json
@@ -57,6 +57,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2162",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2162",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21635.json b/2021/21xxx/CVE-2021-21635.json
index 6e988228ea0..03f7c5a0b00 100644
--- a/2021/21xxx/CVE-2021-21635.json
+++ b/2021/21xxx/CVE-2021-21635.json
@@ -57,6 +57,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2261",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2261",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21636.json b/2021/21xxx/CVE-2021-21636.json
index 5b51bdde299..36d16f720ae 100644
--- a/2021/21xxx/CVE-2021-21636.json
+++ b/2021/21xxx/CVE-2021-21636.json
@@ -61,6 +61,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(1)",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(1)",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21637.json b/2021/21xxx/CVE-2021-21637.json
index b218da98727..451ff049bd1 100644
--- a/2021/21xxx/CVE-2021-21637.json
+++ b/2021/21xxx/CVE-2021-21637.json
@@ -61,6 +61,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21638.json b/2021/21xxx/CVE-2021-21638.json
index c122a9c289d..187df5eb2ab 100644
--- a/2021/21xxx/CVE-2021-21638.json
+++ b/2021/21xxx/CVE-2021-21638.json
@@ -61,6 +61,11 @@
                 "name": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
                 "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
                 "refsource": "CONFIRM"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Multiple vulnerabilities in Jenkins plugins",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/1"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27261.json b/2021/27xxx/CVE-2021-27261.json
index c36cb2d0ac3..b50ee2b0c31 100644
--- a/2021/27xxx/CVE-2021-27261.json
+++ b/2021/27xxx/CVE-2021-27261.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27261",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27261",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12269."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12269."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-343/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-343/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-343/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27262.json b/2021/27xxx/CVE-2021-27262.json
index a18a086fa4d..a0128b01081 100644
--- a/2021/27xxx/CVE-2021-27262.json
+++ b/2021/27xxx/CVE-2021-27262.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27262",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27262",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12270."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12270."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-344/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-344/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-344/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27263.json b/2021/27xxx/CVE-2021-27263.json
index 3c7e50c011b..f60a53dd694 100644
--- a/2021/27xxx/CVE-2021-27263.json
+++ b/2021/27xxx/CVE-2021-27263.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27263",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27263",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12290."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12290."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-345/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-345/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-345/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27264.json b/2021/27xxx/CVE-2021-27264.json
index 5987450f0f4..4a3a49a4400 100644
--- a/2021/27xxx/CVE-2021-27264.json
+++ b/2021/27xxx/CVE-2021-27264.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27264",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27264",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12291."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12291."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-346/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-346/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-346/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27265.json b/2021/27xxx/CVE-2021-27265.json
index 7ba532d913a..a3536c295e3 100644
--- a/2021/27xxx/CVE-2021-27265.json
+++ b/2021/27xxx/CVE-2021-27265.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27265",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27265",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12292."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12292."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-347/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-347/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-347/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27266.json b/2021/27xxx/CVE-2021-27266.json
index 894d354f422..2d462735b7f 100644
--- a/2021/27xxx/CVE-2021-27266.json
+++ b/2021/27xxx/CVE-2021-27266.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27266",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27266",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12293."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12293."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-348/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-348/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-348/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27267.json b/2021/27xxx/CVE-2021-27267.json
index b2c98dc071b..e0ee09e030d 100644
--- a/2021/27xxx/CVE-2021-27267.json
+++ b/2021/27xxx/CVE-2021-27267.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27267",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27267",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12294."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-416: Use After Free"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12294."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-349/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-416: Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-349/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-349/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27268.json b/2021/27xxx/CVE-2021-27268.json
index 674d440883e..a92d3064e0d 100644
--- a/2021/27xxx/CVE-2021-27268.json
+++ b/2021/27xxx/CVE-2021-27268.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27268",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27268",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12295."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-416: Use After Free"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12295."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-350/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-416: Use After Free"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-350/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-350/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27269.json b/2021/27xxx/CVE-2021-27269.json
index 5801dc79b31..03a659263be 100644
--- a/2021/27xxx/CVE-2021-27269.json
+++ b/2021/27xxx/CVE-2021-27269.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27269",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27269",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-12390."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-787: Out-of-bounds Write"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-12390."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-351/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-787: Out-of-bounds Write"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-351/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-351/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27270.json b/2021/27xxx/CVE-2021-27270.json
index 3fb3ebad2f4..d90bfb1d34b 100644
--- a/2021/27xxx/CVE-2021-27270.json
+++ b/2021/27xxx/CVE-2021-27270.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27270",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27270",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "cece",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12230."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-125: Out-of-bounds Read"
-          }
+    },
+    "credit": "cece",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12230."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-352/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-125: Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-352/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-352/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file
diff --git a/2021/27xxx/CVE-2021-27271.json b/2021/27xxx/CVE-2021-27271.json
index ce645369266..128f1b1d66f 100644
--- a/2021/27xxx/CVE-2021-27271.json
+++ b/2021/27xxx/CVE-2021-27271.json
@@ -1,70 +1,74 @@
 {
-  "CVE_data_meta": {
-    "ASSIGNER": "zdi-disclosures@trendmicro.com",
-    "ID": "CVE-2021-27271",
-    "STATE": "PUBLIC"
-  },
-  "affects": {
-    "vendor": {
-      "vendor_data": [
-        {
-          "product": {
-            "product_data": [
-              {
-                "product_name": "PhantomPDF",
-                "version": {
-                  "version_data": [
-                    {
-                      "version_value": "10.1.0.37527"
-                    }
-                  ]
+    "CVE_data_meta": {
+        "ASSIGNER": "zdi-disclosures@trendmicro.com",
+        "ID": "CVE-2021-27271",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PhantomPDF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "10.1.0.37527"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Foxit"
                 }
-              }
             ]
-          },
-          "vendor_name": "Foxit"
         }
-      ]
-    }
-  },
-  "credit": "Mat Powell of Trend Micro Zero Day Initiative",
-  "data_format": "MITRE",
-  "data_type": "CVE",
-  "data_version": "4.0",
-  "description": {
-    "description_data": [
-      {
-        "lang": "eng",
-        "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12438."
-      }
-    ]
-  },
-  "problemtype": {
-    "problemtype_data": [
-      {
-        "description": [
-          {
-            "lang": "eng",
-            "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
-          }
+    },
+    "credit": "Mat Powell of Trend Micro Zero Day Initiative",
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12438."
+            }
         ]
-      }
-    ]
-  },
-  "references": {
-    "reference_data": [
-      {
-        "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-353/"
-      },
-      {
-        "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
-      }
-    ]
-  },
-  "impact": {
-    "cvss": {
-      "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
-      "version": "3.0"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.foxitsoftware.com/support/security-bulletins.php",
+                "refsource": "MISC",
+                "name": "https://www.foxitsoftware.com/support/security-bulletins.php"
+            },
+            {
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-353/",
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-353/"
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.0"
+        }
     }
-  }
-}
+}
\ No newline at end of file

From dc6449c87c40e2ebd1d902869d5fed404d064045 Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 30 Mar 2021 09:04:27 -0600
Subject: [PATCH 762/845] Add CVE-2021-21409 for GHSA-f256-j965-7f32

---
 2021/21xxx/CVE-2021-21409.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21409.json b/2021/21xxx/CVE-2021-21409.json
index 12bf0f6faf6..8eef14ea3d0 100644
--- a/2021/21xxx/CVE-2021-21409.json
+++ b/2021/21xxx/CVE-2021-21409.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21409",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Possible request smuggling in HTTP/2 due missing validation of content-length"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "netty",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 4.1.61.Final"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "netty"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.9,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32"
+            },
+            {
+                "name": "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj",
+                "refsource": "MISC",
+                "url": "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj"
+            },
+            {
+                "name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295",
+                "refsource": "MISC",
+                "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295"
+            },
+            {
+                "name": "https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432",
+                "refsource": "MISC",
+                "url": "https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-f256-j965-7f32",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 1bf8a834a22e0dab38168b02ebe78fca2527355f Mon Sep 17 00:00:00 2001
From: Robert Schultheis 
Date: Tue, 30 Mar 2021 09:22:50 -0600
Subject: [PATCH 763/845] Add CVE-2021-21398 for GHSA-fhhq-4x46-qx77

---
 2021/21xxx/CVE-2021-21398.json | 87 +++++++++++++++++++++++++++++++---
 1 file changed, 81 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21398.json b/2021/21xxx/CVE-2021-21398.json
index 1f9da2fd1f6..029023488eb 100644
--- a/2021/21xxx/CVE-2021-21398.json
+++ b/2021/21xxx/CVE-2021-21398.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21398",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Possible XSS injection through DataColumn Grid class"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "PrestaShop",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">= 1.7.7.0, < 1.7.7.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "PrestaShop"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.7.3, an attacker can inject HTML when the Grid Column Type DataColumn is badly used. The problem is fixed in 1.7.7.3"
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 5.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fhhq-4x46-qx77",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fhhq-4x46-qx77"
+            },
+            {
+                "name": "https://github.com/PrestaShop/PrestaShop/commit/aaaba8177f3b3c510461b5e3249e30e60f900205",
+                "refsource": "MISC",
+                "url": "https://github.com/PrestaShop/PrestaShop/commit/aaaba8177f3b3c510461b5e3249e30e60f900205"
+            },
+            {
+                "name": "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.7.3",
+                "refsource": "MISC",
+                "url": "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.7.3"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-fhhq-4x46-qx77",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 2c454e39ba128b41f18e68a8ba3f3d7e3d6bc8f1 Mon Sep 17 00:00:00 2001
From: Scott Moore - IBM 
Date: Tue, 30 Mar 2021 11:55:52 -0400
Subject: [PATCH 764/845] IBM20210330-115552

Added CVE-2020-4848, CVE-2020-4884, CVE-2021-20482, CVE-2020-4944
---
 2020/4xxx/CVE-2020-4848.json   | 108 +++++++++++++++++++++++++----
 2020/4xxx/CVE-2020-4884.json   | 108 +++++++++++++++++++++++++----
 2020/4xxx/CVE-2020-4944.json   | 123 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20482.json | 105 ++++++++++++++++++++++++----
 4 files changed, 384 insertions(+), 60 deletions(-)

diff --git a/2020/4xxx/CVE-2020-4848.json b/2020/4xxx/CVE-2020-4848.json
index e258504213a..422fb162f73 100644
--- a/2020/4xxx/CVE-2020-4848.json
+++ b/2020/4xxx/CVE-2020-4848.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-4848",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "data_version" : "4.0",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM UrbanCode Deploy (UCD) 6.2.7.9, 7.0.5.4, and 7.1.1.1 could allow an authenticated user to initiate a plugin or compare process resources that they should not have access to.  IBM X-Force ID:  190293.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "title" : "IBM Security Bulletin 6437573 (UrbanCode Deploy)",
+            "refsource" : "CONFIRM",
+            "name" : "https://www.ibm.com/support/pages/node/6437573",
+            "url" : "https://www.ibm.com/support/pages/node/6437573"
+         },
+         {
+            "name" : "ibm-ucd-cve02204848-priv-escalation (190293)",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190293",
+            "title" : "X-Force Vulnerability Report",
+            "refsource" : "XF"
+         }
+      ]
+   },
+   "data_type" : "CVE",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.2.7.9"
+                              },
+                              {
+                                 "version_value" : "7.0.5.4"
+                              },
+                              {
+                                 "version_value" : "7.1.1.1"
+                              }
+                           ]
+                        },
+                        "product_name" : "UrbanCode Deploy"
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format" : "MITRE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Gain Privileges"
+               }
+            ]
+         }
+      ]
+   },
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ID" : "CVE-2020-4848"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "AV" : "N",
+            "A" : "N",
+            "C" : "L",
+            "AC" : "L",
+            "S" : "U",
+            "PR" : "L",
+            "I" : "L",
+            "SCORE" : "5.400",
+            "UI" : "N"
+         },
+         "TM" : {
+            "RL" : "O",
+            "E" : "U",
+            "RC" : "C"
+         }
+      }
+   }
+}
diff --git a/2020/4xxx/CVE-2020-4884.json b/2020/4xxx/CVE-2020-4884.json
index e9c75714889..448cd61f5bd 100644
--- a/2020/4xxx/CVE-2020-4884.json
+++ b/2020/4xxx/CVE-2020-4884.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-4884",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Obtain Information"
+               }
+            ]
+         }
+      ]
+   },
+   "CVE_data_meta" : {
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2020-4884"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "C" : "H",
+            "AV" : "L",
+            "A" : "N",
+            "UI" : "N",
+            "SCORE" : "6.200",
+            "AC" : "L",
+            "I" : "N",
+            "PR" : "N",
+            "S" : "U"
+         },
+         "TM" : {
+            "RL" : "O",
+            "E" : "U",
+            "RC" : "C"
+         }
+      }
+   },
+   "data_type" : "CVE",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "product_name" : "UrbanCode Deploy",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.2.7.9"
+                              },
+                              {
+                                 "version_value" : "7.0.5.4"
+                              },
+                              {
+                                 "version_value" : "7.1.1.1"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format" : "MITRE",
+   "data_version" : "4.0",
+   "references" : {
+      "reference_data" : [
+         {
+            "url" : "https://www.ibm.com/support/pages/node/6437565",
+            "name" : "https://www.ibm.com/support/pages/node/6437565",
+            "title" : "IBM Security Bulletin 6437565 (UrbanCode Deploy)",
+            "refsource" : "CONFIRM"
+         },
+         {
+            "title" : "X-Force Vulnerability Report",
+            "refsource" : "XF",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190908",
+            "name" : "ibm-ucd-cve20204884-info-disc (190908)"
+         }
+      ]
+   },
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM UrbanCode Deploy (UCD) 6.2.7.9, 7.0.5.4, and 7.1.1.1 stores user credentials in plain in clear text which can be read by a local user.  IBM X-Force ID:  190908.",
+            "lang" : "eng"
+         }
+      ]
+   }
+}
diff --git a/2020/4xxx/CVE-2020-4944.json b/2020/4xxx/CVE-2020-4944.json
index f9d1f283a40..825943a6114 100644
--- a/2020/4xxx/CVE-2020-4944.json
+++ b/2020/4xxx/CVE-2020-4944.json
@@ -1,18 +1,111 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-4944",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "UI" : "N",
+            "SCORE" : "5.100",
+            "AC" : "H",
+            "I" : "N",
+            "PR" : "N",
+            "S" : "U",
+            "C" : "H",
+            "AV" : "L",
+            "A" : "N"
+         },
+         "TM" : {
+            "RC" : "C",
+            "RL" : "O",
+            "E" : "U"
+         }
+      }
+   },
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ID" : "CVE-2020-4944"
+   },
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Obtain Information"
+               }
+            ]
+         }
+      ]
+   },
+   "description" : {
+      "description_data" : [
+         {
+            "lang" : "eng",
+            "value" : "IBM UrbanCode Deploy (UCD) 7.0.3.0, 7.0.4.0, 7.0.5.3, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2, stores keystore passwords in plain in plain text after a manuel edit, which can be read by a local user.  IBM X-Force ID:  191944."
+         }
+      ]
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "refsource" : "CONFIRM",
+            "title" : "IBM Security Bulletin 6437567 (UrbanCode Deploy)",
+            "url" : "https://www.ibm.com/support/pages/node/6437567",
+            "name" : "https://www.ibm.com/support/pages/node/6437567"
+         },
+         {
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/191944",
+            "name" : "ibm-ucd-cve20204944-info-disc (191944)",
+            "title" : "X-Force Vulnerability Report",
+            "refsource" : "XF"
+         }
+      ]
+   },
+   "data_version" : "4.0",
+   "data_format" : "MITRE",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0.3.0"
+                              },
+                              {
+                                 "version_value" : "7.0.4.0"
+                              },
+                              {
+                                 "version_value" : "7.1.0.0"
+                              },
+                              {
+                                 "version_value" : "7.0.5.3"
+                              },
+                              {
+                                 "version_value" : "7.1.1.0"
+                              },
+                              {
+                                 "version_value" : "7.0.5.4"
+                              },
+                              {
+                                 "version_value" : "7.1.1.1"
+                              },
+                              {
+                                 "version_value" : "7.1.1.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "UrbanCode Deploy"
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_type" : "CVE"
+}
diff --git a/2021/20xxx/CVE-2021-20482.json b/2021/20xxx/CVE-2021-20482.json
index 56d74b009ae..dc8fd084f31 100644
--- a/2021/20xxx/CVE-2021-20482.json
+++ b/2021/20xxx/CVE-2021-20482.json
@@ -1,18 +1,93 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20482",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "data_type" : "CVE",
+   "data_format" : "MITRE",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "product_name" : "Cloud Pak for Automation",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "20.0.2"
+                              },
+                              {
+                                 "version_value" : "20.0.3.IF002"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Cloud Pak for Automation 20.0.2 and 20.0.3 IF002 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.  IBM X-Force ID:  197504.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "name" : "https://www.ibm.com/support/pages/node/6437577",
+            "url" : "https://www.ibm.com/support/pages/node/6437577",
+            "title" : "IBM Security Bulletin 6437577 (Cloud Pak for Automation)",
+            "refsource" : "CONFIRM"
+         },
+         {
+            "name" : "ibm-baw-cve202120482-xxe (197504)",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/197504",
+            "title" : "X-Force Vulnerability Report",
+            "refsource" : "XF"
+         }
+      ]
+   },
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Obtain Information",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ID" : "CVE-2021-20482"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "S" : "U",
+            "PR" : "L",
+            "I" : "N",
+            "AC" : "L",
+            "SCORE" : "7.100",
+            "UI" : "N",
+            "A" : "L",
+            "AV" : "N",
+            "C" : "H"
+         },
+         "TM" : {
+            "E" : "U",
+            "RL" : "O",
+            "RC" : "C"
+         }
+      }
+   }
+}

From eca2eb7df7503056dd6c3afca210907ccb189acd Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 16:00:41 +0000
Subject: [PATCH 765/845] "-Synchronized-Data."

---
 2021/23xxx/CVE-2021-23363.json | 17 ++++++++++-------
 2021/27xxx/CVE-2021-27516.json |  5 +++++
 2 files changed, 15 insertions(+), 7 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23363.json b/2021/23xxx/CVE-2021-23363.json
index b299a29d2a0..6aeb35821f4 100644
--- a/2021/23xxx/CVE-2021-23363.json
+++ b/2021/23xxx/CVE-2021-23363.json
@@ -48,16 +48,19 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531",
+                "name": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8"
+                "refsource": "MISC",
+                "url": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8",
+                "name": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4"
+                "refsource": "MISC",
+                "url": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4",
+                "name": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4"
             }
         ]
     },
@@ -65,7 +68,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "This affects the package kill-by-port before 0.0.2.\n If (attacker-controlled) user input is given to the killByPort  function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\n"
+                "value": "This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization."
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27516.json b/2021/27xxx/CVE-2021-27516.json
index a5815779be3..54fa24b8830 100644
--- a/2021/27xxx/CVE-2021-27516.json
+++ b/2021/27xxx/CVE-2021-27516.json
@@ -61,6 +61,11 @@
                 "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.6",
                 "refsource": "MISC",
                 "name": "https://github.com/medialize/URI.js/releases/tag/v1.19.6"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4305",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4305"
             }
         ]
     }

From e16f4fd436458ea8f6ff6fb8f731759f03593311 Mon Sep 17 00:00:00 2001
From: Scott Moore - IBM 
Date: Tue, 30 Mar 2021 12:40:26 -0400
Subject: [PATCH 766/845] IBM20210330-124026

Added CVE-2021-20518, CVE-2021-20352, CVE-2021-20520, CVE-2021-20502, CVE-2021-20503, CVE-2021-20447, CVE-2021-20506, CVE-2021-20504
---
 2021/20xxx/CVE-2021-20352.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20447.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20502.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20503.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20504.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20506.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20518.json | 156 +++++++++++++++++++++++++++++----
 2021/20xxx/CVE-2021-20520.json | 156 +++++++++++++++++++++++++++++----
 8 files changed, 1128 insertions(+), 120 deletions(-)

diff --git a/2021/20xxx/CVE-2021-20352.json b/2021/20xxx/CVE-2021-20352.json
index e817c1fe699..48b1c0cc55c 100644
--- a/2021/20xxx/CVE-2021-20352.json
+++ b/2021/20xxx/CVE-2021-20352.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20352",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "references" : {
+      "reference_data" : [
+         {
+            "refsource" : "CONFIRM",
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
+            "name" : "https://www.ibm.com/support/pages/node/6437579"
+         },
+         {
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194710",
+            "refsource" : "XF",
+            "name" : "ibm-engineering-cve202120352-xss (194710)",
+            "title" : "X-Force Vulnerability Report"
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "CVE_data_meta" : {
+      "ID" : "CVE-2021-20352",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "STATE" : "PUBLIC"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "AC" : "L",
+            "A" : "N",
+            "PR" : "L",
+            "S" : "C",
+            "I" : "L",
+            "SCORE" : "5.400",
+            "AV" : "N",
+            "C" : "L",
+            "UI" : "R"
+         },
+         "TM" : {
+            "RL" : "O",
+            "E" : "H",
+            "RC" : "C"
+         }
+      }
+   },
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  194710.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Workflow Management"
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Lifecycle Optimization"
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        },
+                        "product_name" : "Rational Engineering Lifecycle Manager"
+                     },
+                     {
+                        "product_name" : "Rational Team Concert",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Cross-Site Scripting",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "data_type" : "CVE"
+}
diff --git a/2021/20xxx/CVE-2021-20447.json b/2021/20xxx/CVE-2021-20447.json
index e7301bd27d9..2b1d7f4b395 100644
--- a/2021/20xxx/CVE-2021-20447.json
+++ b/2021/20xxx/CVE-2021-20447.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20447",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "data_version" : "4.0",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "vendor_name" : "IBM",
+               "product" : {
+                  "product_data" : [
+                     {
+                        "product_name" : "Rational Engineering Lifecycle Manager",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Team Concert",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Engineering Workflow Management",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Engineering Lifecycle Optimization",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               }
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  196623.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "data_type" : "CVE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Cross-Site Scripting",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "refsource" : "CONFIRM",
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
+            "name" : "https://www.ibm.com/support/pages/node/6437579"
+         },
+         {
+            "refsource" : "XF",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196623",
+            "title" : "X-Force Vulnerability Report",
+            "name" : "ibm-engineering-cve202120447-xss (196623)"
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2021-20447",
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "TM" : {
+            "E" : "H",
+            "RL" : "O",
+            "RC" : "C"
+         },
+         "BM" : {
+            "C" : "L",
+            "UI" : "R",
+            "AV" : "N",
+            "SCORE" : "5.400",
+            "I" : "L",
+            "S" : "C",
+            "PR" : "L",
+            "A" : "N",
+            "AC" : "L"
+         }
+      }
+   }
+}
diff --git a/2021/20xxx/CVE-2021-20502.json b/2021/20xxx/CVE-2021-20502.json
index f3f85c2ba08..972ca13440e 100644
--- a/2021/20xxx/CVE-2021-20502.json
+++ b/2021/20xxx/CVE-2021-20502.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20502",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "data_type" : "CVE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Obtain Information"
+               }
+            ]
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "product_name" : "Engineering Lifecycle Optimization",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Workflow Management"
+                     },
+                     {
+                        "product_name" : "Rational Engineering Lifecycle Manager",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Team Concert",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Jazz Foundation Products are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.  IBM X-Force ID:  198059.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "SCORE" : "7.100",
+            "I" : "N",
+            "C" : "H",
+            "UI" : "N",
+            "AV" : "N",
+            "AC" : "L",
+            "A" : "L",
+            "S" : "U",
+            "PR" : "L"
+         },
+         "TM" : {
+            "RC" : "C",
+            "RL" : "O",
+            "E" : "U"
+         }
+      }
+   },
+   "CVE_data_meta" : {
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2021-20502"
+   },
+   "data_format" : "MITRE",
+   "references" : {
+      "reference_data" : [
+         {
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "refsource" : "CONFIRM",
+            "name" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)"
+         },
+         {
+            "name" : "ibm-engineering-cve202120502-xxe (198059)",
+            "title" : "X-Force Vulnerability Report",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198059",
+            "refsource" : "XF"
+         }
+      ]
+   }
+}
diff --git a/2021/20xxx/CVE-2021-20503.json b/2021/20xxx/CVE-2021-20503.json
index 88bd8091d7c..067bdeef616 100644
--- a/2021/20xxx/CVE-2021-20503.json
+++ b/2021/20xxx/CVE-2021-20503.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20503",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta" : {
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2021-20503"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "TM" : {
+            "RL" : "O",
+            "E" : "H",
+            "RC" : "C"
+         },
+         "BM" : {
+            "SCORE" : "5.400",
+            "I" : "L",
+            "C" : "L",
+            "UI" : "R",
+            "AV" : "N",
+            "AC" : "L",
+            "A" : "N",
+            "S" : "C",
+            "PR" : "L"
+         }
+      }
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "refsource" : "CONFIRM",
+            "name" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)"
+         },
+         {
+            "title" : "X-Force Vulnerability Report",
+            "name" : "ibm-engineering-cve202120503-xss (198182)",
+            "refsource" : "XF",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198182"
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Cross-Site Scripting",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "data_type" : "CVE",
+   "description" : {
+      "description_data" : [
+         {
+            "lang" : "eng",
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198182."
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "vendor_name" : "IBM",
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Workflow Management"
+                     },
+                     {
+                        "product_name" : "Engineering Lifecycle Optimization",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Team Concert",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Engineering Lifecycle Manager",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               }
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0"
+}
diff --git a/2021/20xxx/CVE-2021-20504.json b/2021/20xxx/CVE-2021-20504.json
index dcf5e23abfb..cf70c0dd1d5 100644
--- a/2021/20xxx/CVE-2021-20504.json
+++ b/2021/20xxx/CVE-2021-20504.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20504",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "impact" : {
+      "cvssv3" : {
+         "TM" : {
+            "RC" : "C",
+            "E" : "H",
+            "RL" : "O"
+         },
+         "BM" : {
+            "I" : "L",
+            "SCORE" : "5.400",
+            "AV" : "N",
+            "UI" : "R",
+            "C" : "L",
+            "PR" : "L",
+            "S" : "C",
+            "AC" : "L",
+            "A" : "N"
+         }
+      }
+   },
+   "CVE_data_meta" : {
+      "ID" : "CVE-2021-20504",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "STATE" : "PUBLIC"
+   },
+   "data_format" : "MITRE",
+   "references" : {
+      "reference_data" : [
+         {
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "refsource" : "CONFIRM",
+            "name" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)"
+         },
+         {
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198231",
+            "refsource" : "XF",
+            "name" : "ibm-engineering-cve202120504-xss (198231)",
+            "title" : "X-Force Vulnerability Report"
+         }
+      ]
+   },
+   "data_type" : "CVE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Cross-Site Scripting"
+               }
+            ]
+         }
+      ]
+   },
+   "data_version" : "4.0",
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "vendor_name" : "IBM",
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        },
+                        "product_name" : "Rational Team Concert"
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        },
+                        "product_name" : "Rational Engineering Lifecycle Manager"
+                     },
+                     {
+                        "product_name" : "Engineering Workflow Management",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Lifecycle Optimization"
+                     }
+                  ]
+               }
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "description" : {
+      "description_data" : [
+         {
+            "lang" : "eng",
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198231."
+         }
+      ]
+   }
+}
diff --git a/2021/20xxx/CVE-2021-20506.json b/2021/20xxx/CVE-2021-20506.json
index b7e2ba97626..97dc88eb977 100644
--- a/2021/20xxx/CVE-2021-20506.json
+++ b/2021/20xxx/CVE-2021-20506.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20506",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2021-20506",
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "UI" : "R",
+            "C" : "L",
+            "AV" : "N",
+            "SCORE" : "5.400",
+            "I" : "L",
+            "A" : "N",
+            "AC" : "L",
+            "S" : "C",
+            "PR" : "L"
+         },
+         "TM" : {
+            "RL" : "O",
+            "E" : "H",
+            "RC" : "C"
+         }
+      }
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "refsource" : "CONFIRM",
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
+            "name" : "https://www.ibm.com/support/pages/node/6437579"
+         },
+         {
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198233",
+            "refsource" : "XF",
+            "name" : "ibm-engineering-cve202120506-xss (198233)",
+            "title" : "X-Force Vulnerability Report"
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "data_type" : "CVE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "lang" : "eng",
+                  "value" : "Cross-Site Scripting"
+               }
+            ]
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "product_name" : "Engineering Lifecycle Optimization",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Engineering Workflow Management",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Engineering Lifecycle Manager",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        },
+                        "product_name" : "Rational Team Concert"
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198231.",
+            "lang" : "eng"
+         }
+      ]
+   }
+}
diff --git a/2021/20xxx/CVE-2021-20518.json b/2021/20xxx/CVE-2021-20518.json
index cc824cf4044..2915af1df75 100644
--- a/2021/20xxx/CVE-2021-20518.json
+++ b/2021/20xxx/CVE-2021-20518.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20518",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "data_format" : "MITRE",
+   "references" : {
+      "reference_data" : [
+         {
+            "name" : "https://www.ibm.com/support/pages/node/6437579",
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
+            "url" : "https://www.ibm.com/support/pages/node/6437579",
+            "refsource" : "CONFIRM"
+         },
+         {
+            "name" : "ibm-engineering-cve202120518-xss (198437)",
+            "title" : "X-Force Vulnerability Report",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198437",
+            "refsource" : "XF"
+         }
+      ]
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "AC" : "L",
+            "A" : "N",
+            "S" : "C",
+            "PR" : "L",
+            "SCORE" : "5.400",
+            "I" : "L",
+            "UI" : "R",
+            "C" : "L",
+            "AV" : "N"
+         },
+         "TM" : {
+            "E" : "U",
+            "RL" : "O",
+            "RC" : "C"
+         }
+      }
+   },
+   "CVE_data_meta" : {
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00",
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2021-20518"
+   },
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198437.",
+            "lang" : "eng"
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Lifecycle Optimization"
+                     },
+                     {
+                        "product_name" : "Engineering Workflow Management",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Team Concert",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Engineering Lifecycle Manager",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name" : "IBM"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Cross-Site Scripting",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "data_type" : "CVE"
+}
diff --git a/2021/20xxx/CVE-2021-20520.json b/2021/20xxx/CVE-2021-20520.json
index ee31a92594a..a6f08ff53ec 100644
--- a/2021/20xxx/CVE-2021-20520.json
+++ b/2021/20xxx/CVE-2021-20520.json
@@ -1,18 +1,144 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-20520",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta" : {
+      "ASSIGNER" : "psirt@us.ibm.com",
+      "ID" : "CVE-2021-20520",
+      "STATE" : "PUBLIC",
+      "DATE_PUBLIC" : "2021-03-29T00:00:00"
+   },
+   "impact" : {
+      "cvssv3" : {
+         "BM" : {
+            "AC" : "L",
+            "A" : "N",
+            "S" : "C",
+            "PR" : "L",
+            "SCORE" : "5.400",
+            "I" : "L",
+            "C" : "L",
+            "UI" : "R",
+            "AV" : "N"
+         },
+         "TM" : {
+            "E" : "H",
+            "RL" : "O",
+            "RC" : "C"
+         }
+      }
+   },
+   "references" : {
+      "reference_data" : [
+         {
+            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
+            "name" : "https://www.ibm.com/support/pages/node/6437579",
+            "refsource" : "CONFIRM",
+            "url" : "https://www.ibm.com/support/pages/node/6437579"
+         },
+         {
+            "title" : "X-Force Vulnerability Report",
+            "name" : "ibm-engineering-cve202120520-xss (198572)",
+            "refsource" : "XF",
+            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198572"
+         }
+      ]
+   },
+   "data_format" : "MITRE",
+   "data_type" : "CVE",
+   "problemtype" : {
+      "problemtype_data" : [
+         {
+            "description" : [
+               {
+                  "value" : "Cross-Site Scripting",
+                  "lang" : "eng"
+               }
+            ]
+         }
+      ]
+   },
+   "affects" : {
+      "vendor" : {
+         "vendor_data" : [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "vendor_name" : "IBM",
+               "product" : {
+                  "product_data" : [
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        },
+                        "product_name" : "Engineering Workflow Management"
+                     },
+                     {
+                        "product_name" : "Engineering Lifecycle Optimization",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "7.0"
+                              },
+                              {
+                                 "version_value" : "7.0.1"
+                              },
+                              {
+                                 "version_value" : "7.0.2"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name" : "Rational Team Concert",
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "version" : {
+                           "version_data" : [
+                              {
+                                 "version_value" : "6.0.2"
+                              },
+                              {
+                                 "version_value" : "6.0.6"
+                              },
+                              {
+                                 "version_value" : "6.0.6.1"
+                              }
+                           ]
+                        },
+                        "product_name" : "Rational Engineering Lifecycle Manager"
+                     }
+                  ]
+               }
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_version" : "4.0",
+   "description" : {
+      "description_data" : [
+         {
+            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198572.",
+            "lang" : "eng"
+         }
+      ]
+   }
+}

From 27effea05191f2dac9b731c22d2835b9a77dbb71 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 17:00:37 +0000
Subject: [PATCH 767/845] "-Synchronized-Data."

---
 2010/2xxx/CVE-2010-2068.json   |  30 ++++
 2010/2xxx/CVE-2010-2791.json   |  30 ++++
 2011/0xxx/CVE-2011-0419.json   |  45 ++++++
 2011/3xxx/CVE-2011-3368.json   |   5 +
 2016/8xxx/CVE-2016-8743.json   |  25 +++
 2020/23xxx/CVE-2020-23839.json |   5 +
 2020/27xxx/CVE-2020-27216.json |   5 +
 2020/27xxx/CVE-2020-27909.json |   5 +
 2020/4xxx/CVE-2020-4848.json   | 184 ++++++++++-----------
 2020/4xxx/CVE-2020-4884.json   | 186 ++++++++++-----------
 2020/4xxx/CVE-2020-4944.json   | 218 ++++++++++++-------------
 2021/20xxx/CVE-2021-20271.json |   5 +
 2021/20xxx/CVE-2021-20352.json | 280 ++++++++++++++++----------------
 2021/20xxx/CVE-2021-20447.json | 284 ++++++++++++++++-----------------
 2021/20xxx/CVE-2021-20482.json | 182 ++++++++++-----------
 2021/20xxx/CVE-2021-20502.json | 282 ++++++++++++++++----------------
 2021/20xxx/CVE-2021-20503.json | 284 ++++++++++++++++-----------------
 2021/20xxx/CVE-2021-20504.json | 284 ++++++++++++++++-----------------
 2021/20xxx/CVE-2021-20506.json | 284 ++++++++++++++++-----------------
 2021/20xxx/CVE-2021-20518.json | 280 ++++++++++++++++----------------
 2021/20xxx/CVE-2021-20520.json | 284 ++++++++++++++++-----------------
 2021/21xxx/CVE-2021-21290.json |  30 ++++
 2021/21xxx/CVE-2021-21295.json |  30 ++++
 2021/27xxx/CVE-2021-27185.json |   5 +
 2021/27xxx/CVE-2021-27191.json |   5 +
 2021/27xxx/CVE-2021-27515.json |   5 +
 2021/27xxx/CVE-2021-27807.json |  10 ++
 2021/27xxx/CVE-2021-27906.json |  10 ++
 2021/28xxx/CVE-2021-28834.json |  10 ++
 29 files changed, 1776 insertions(+), 1516 deletions(-)

diff --git a/2010/2xxx/CVE-2010-2068.json b/2010/2xxx/CVE-2010-2068.json
index 83c6b5848e4..808a64485c4 100644
--- a/2010/2xxx/CVE-2010-2068.json
+++ b/2010/2xxx/CVE-2010-2068.json
@@ -216,6 +216,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json",
+                "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2010/2xxx/CVE-2010-2791.json b/2010/2xxx/CVE-2010-2791.json
index 4a7060f1ef3..51a7877aeb2 100644
--- a/2010/2xxx/CVE-2010-2791.json
+++ b/2010/2xxx/CVE-2010-2791.json
@@ -111,6 +111,36 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
                 "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json",
+                "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/0xxx/CVE-2011-0419.json b/2011/0xxx/CVE-2011-0419.json
index c42b2d36807..9a62bfcfc1b 100644
--- a/2011/0xxx/CVE-2011-0419.json
+++ b/2011/0xxx/CVE-2011-0419.json
@@ -311,6 +311,51 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json",
+                "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2011/3xxx/CVE-2011-3368.json b/2011/3xxx/CVE-2011-3368.json
index 6eb9a3135e7..8fec4a18497 100644
--- a/2011/3xxx/CVE-2011-3368.json
+++ b/2011/3xxx/CVE-2011-3368.json
@@ -316,6 +316,11 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json",
+                "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2016/8xxx/CVE-2016-8743.json b/2016/8xxx/CVE-2016-8743.json
index 968d1402959..46836866888 100644
--- a/2016/8xxx/CVE-2016-8743.json
+++ b/2016/8xxx/CVE-2016-8743.json
@@ -212,6 +212,31 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888217 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
+                "url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073163 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888221 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
+                "url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073161 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     }
diff --git a/2020/23xxx/CVE-2020-23839.json b/2020/23xxx/CVE-2020-23839.json
index b342d03dac6..15c0b2142c9 100644
--- a/2020/23xxx/CVE-2020-23839.json
+++ b/2020/23xxx/CVE-2020-23839.json
@@ -56,6 +56,11 @@
                 "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330",
                 "refsource": "MISC",
                 "name": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html",
+                "url": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index f2a25afba16..7ea543aa7b0 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -560,6 +560,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210329 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210330 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27909.json b/2020/27xxx/CVE-2020-27909.json
index a7176a6649a..9f768caf46d 100644
--- a/2020/27xxx/CVE-2020-27909.json
+++ b/2020/27xxx/CVE-2020-27909.json
@@ -91,6 +91,11 @@
                 "refsource": "FULLDISC",
                 "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
                 "url": "http://seclists.org/fulldisclosure/2020/Dec/32"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-374/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-374/"
             }
         ]
     },
diff --git a/2020/4xxx/CVE-2020-4848.json b/2020/4xxx/CVE-2020-4848.json
index 422fb162f73..51941064864 100644
--- a/2020/4xxx/CVE-2020-4848.json
+++ b/2020/4xxx/CVE-2020-4848.json
@@ -1,96 +1,96 @@
 {
-   "data_version" : "4.0",
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM UrbanCode Deploy (UCD) 6.2.7.9, 7.0.5.4, and 7.1.1.1 could allow an authenticated user to initiate a plugin or compare process resources that they should not have access to.  IBM X-Force ID:  190293.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "title" : "IBM Security Bulletin 6437573 (UrbanCode Deploy)",
-            "refsource" : "CONFIRM",
-            "name" : "https://www.ibm.com/support/pages/node/6437573",
-            "url" : "https://www.ibm.com/support/pages/node/6437573"
-         },
-         {
-            "name" : "ibm-ucd-cve02204848-priv-escalation (190293)",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190293",
-            "title" : "X-Force Vulnerability Report",
-            "refsource" : "XF"
-         }
-      ]
-   },
-   "data_type" : "CVE",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
             {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.2.7.9"
-                              },
-                              {
-                                 "version_value" : "7.0.5.4"
-                              },
-                              {
-                                 "version_value" : "7.1.1.1"
-                              }
-                           ]
-                        },
-                        "product_name" : "UrbanCode Deploy"
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+                "value": "IBM UrbanCode Deploy (UCD) 6.2.7.9, 7.0.5.4, and 7.1.1.1 could allow an authenticated user to initiate a plugin or compare process resources that they should not have access to. IBM X-Force ID: 190293.",
+                "lang": "eng"
             }
-         ]
-      }
-   },
-   "data_format" : "MITRE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Gain Privileges"
-               }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "title": "IBM Security Bulletin 6437573 (UrbanCode Deploy)",
+                "refsource": "CONFIRM",
+                "name": "https://www.ibm.com/support/pages/node/6437573",
+                "url": "https://www.ibm.com/support/pages/node/6437573"
+            },
+            {
+                "name": "ibm-ucd-cve02204848-priv-escalation (190293)",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190293",
+                "title": "X-Force Vulnerability Report",
+                "refsource": "XF"
+            }
+        ]
+    },
+    "data_type": "CVE",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.2.7.9"
+                                        },
+                                        {
+                                            "version_value": "7.0.5.4"
+                                        },
+                                        {
+                                            "version_value": "7.1.1.1"
+                                        }
+                                    ]
+                                },
+                                "product_name": "UrbanCode Deploy"
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
             ]
-         }
-      ]
-   },
-   "CVE_data_meta" : {
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ID" : "CVE-2020-4848"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "AV" : "N",
-            "A" : "N",
-            "C" : "L",
-            "AC" : "L",
-            "S" : "U",
-            "PR" : "L",
-            "I" : "L",
-            "SCORE" : "5.400",
-            "UI" : "N"
-         },
-         "TM" : {
-            "RL" : "O",
-            "E" : "U",
-            "RC" : "C"
-         }
-      }
-   }
-}
+        }
+    },
+    "data_format": "MITRE",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Gain Privileges"
+                    }
+                ]
+            }
+        ]
+    },
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@us.ibm.com",
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ID": "CVE-2020-4848"
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "AV": "N",
+                "A": "N",
+                "C": "L",
+                "AC": "L",
+                "S": "U",
+                "PR": "L",
+                "I": "L",
+                "SCORE": "5.400",
+                "UI": "N"
+            },
+            "TM": {
+                "RL": "O",
+                "E": "U",
+                "RC": "C"
+            }
+        }
+    }
+}
\ No newline at end of file
diff --git a/2020/4xxx/CVE-2020-4884.json b/2020/4xxx/CVE-2020-4884.json
index 448cd61f5bd..40cbfb51773 100644
--- a/2020/4xxx/CVE-2020-4884.json
+++ b/2020/4xxx/CVE-2020-4884.json
@@ -1,96 +1,96 @@
 {
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Obtain Information"
-               }
-            ]
-         }
-      ]
-   },
-   "CVE_data_meta" : {
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2020-4884"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "C" : "H",
-            "AV" : "L",
-            "A" : "N",
-            "UI" : "N",
-            "SCORE" : "6.200",
-            "AC" : "L",
-            "I" : "N",
-            "PR" : "N",
-            "S" : "U"
-         },
-         "TM" : {
-            "RL" : "O",
-            "E" : "U",
-            "RC" : "C"
-         }
-      }
-   },
-   "data_type" : "CVE",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
+    "problemtype": {
+        "problemtype_data": [
             {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "product_name" : "UrbanCode Deploy",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.2.7.9"
-                              },
-                              {
-                                 "version_value" : "7.0.5.4"
-                              },
-                              {
-                                 "version_value" : "7.1.1.1"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Obtain Information"
+                    }
+                ]
             }
-         ]
-      }
-   },
-   "data_format" : "MITRE",
-   "data_version" : "4.0",
-   "references" : {
-      "reference_data" : [
-         {
-            "url" : "https://www.ibm.com/support/pages/node/6437565",
-            "name" : "https://www.ibm.com/support/pages/node/6437565",
-            "title" : "IBM Security Bulletin 6437565 (UrbanCode Deploy)",
-            "refsource" : "CONFIRM"
-         },
-         {
-            "title" : "X-Force Vulnerability Report",
-            "refsource" : "XF",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190908",
-            "name" : "ibm-ucd-cve20204884-info-disc (190908)"
-         }
-      ]
-   },
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM UrbanCode Deploy (UCD) 6.2.7.9, 7.0.5.4, and 7.1.1.1 stores user credentials in plain in clear text which can be read by a local user.  IBM X-Force ID:  190908.",
-            "lang" : "eng"
-         }
-      ]
-   }
-}
+        ]
+    },
+    "CVE_data_meta": {
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2020-4884"
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "C": "H",
+                "AV": "L",
+                "A": "N",
+                "UI": "N",
+                "SCORE": "6.200",
+                "AC": "L",
+                "I": "N",
+                "PR": "N",
+                "S": "U"
+            },
+            "TM": {
+                "RL": "O",
+                "E": "U",
+                "RC": "C"
+            }
+        }
+    },
+    "data_type": "CVE",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "UrbanCode Deploy",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.2.7.9"
+                                        },
+                                        {
+                                            "version_value": "7.0.5.4"
+                                        },
+                                        {
+                                            "version_value": "7.1.1.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.ibm.com/support/pages/node/6437565",
+                "name": "https://www.ibm.com/support/pages/node/6437565",
+                "title": "IBM Security Bulletin 6437565 (UrbanCode Deploy)",
+                "refsource": "CONFIRM"
+            },
+            {
+                "title": "X-Force Vulnerability Report",
+                "refsource": "XF",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190908",
+                "name": "ibm-ucd-cve20204884-info-disc (190908)"
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM UrbanCode Deploy (UCD) 6.2.7.9, 7.0.5.4, and 7.1.1.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 190908.",
+                "lang": "eng"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/4xxx/CVE-2020-4944.json b/2020/4xxx/CVE-2020-4944.json
index 825943a6114..c4cab734e60 100644
--- a/2020/4xxx/CVE-2020-4944.json
+++ b/2020/4xxx/CVE-2020-4944.json
@@ -1,111 +1,111 @@
 {
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "UI" : "N",
-            "SCORE" : "5.100",
-            "AC" : "H",
-            "I" : "N",
-            "PR" : "N",
-            "S" : "U",
-            "C" : "H",
-            "AV" : "L",
-            "A" : "N"
-         },
-         "TM" : {
-            "RC" : "C",
-            "RL" : "O",
-            "E" : "U"
-         }
-      }
-   },
-   "CVE_data_meta" : {
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ID" : "CVE-2020-4944"
-   },
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Obtain Information"
-               }
-            ]
-         }
-      ]
-   },
-   "description" : {
-      "description_data" : [
-         {
-            "lang" : "eng",
-            "value" : "IBM UrbanCode Deploy (UCD) 7.0.3.0, 7.0.4.0, 7.0.5.3, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2, stores keystore passwords in plain in plain text after a manuel edit, which can be read by a local user.  IBM X-Force ID:  191944."
-         }
-      ]
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "refsource" : "CONFIRM",
-            "title" : "IBM Security Bulletin 6437567 (UrbanCode Deploy)",
-            "url" : "https://www.ibm.com/support/pages/node/6437567",
-            "name" : "https://www.ibm.com/support/pages/node/6437567"
-         },
-         {
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/191944",
-            "name" : "ibm-ucd-cve20204944-info-disc (191944)",
-            "title" : "X-Force Vulnerability Report",
-            "refsource" : "XF"
-         }
-      ]
-   },
-   "data_version" : "4.0",
-   "data_format" : "MITRE",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0.3.0"
-                              },
-                              {
-                                 "version_value" : "7.0.4.0"
-                              },
-                              {
-                                 "version_value" : "7.1.0.0"
-                              },
-                              {
-                                 "version_value" : "7.0.5.3"
-                              },
-                              {
-                                 "version_value" : "7.1.1.0"
-                              },
-                              {
-                                 "version_value" : "7.0.5.4"
-                              },
-                              {
-                                 "version_value" : "7.1.1.1"
-                              },
-                              {
-                                 "version_value" : "7.1.1.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "UrbanCode Deploy"
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "UI": "N",
+                "SCORE": "5.100",
+                "AC": "H",
+                "I": "N",
+                "PR": "N",
+                "S": "U",
+                "C": "H",
+                "AV": "L",
+                "A": "N"
+            },
+            "TM": {
+                "RC": "C",
+                "RL": "O",
+                "E": "U"
             }
-         ]
-      }
-   },
-   "data_type" : "CVE"
-}
+        }
+    },
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@us.ibm.com",
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ID": "CVE-2020-4944"
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Obtain Information"
+                    }
+                ]
+            }
+        ]
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "IBM UrbanCode Deploy (UCD) 7.0.3.0, 7.0.4.0, 7.0.5.3, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2, stores keystore passwords in plain in plain text after a manuel edit, which can be read by a local user. IBM X-Force ID: 191944."
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "title": "IBM Security Bulletin 6437567 (UrbanCode Deploy)",
+                "url": "https://www.ibm.com/support/pages/node/6437567",
+                "name": "https://www.ibm.com/support/pages/node/6437567"
+            },
+            {
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191944",
+                "name": "ibm-ucd-cve20204944-info-disc (191944)",
+                "title": "X-Force Vulnerability Report",
+                "refsource": "XF"
+            }
+        ]
+    },
+    "data_version": "4.0",
+    "data_format": "MITRE",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0.3.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.4.0"
+                                        },
+                                        {
+                                            "version_value": "7.1.0.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.5.3"
+                                        },
+                                        {
+                                            "version_value": "7.1.1.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.5.4"
+                                        },
+                                        {
+                                            "version_value": "7.1.1.1"
+                                        },
+                                        {
+                                            "version_value": "7.1.1.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "UrbanCode Deploy"
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
+            ]
+        }
+    },
+    "data_type": "CVE"
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20271.json b/2021/20xxx/CVE-2021-20271.json
index 6d7d9df2572..a51ea42d9a2 100644
--- a/2021/20xxx/CVE-2021-20271.json
+++ b/2021/20xxx/CVE-2021-20271.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2383d950fd",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-8d52a8a999",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20352.json b/2021/20xxx/CVE-2021-20352.json
index 48b1c0cc55c..3b4b69ac9f7 100644
--- a/2021/20xxx/CVE-2021-20352.json
+++ b/2021/20xxx/CVE-2021-20352.json
@@ -1,144 +1,144 @@
 {
-   "references" : {
-      "reference_data" : [
-         {
-            "refsource" : "CONFIRM",
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
-            "name" : "https://www.ibm.com/support/pages/node/6437579"
-         },
-         {
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/194710",
-            "refsource" : "XF",
-            "name" : "ibm-engineering-cve202120352-xss (194710)",
-            "title" : "X-Force Vulnerability Report"
-         }
-      ]
-   },
-   "data_format" : "MITRE",
-   "CVE_data_meta" : {
-      "ID" : "CVE-2021-20352",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "STATE" : "PUBLIC"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "AC" : "L",
-            "A" : "N",
-            "PR" : "L",
-            "S" : "C",
-            "I" : "L",
-            "SCORE" : "5.400",
-            "AV" : "N",
-            "C" : "L",
-            "UI" : "R"
-         },
-         "TM" : {
-            "RL" : "O",
-            "E" : "H",
-            "RC" : "C"
-         }
-      }
-   },
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  194710.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
+    "references": {
+        "reference_data": [
             {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Workflow Management"
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Lifecycle Optimization"
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        },
-                        "product_name" : "Rational Engineering Lifecycle Manager"
-                     },
-                     {
-                        "product_name" : "Rational Team Concert",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+                "refsource": "CONFIRM",
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)",
+                "name": "https://www.ibm.com/support/pages/node/6437579"
+            },
+            {
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/194710",
+                "refsource": "XF",
+                "name": "ibm-engineering-cve202120352-xss (194710)",
+                "title": "X-Force Vulnerability Report"
             }
-         ]
-      }
-   },
-   "data_version" : "4.0",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "value" : "Cross-Site Scripting",
-                  "lang" : "eng"
-               }
+        ]
+    },
+    "data_format": "MITRE",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-20352",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "STATE": "PUBLIC"
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "AC": "L",
+                "A": "N",
+                "PR": "L",
+                "S": "C",
+                "I": "L",
+                "SCORE": "5.400",
+                "AV": "N",
+                "C": "L",
+                "UI": "R"
+            },
+            "TM": {
+                "RL": "O",
+                "E": "H",
+                "RC": "C"
+            }
+        }
+    },
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194710.",
+                "lang": "eng"
+            }
+        ]
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Workflow Management"
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Lifecycle Optimization"
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Rational Engineering Lifecycle Manager"
+                            },
+                            {
+                                "product_name": "Rational Team Concert",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
             ]
-         }
-      ]
-   },
-   "data_type" : "CVE"
-}
+        }
+    },
+    "data_version": "4.0",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "value": "Cross-Site Scripting",
+                        "lang": "eng"
+                    }
+                ]
+            }
+        ]
+    },
+    "data_type": "CVE"
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20447.json b/2021/20xxx/CVE-2021-20447.json
index 2b1d7f4b395..f4a643a13eb 100644
--- a/2021/20xxx/CVE-2021-20447.json
+++ b/2021/20xxx/CVE-2021-20447.json
@@ -1,144 +1,144 @@
 {
-   "data_version" : "4.0",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "vendor_name" : "IBM",
-               "product" : {
-                  "product_data" : [
-                     {
-                        "product_name" : "Rational Engineering Lifecycle Manager",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Team Concert",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Engineering Workflow Management",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Engineering Lifecycle Optimization",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               }
-            }
-         ]
-      }
-   },
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  196623.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "data_type" : "CVE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "value" : "Cross-Site Scripting",
-                  "lang" : "eng"
-               }
+    "data_version": "4.0",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "IBM",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Rational Engineering Lifecycle Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Team Concert",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Engineering Workflow Management",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Engineering Lifecycle Optimization",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
             ]
-         }
-      ]
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "refsource" : "CONFIRM",
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
-            "name" : "https://www.ibm.com/support/pages/node/6437579"
-         },
-         {
-            "refsource" : "XF",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196623",
-            "title" : "X-Force Vulnerability Report",
-            "name" : "ibm-engineering-cve202120447-xss (196623)"
-         }
-      ]
-   },
-   "data_format" : "MITRE",
-   "CVE_data_meta" : {
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2021-20447",
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "TM" : {
-            "E" : "H",
-            "RL" : "O",
-            "RC" : "C"
-         },
-         "BM" : {
-            "C" : "L",
-            "UI" : "R",
-            "AV" : "N",
-            "SCORE" : "5.400",
-            "I" : "L",
-            "S" : "C",
-            "PR" : "L",
-            "A" : "N",
-            "AC" : "L"
-         }
-      }
-   }
-}
+        }
+    },
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196623.",
+                "lang": "eng"
+            }
+        ]
+    },
+    "data_type": "CVE",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "value": "Cross-Site Scripting",
+                        "lang": "eng"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)",
+                "name": "https://www.ibm.com/support/pages/node/6437579"
+            },
+            {
+                "refsource": "XF",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196623",
+                "title": "X-Force Vulnerability Report",
+                "name": "ibm-engineering-cve202120447-xss (196623)"
+            }
+        ]
+    },
+    "data_format": "MITRE",
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2021-20447",
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00"
+    },
+    "impact": {
+        "cvssv3": {
+            "TM": {
+                "E": "H",
+                "RL": "O",
+                "RC": "C"
+            },
+            "BM": {
+                "C": "L",
+                "UI": "R",
+                "AV": "N",
+                "SCORE": "5.400",
+                "I": "L",
+                "S": "C",
+                "PR": "L",
+                "A": "N",
+                "AC": "L"
+            }
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20482.json b/2021/20xxx/CVE-2021-20482.json
index dc8fd084f31..c0c0b601a97 100644
--- a/2021/20xxx/CVE-2021-20482.json
+++ b/2021/20xxx/CVE-2021-20482.json
@@ -1,93 +1,93 @@
 {
-   "data_type" : "CVE",
-   "data_format" : "MITRE",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "product_name" : "Cloud Pak for Automation",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "20.0.2"
-                              },
-                              {
-                                 "version_value" : "20.0.3.IF002"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
-            }
-         ]
-      }
-   },
-   "data_version" : "4.0",
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Cloud Pak for Automation 20.0.2 and 20.0.3 IF002 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.  IBM X-Force ID:  197504.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "name" : "https://www.ibm.com/support/pages/node/6437577",
-            "url" : "https://www.ibm.com/support/pages/node/6437577",
-            "title" : "IBM Security Bulletin 6437577 (Cloud Pak for Automation)",
-            "refsource" : "CONFIRM"
-         },
-         {
-            "name" : "ibm-baw-cve202120482-xxe (197504)",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/197504",
-            "title" : "X-Force Vulnerability Report",
-            "refsource" : "XF"
-         }
-      ]
-   },
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "value" : "Obtain Information",
-                  "lang" : "eng"
-               }
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Cloud Pak for Automation",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "20.0.2"
+                                        },
+                                        {
+                                            "version_value": "20.0.3.IF002"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
             ]
-         }
-      ]
-   },
-   "CVE_data_meta" : {
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ID" : "CVE-2021-20482"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "S" : "U",
-            "PR" : "L",
-            "I" : "N",
-            "AC" : "L",
-            "SCORE" : "7.100",
-            "UI" : "N",
-            "A" : "L",
-            "AV" : "N",
-            "C" : "H"
-         },
-         "TM" : {
-            "E" : "U",
-            "RL" : "O",
-            "RC" : "C"
-         }
-      }
-   }
-}
+        }
+    },
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Cloud Pak for Automation 20.0.2 and 20.0.3 IF002 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 197504.",
+                "lang": "eng"
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://www.ibm.com/support/pages/node/6437577",
+                "url": "https://www.ibm.com/support/pages/node/6437577",
+                "title": "IBM Security Bulletin 6437577 (Cloud Pak for Automation)",
+                "refsource": "CONFIRM"
+            },
+            {
+                "name": "ibm-baw-cve202120482-xxe (197504)",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/197504",
+                "title": "X-Force Vulnerability Report",
+                "refsource": "XF"
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "value": "Obtain Information",
+                        "lang": "eng"
+                    }
+                ]
+            }
+        ]
+    },
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@us.ibm.com",
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ID": "CVE-2021-20482"
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "S": "U",
+                "PR": "L",
+                "I": "N",
+                "AC": "L",
+                "SCORE": "7.100",
+                "UI": "N",
+                "A": "L",
+                "AV": "N",
+                "C": "H"
+            },
+            "TM": {
+                "E": "U",
+                "RL": "O",
+                "RC": "C"
+            }
+        }
+    }
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20502.json b/2021/20xxx/CVE-2021-20502.json
index 972ca13440e..dd9e208cf71 100644
--- a/2021/20xxx/CVE-2021-20502.json
+++ b/2021/20xxx/CVE-2021-20502.json
@@ -1,144 +1,144 @@
 {
-   "data_type" : "CVE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Obtain Information"
-               }
-            ]
-         }
-      ]
-   },
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
+    "data_type": "CVE",
+    "problemtype": {
+        "problemtype_data": [
             {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "product_name" : "Engineering Lifecycle Optimization",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Workflow Management"
-                     },
-                     {
-                        "product_name" : "Rational Engineering Lifecycle Manager",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Team Concert",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Obtain Information"
+                    }
+                ]
             }
-         ]
-      }
-   },
-   "data_version" : "4.0",
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Jazz Foundation Products are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.  IBM X-Force ID:  198059.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "SCORE" : "7.100",
-            "I" : "N",
-            "C" : "H",
-            "UI" : "N",
-            "AV" : "N",
-            "AC" : "L",
-            "A" : "L",
-            "S" : "U",
-            "PR" : "L"
-         },
-         "TM" : {
-            "RC" : "C",
-            "RL" : "O",
-            "E" : "U"
-         }
-      }
-   },
-   "CVE_data_meta" : {
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2021-20502"
-   },
-   "data_format" : "MITRE",
-   "references" : {
-      "reference_data" : [
-         {
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "refsource" : "CONFIRM",
-            "name" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)"
-         },
-         {
-            "name" : "ibm-engineering-cve202120502-xxe (198059)",
-            "title" : "X-Force Vulnerability Report",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198059",
-            "refsource" : "XF"
-         }
-      ]
-   }
-}
+        ]
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Engineering Lifecycle Optimization",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Workflow Management"
+                            },
+                            {
+                                "product_name": "Rational Engineering Lifecycle Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Team Concert",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
+            ]
+        }
+    },
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Jazz Foundation Products are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 198059.",
+                "lang": "eng"
+            }
+        ]
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "SCORE": "7.100",
+                "I": "N",
+                "C": "H",
+                "UI": "N",
+                "AV": "N",
+                "AC": "L",
+                "A": "L",
+                "S": "U",
+                "PR": "L"
+            },
+            "TM": {
+                "RC": "C",
+                "RL": "O",
+                "E": "U"
+            }
+        }
+    },
+    "CVE_data_meta": {
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2021-20502"
+    },
+    "data_format": "MITRE",
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "refsource": "CONFIRM",
+                "name": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)"
+            },
+            {
+                "name": "ibm-engineering-cve202120502-xxe (198059)",
+                "title": "X-Force Vulnerability Report",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198059",
+                "refsource": "XF"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20503.json b/2021/20xxx/CVE-2021-20503.json
index 067bdeef616..d8c4a978852 100644
--- a/2021/20xxx/CVE-2021-20503.json
+++ b/2021/20xxx/CVE-2021-20503.json
@@ -1,144 +1,144 @@
 {
-   "CVE_data_meta" : {
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2021-20503"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "TM" : {
-            "RL" : "O",
-            "E" : "H",
-            "RC" : "C"
-         },
-         "BM" : {
-            "SCORE" : "5.400",
-            "I" : "L",
-            "C" : "L",
-            "UI" : "R",
-            "AV" : "N",
-            "AC" : "L",
-            "A" : "N",
-            "S" : "C",
-            "PR" : "L"
-         }
-      }
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "refsource" : "CONFIRM",
-            "name" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)"
-         },
-         {
-            "title" : "X-Force Vulnerability Report",
-            "name" : "ibm-engineering-cve202120503-xss (198182)",
-            "refsource" : "XF",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198182"
-         }
-      ]
-   },
-   "data_format" : "MITRE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "value" : "Cross-Site Scripting",
-                  "lang" : "eng"
-               }
-            ]
-         }
-      ]
-   },
-   "data_type" : "CVE",
-   "description" : {
-      "description_data" : [
-         {
-            "lang" : "eng",
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198182."
-         }
-      ]
-   },
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "vendor_name" : "IBM",
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Workflow Management"
-                     },
-                     {
-                        "product_name" : "Engineering Lifecycle Optimization",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Team Concert",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Engineering Lifecycle Manager",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               }
+    "CVE_data_meta": {
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2021-20503"
+    },
+    "impact": {
+        "cvssv3": {
+            "TM": {
+                "RL": "O",
+                "E": "H",
+                "RC": "C"
+            },
+            "BM": {
+                "SCORE": "5.400",
+                "I": "L",
+                "C": "L",
+                "UI": "R",
+                "AV": "N",
+                "AC": "L",
+                "A": "N",
+                "S": "C",
+                "PR": "L"
             }
-         ]
-      }
-   },
-   "data_version" : "4.0"
-}
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "refsource": "CONFIRM",
+                "name": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)"
+            },
+            {
+                "title": "X-Force Vulnerability Report",
+                "name": "ibm-engineering-cve202120503-xss (198182)",
+                "refsource": "XF",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198182"
+            }
+        ]
+    },
+    "data_format": "MITRE",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "value": "Cross-Site Scripting",
+                        "lang": "eng"
+                    }
+                ]
+            }
+        ]
+    },
+    "data_type": "CVE",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198182."
+            }
+        ]
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "IBM",
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Workflow Management"
+                            },
+                            {
+                                "product_name": "Engineering Lifecycle Optimization",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Team Concert",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Engineering Lifecycle Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_version": "4.0"
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20504.json b/2021/20xxx/CVE-2021-20504.json
index cf70c0dd1d5..e670778916a 100644
--- a/2021/20xxx/CVE-2021-20504.json
+++ b/2021/20xxx/CVE-2021-20504.json
@@ -1,144 +1,144 @@
 {
-   "impact" : {
-      "cvssv3" : {
-         "TM" : {
-            "RC" : "C",
-            "E" : "H",
-            "RL" : "O"
-         },
-         "BM" : {
-            "I" : "L",
-            "SCORE" : "5.400",
-            "AV" : "N",
-            "UI" : "R",
-            "C" : "L",
-            "PR" : "L",
-            "S" : "C",
-            "AC" : "L",
-            "A" : "N"
-         }
-      }
-   },
-   "CVE_data_meta" : {
-      "ID" : "CVE-2021-20504",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "STATE" : "PUBLIC"
-   },
-   "data_format" : "MITRE",
-   "references" : {
-      "reference_data" : [
-         {
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "refsource" : "CONFIRM",
-            "name" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)"
-         },
-         {
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198231",
-            "refsource" : "XF",
-            "name" : "ibm-engineering-cve202120504-xss (198231)",
-            "title" : "X-Force Vulnerability Report"
-         }
-      ]
-   },
-   "data_type" : "CVE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Cross-Site Scripting"
-               }
-            ]
-         }
-      ]
-   },
-   "data_version" : "4.0",
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "vendor_name" : "IBM",
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        },
-                        "product_name" : "Rational Team Concert"
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        },
-                        "product_name" : "Rational Engineering Lifecycle Manager"
-                     },
-                     {
-                        "product_name" : "Engineering Workflow Management",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Lifecycle Optimization"
-                     }
-                  ]
-               }
+    "impact": {
+        "cvssv3": {
+            "TM": {
+                "RC": "C",
+                "E": "H",
+                "RL": "O"
+            },
+            "BM": {
+                "I": "L",
+                "SCORE": "5.400",
+                "AV": "N",
+                "UI": "R",
+                "C": "L",
+                "PR": "L",
+                "S": "C",
+                "AC": "L",
+                "A": "N"
             }
-         ]
-      }
-   },
-   "description" : {
-      "description_data" : [
-         {
-            "lang" : "eng",
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198231."
-         }
-      ]
-   }
-}
+        }
+    },
+    "CVE_data_meta": {
+        "ID": "CVE-2021-20504",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "STATE": "PUBLIC"
+    },
+    "data_format": "MITRE",
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "refsource": "CONFIRM",
+                "name": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)"
+            },
+            {
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198231",
+                "refsource": "XF",
+                "name": "ibm-engineering-cve202120504-xss (198231)",
+                "title": "X-Force Vulnerability Report"
+            }
+        ]
+    },
+    "data_type": "CVE",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "data_version": "4.0",
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "IBM",
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Rational Team Concert"
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Rational Engineering Lifecycle Manager"
+                            },
+                            {
+                                "product_name": "Engineering Workflow Management",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Lifecycle Optimization"
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198231."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20506.json b/2021/20xxx/CVE-2021-20506.json
index 97dc88eb977..2970df37261 100644
--- a/2021/20xxx/CVE-2021-20506.json
+++ b/2021/20xxx/CVE-2021-20506.json
@@ -1,144 +1,144 @@
 {
-   "CVE_data_meta" : {
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2021-20506",
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "UI" : "R",
-            "C" : "L",
-            "AV" : "N",
-            "SCORE" : "5.400",
-            "I" : "L",
-            "A" : "N",
-            "AC" : "L",
-            "S" : "C",
-            "PR" : "L"
-         },
-         "TM" : {
-            "RL" : "O",
-            "E" : "H",
-            "RC" : "C"
-         }
-      }
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "refsource" : "CONFIRM",
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
-            "name" : "https://www.ibm.com/support/pages/node/6437579"
-         },
-         {
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198233",
-            "refsource" : "XF",
-            "name" : "ibm-engineering-cve202120506-xss (198233)",
-            "title" : "X-Force Vulnerability Report"
-         }
-      ]
-   },
-   "data_format" : "MITRE",
-   "data_type" : "CVE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "lang" : "eng",
-                  "value" : "Cross-Site Scripting"
-               }
-            ]
-         }
-      ]
-   },
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "product_name" : "Engineering Lifecycle Optimization",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Engineering Workflow Management",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Engineering Lifecycle Manager",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        },
-                        "product_name" : "Rational Team Concert"
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2021-20506",
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00"
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "UI": "R",
+                "C": "L",
+                "AV": "N",
+                "SCORE": "5.400",
+                "I": "L",
+                "A": "N",
+                "AC": "L",
+                "S": "C",
+                "PR": "L"
+            },
+            "TM": {
+                "RL": "O",
+                "E": "H",
+                "RC": "C"
             }
-         ]
-      }
-   },
-   "data_version" : "4.0",
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198231.",
-            "lang" : "eng"
-         }
-      ]
-   }
-}
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)",
+                "name": "https://www.ibm.com/support/pages/node/6437579"
+            },
+            {
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198233",
+                "refsource": "XF",
+                "name": "ibm-engineering-cve202120506-xss (198233)",
+                "title": "X-Force Vulnerability Report"
+            }
+        ]
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site Scripting"
+                    }
+                ]
+            }
+        ]
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Engineering Lifecycle Optimization",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Engineering Workflow Management",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Engineering Lifecycle Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Rational Team Concert"
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
+            ]
+        }
+    },
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198231.",
+                "lang": "eng"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20518.json b/2021/20xxx/CVE-2021-20518.json
index 2915af1df75..7b5d238b9f3 100644
--- a/2021/20xxx/CVE-2021-20518.json
+++ b/2021/20xxx/CVE-2021-20518.json
@@ -1,144 +1,144 @@
 {
-   "data_format" : "MITRE",
-   "references" : {
-      "reference_data" : [
-         {
-            "name" : "https://www.ibm.com/support/pages/node/6437579",
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
-            "url" : "https://www.ibm.com/support/pages/node/6437579",
-            "refsource" : "CONFIRM"
-         },
-         {
-            "name" : "ibm-engineering-cve202120518-xss (198437)",
-            "title" : "X-Force Vulnerability Report",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198437",
-            "refsource" : "XF"
-         }
-      ]
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "AC" : "L",
-            "A" : "N",
-            "S" : "C",
-            "PR" : "L",
-            "SCORE" : "5.400",
-            "I" : "L",
-            "UI" : "R",
-            "C" : "L",
-            "AV" : "N"
-         },
-         "TM" : {
-            "E" : "U",
-            "RL" : "O",
-            "RC" : "C"
-         }
-      }
-   },
-   "CVE_data_meta" : {
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00",
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2021-20518"
-   },
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198437.",
-            "lang" : "eng"
-         }
-      ]
-   },
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
+    "data_format": "MITRE",
+    "references": {
+        "reference_data": [
             {
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Lifecycle Optimization"
-                     },
-                     {
-                        "product_name" : "Engineering Workflow Management",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Team Concert",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Engineering Lifecycle Manager",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name" : "IBM"
+                "name": "https://www.ibm.com/support/pages/node/6437579",
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)",
+                "url": "https://www.ibm.com/support/pages/node/6437579",
+                "refsource": "CONFIRM"
+            },
+            {
+                "name": "ibm-engineering-cve202120518-xss (198437)",
+                "title": "X-Force Vulnerability Report",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198437",
+                "refsource": "XF"
             }
-         ]
-      }
-   },
-   "data_version" : "4.0",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "value" : "Cross-Site Scripting",
-                  "lang" : "eng"
-               }
+        ]
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "AC": "L",
+                "A": "N",
+                "S": "C",
+                "PR": "L",
+                "SCORE": "5.400",
+                "I": "L",
+                "UI": "R",
+                "C": "L",
+                "AV": "N"
+            },
+            "TM": {
+                "E": "U",
+                "RL": "O",
+                "RC": "C"
+            }
+        }
+    },
+    "CVE_data_meta": {
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00",
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2021-20518"
+    },
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198437.",
+                "lang": "eng"
+            }
+        ]
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Lifecycle Optimization"
+                            },
+                            {
+                                "product_name": "Engineering Workflow Management",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Team Concert",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Engineering Lifecycle Manager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "IBM"
+                }
             ]
-         }
-      ]
-   },
-   "data_type" : "CVE"
-}
+        }
+    },
+    "data_version": "4.0",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "value": "Cross-Site Scripting",
+                        "lang": "eng"
+                    }
+                ]
+            }
+        ]
+    },
+    "data_type": "CVE"
+}
\ No newline at end of file
diff --git a/2021/20xxx/CVE-2021-20520.json b/2021/20xxx/CVE-2021-20520.json
index a6f08ff53ec..ddc2efbc7cd 100644
--- a/2021/20xxx/CVE-2021-20520.json
+++ b/2021/20xxx/CVE-2021-20520.json
@@ -1,144 +1,144 @@
 {
-   "CVE_data_meta" : {
-      "ASSIGNER" : "psirt@us.ibm.com",
-      "ID" : "CVE-2021-20520",
-      "STATE" : "PUBLIC",
-      "DATE_PUBLIC" : "2021-03-29T00:00:00"
-   },
-   "impact" : {
-      "cvssv3" : {
-         "BM" : {
-            "AC" : "L",
-            "A" : "N",
-            "S" : "C",
-            "PR" : "L",
-            "SCORE" : "5.400",
-            "I" : "L",
-            "C" : "L",
-            "UI" : "R",
-            "AV" : "N"
-         },
-         "TM" : {
-            "E" : "H",
-            "RL" : "O",
-            "RC" : "C"
-         }
-      }
-   },
-   "references" : {
-      "reference_data" : [
-         {
-            "title" : "IBM Security Bulletin 6437579 (Rational Team Concert)",
-            "name" : "https://www.ibm.com/support/pages/node/6437579",
-            "refsource" : "CONFIRM",
-            "url" : "https://www.ibm.com/support/pages/node/6437579"
-         },
-         {
-            "title" : "X-Force Vulnerability Report",
-            "name" : "ibm-engineering-cve202120520-xss (198572)",
-            "refsource" : "XF",
-            "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/198572"
-         }
-      ]
-   },
-   "data_format" : "MITRE",
-   "data_type" : "CVE",
-   "problemtype" : {
-      "problemtype_data" : [
-         {
-            "description" : [
-               {
-                  "value" : "Cross-Site Scripting",
-                  "lang" : "eng"
-               }
-            ]
-         }
-      ]
-   },
-   "affects" : {
-      "vendor" : {
-         "vendor_data" : [
-            {
-               "vendor_name" : "IBM",
-               "product" : {
-                  "product_data" : [
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        },
-                        "product_name" : "Engineering Workflow Management"
-                     },
-                     {
-                        "product_name" : "Engineering Lifecycle Optimization",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "7.0"
-                              },
-                              {
-                                 "version_value" : "7.0.1"
-                              },
-                              {
-                                 "version_value" : "7.0.2"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name" : "Rational Team Concert",
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "version" : {
-                           "version_data" : [
-                              {
-                                 "version_value" : "6.0.2"
-                              },
-                              {
-                                 "version_value" : "6.0.6"
-                              },
-                              {
-                                 "version_value" : "6.0.6.1"
-                              }
-                           ]
-                        },
-                        "product_name" : "Rational Engineering Lifecycle Manager"
-                     }
-                  ]
-               }
+    "CVE_data_meta": {
+        "ASSIGNER": "psirt@us.ibm.com",
+        "ID": "CVE-2021-20520",
+        "STATE": "PUBLIC",
+        "DATE_PUBLIC": "2021-03-29T00:00:00"
+    },
+    "impact": {
+        "cvssv3": {
+            "BM": {
+                "AC": "L",
+                "A": "N",
+                "S": "C",
+                "PR": "L",
+                "SCORE": "5.400",
+                "I": "L",
+                "C": "L",
+                "UI": "R",
+                "AV": "N"
+            },
+            "TM": {
+                "E": "H",
+                "RL": "O",
+                "RC": "C"
             }
-         ]
-      }
-   },
-   "data_version" : "4.0",
-   "description" : {
-      "description_data" : [
-         {
-            "value" : "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  198572.",
-            "lang" : "eng"
-         }
-      ]
-   }
-}
+        }
+    },
+    "references": {
+        "reference_data": [
+            {
+                "title": "IBM Security Bulletin 6437579 (Rational Team Concert)",
+                "name": "https://www.ibm.com/support/pages/node/6437579",
+                "refsource": "CONFIRM",
+                "url": "https://www.ibm.com/support/pages/node/6437579"
+            },
+            {
+                "title": "X-Force Vulnerability Report",
+                "name": "ibm-engineering-cve202120520-xss (198572)",
+                "refsource": "XF",
+                "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198572"
+            }
+        ]
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "value": "Cross-Site Scripting",
+                        "lang": "eng"
+                    }
+                ]
+            }
+        ]
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "IBM",
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Engineering Workflow Management"
+                            },
+                            {
+                                "product_name": "Engineering Lifecycle Optimization",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.0"
+                                        },
+                                        {
+                                            "version_value": "7.0.1"
+                                        },
+                                        {
+                                            "version_value": "7.0.2"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Rational Team Concert",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "6.0.2"
+                                        },
+                                        {
+                                            "version_value": "6.0.6"
+                                        },
+                                        {
+                                            "version_value": "6.0.6.1"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Rational Engineering Lifecycle Manager"
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "value": "IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198572.",
+                "lang": "eng"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json
index 2166849d1a8..fa82fe8842c 100644
--- a/2021/21xxx/CVE-2021-21290.json
+++ b/2021/21xxx/CVE-2021-21290.json
@@ -196,6 +196,36 @@
                 "refsource": "MLIST",
                 "name": "[bookkeeper-issues] 20210330 [GitHub] [bookkeeper] eolivelli opened a new issue #2669: Update Netty to 4.1.60.final",
                 "url": "https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-dev] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-dev] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210330 [jira] [Updated] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210330 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 97829cbce01..4be136e244b 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -133,6 +133,36 @@
                 "refsource": "MLIST",
                 "name": "[bookkeeper-issues] 20210330 [GitHub] [bookkeeper] eolivelli opened a new issue #2669: Update Netty to 4.1.60.final",
                 "url": "https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-dev] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-dev] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210330 [jira] [Updated] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210330 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27185.json b/2021/27xxx/CVE-2021-27185.json
index c098478915e..8ebb54ccbbd 100644
--- a/2021/27xxx/CVE-2021-27185.json
+++ b/2021/27xxx/CVE-2021-27185.json
@@ -71,6 +71,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210319-0002/",
                 "url": "https://security.netapp.com/advisory/ntap-20210319-0002/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4302",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4302"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27191.json b/2021/27xxx/CVE-2021-27191.json
index 3625806211a..86c27b9234c 100644
--- a/2021/27xxx/CVE-2021-27191.json
+++ b/2021/27xxx/CVE-2021-27191.json
@@ -66,6 +66,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210319-0002/",
                 "url": "https://security.netapp.com/advisory/ntap-20210319-0002/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4304",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4304"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27515.json b/2021/27xxx/CVE-2021-27515.json
index b746d203dc1..952e39c1609 100644
--- a/2021/27xxx/CVE-2021-27515.json
+++ b/2021/27xxx/CVE-2021-27515.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0",
                 "refsource": "MISC",
                 "name": "https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4306",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4306"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27807.json b/2021/27xxx/CVE-2021-27807.json
index 3a48eecbb44..1209415de08 100644
--- a/2021/27xxx/CVE-2021-27807.json
+++ b/2021/27xxx/CVE-2021-27807.json
@@ -134,6 +134,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-93469e0030",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-8b17a2725e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-dc83ae690a",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/"
             }
         ]
     },
diff --git a/2021/27xxx/CVE-2021-27906.json b/2021/27xxx/CVE-2021-27906.json
index 5da7a21b7d6..2f9b9afd964 100644
--- a/2021/27xxx/CVE-2021-27906.json
+++ b/2021/27xxx/CVE-2021-27906.json
@@ -134,6 +134,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-93469e0030",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-8b17a2725e",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-dc83ae690a",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28834.json b/2021/28xxx/CVE-2021-28834.json
index 32cb3e1873f..e6a202de5fa 100644
--- a/2021/28xxx/CVE-2021-28834.json
+++ b/2021/28xxx/CVE-2021-28834.json
@@ -71,6 +71,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-139a6a2f9d",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4c57a892d1",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYOLQKFL6IJCQLBXV34Z4TI4O54GESPR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-edc673e864",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJCJVYHPY6LNUFM6LYZIAUIYOMVT5QGV/"
             }
         ]
     }

From 18d293d63b65bf281c6cb6ea263afb1b1e838404 Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Tue, 30 Mar 2021 10:35:51 -0700
Subject: [PATCH 768/845] Add CVE-2021-21412 for GHSA-rj44-gpjc-29r7

---
 2021/21xxx/CVE-2021-21412.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21412.json b/2021/21xxx/CVE-2021-21412.json
index 790787377e6..9b57f531651 100644
--- a/2021/21xxx/CVE-2021-21412.json
+++ b/2021/21xxx/CVE-2021-21412.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21412",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "egf",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 0.4.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "thi-ng"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Potential for arbitrary code execution in npm package @thi.ng/egf `#gpg`-tagged property values (only if `decrypt: true` option is enabled). \nPR with patch has been submitted and will has been released as of v0.4.0\nBy default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env).\nHowever, if GPG encrypted values are used/required:\n1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\\`) chars in the encrypted value string\n2. Replace/remove them or skip parsing if present."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 6.4,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "{\"CWE-78\":\"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\"}"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7"
+            },
+            {
+                "name": "https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243",
+                "refsource": "MISC",
+                "url": "https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243"
+            },
+            {
+                "name": "https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27",
+                "refsource": "MISC",
+                "url": "https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27"
+            },
+            {
+                "name": "https://www.npmjs.com/package/@thi.ng/egf",
+                "refsource": "MISC",
+                "url": "https://www.npmjs.com/package/@thi.ng/egf"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-rj44-gpjc-29r7",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From c11792596f3aace1f848df78b991ab94ec2a7bdd Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 18:00:40 +0000
Subject: [PATCH 769/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29474.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29475.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29476.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29477.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29478.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29479.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29480.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29481.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29482.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29483.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29484.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29485.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29486.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29487.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29488.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29489.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29490.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29491.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29492.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29493.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29494.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29495.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29496.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29497.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29498.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29499.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29500.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29501.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29502.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29503.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29504.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29505.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29506.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29507.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29508.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29509.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29510.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29511.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29512.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29513.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29514.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29515.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29516.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29517.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29518.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29519.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29520.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29521.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29522.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29523.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29524.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29525.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29526.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29527.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29528.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29529.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29530.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29531.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29532.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29533.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29534.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29535.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29536.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29537.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29538.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29539.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29540.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29541.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29542.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29543.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29544.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29545.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29546.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29547.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29548.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29549.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29550.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29551.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29552.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29553.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29554.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29555.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29556.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29557.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29558.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29559.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29560.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29561.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29562.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29563.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29564.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29565.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29566.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29567.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29568.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29569.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29570.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29571.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29572.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29573.json | 18 ++++++++++++++++++
 100 files changed, 1800 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29474.json
 create mode 100644 2021/29xxx/CVE-2021-29475.json
 create mode 100644 2021/29xxx/CVE-2021-29476.json
 create mode 100644 2021/29xxx/CVE-2021-29477.json
 create mode 100644 2021/29xxx/CVE-2021-29478.json
 create mode 100644 2021/29xxx/CVE-2021-29479.json
 create mode 100644 2021/29xxx/CVE-2021-29480.json
 create mode 100644 2021/29xxx/CVE-2021-29481.json
 create mode 100644 2021/29xxx/CVE-2021-29482.json
 create mode 100644 2021/29xxx/CVE-2021-29483.json
 create mode 100644 2021/29xxx/CVE-2021-29484.json
 create mode 100644 2021/29xxx/CVE-2021-29485.json
 create mode 100644 2021/29xxx/CVE-2021-29486.json
 create mode 100644 2021/29xxx/CVE-2021-29487.json
 create mode 100644 2021/29xxx/CVE-2021-29488.json
 create mode 100644 2021/29xxx/CVE-2021-29489.json
 create mode 100644 2021/29xxx/CVE-2021-29490.json
 create mode 100644 2021/29xxx/CVE-2021-29491.json
 create mode 100644 2021/29xxx/CVE-2021-29492.json
 create mode 100644 2021/29xxx/CVE-2021-29493.json
 create mode 100644 2021/29xxx/CVE-2021-29494.json
 create mode 100644 2021/29xxx/CVE-2021-29495.json
 create mode 100644 2021/29xxx/CVE-2021-29496.json
 create mode 100644 2021/29xxx/CVE-2021-29497.json
 create mode 100644 2021/29xxx/CVE-2021-29498.json
 create mode 100644 2021/29xxx/CVE-2021-29499.json
 create mode 100644 2021/29xxx/CVE-2021-29500.json
 create mode 100644 2021/29xxx/CVE-2021-29501.json
 create mode 100644 2021/29xxx/CVE-2021-29502.json
 create mode 100644 2021/29xxx/CVE-2021-29503.json
 create mode 100644 2021/29xxx/CVE-2021-29504.json
 create mode 100644 2021/29xxx/CVE-2021-29505.json
 create mode 100644 2021/29xxx/CVE-2021-29506.json
 create mode 100644 2021/29xxx/CVE-2021-29507.json
 create mode 100644 2021/29xxx/CVE-2021-29508.json
 create mode 100644 2021/29xxx/CVE-2021-29509.json
 create mode 100644 2021/29xxx/CVE-2021-29510.json
 create mode 100644 2021/29xxx/CVE-2021-29511.json
 create mode 100644 2021/29xxx/CVE-2021-29512.json
 create mode 100644 2021/29xxx/CVE-2021-29513.json
 create mode 100644 2021/29xxx/CVE-2021-29514.json
 create mode 100644 2021/29xxx/CVE-2021-29515.json
 create mode 100644 2021/29xxx/CVE-2021-29516.json
 create mode 100644 2021/29xxx/CVE-2021-29517.json
 create mode 100644 2021/29xxx/CVE-2021-29518.json
 create mode 100644 2021/29xxx/CVE-2021-29519.json
 create mode 100644 2021/29xxx/CVE-2021-29520.json
 create mode 100644 2021/29xxx/CVE-2021-29521.json
 create mode 100644 2021/29xxx/CVE-2021-29522.json
 create mode 100644 2021/29xxx/CVE-2021-29523.json
 create mode 100644 2021/29xxx/CVE-2021-29524.json
 create mode 100644 2021/29xxx/CVE-2021-29525.json
 create mode 100644 2021/29xxx/CVE-2021-29526.json
 create mode 100644 2021/29xxx/CVE-2021-29527.json
 create mode 100644 2021/29xxx/CVE-2021-29528.json
 create mode 100644 2021/29xxx/CVE-2021-29529.json
 create mode 100644 2021/29xxx/CVE-2021-29530.json
 create mode 100644 2021/29xxx/CVE-2021-29531.json
 create mode 100644 2021/29xxx/CVE-2021-29532.json
 create mode 100644 2021/29xxx/CVE-2021-29533.json
 create mode 100644 2021/29xxx/CVE-2021-29534.json
 create mode 100644 2021/29xxx/CVE-2021-29535.json
 create mode 100644 2021/29xxx/CVE-2021-29536.json
 create mode 100644 2021/29xxx/CVE-2021-29537.json
 create mode 100644 2021/29xxx/CVE-2021-29538.json
 create mode 100644 2021/29xxx/CVE-2021-29539.json
 create mode 100644 2021/29xxx/CVE-2021-29540.json
 create mode 100644 2021/29xxx/CVE-2021-29541.json
 create mode 100644 2021/29xxx/CVE-2021-29542.json
 create mode 100644 2021/29xxx/CVE-2021-29543.json
 create mode 100644 2021/29xxx/CVE-2021-29544.json
 create mode 100644 2021/29xxx/CVE-2021-29545.json
 create mode 100644 2021/29xxx/CVE-2021-29546.json
 create mode 100644 2021/29xxx/CVE-2021-29547.json
 create mode 100644 2021/29xxx/CVE-2021-29548.json
 create mode 100644 2021/29xxx/CVE-2021-29549.json
 create mode 100644 2021/29xxx/CVE-2021-29550.json
 create mode 100644 2021/29xxx/CVE-2021-29551.json
 create mode 100644 2021/29xxx/CVE-2021-29552.json
 create mode 100644 2021/29xxx/CVE-2021-29553.json
 create mode 100644 2021/29xxx/CVE-2021-29554.json
 create mode 100644 2021/29xxx/CVE-2021-29555.json
 create mode 100644 2021/29xxx/CVE-2021-29556.json
 create mode 100644 2021/29xxx/CVE-2021-29557.json
 create mode 100644 2021/29xxx/CVE-2021-29558.json
 create mode 100644 2021/29xxx/CVE-2021-29559.json
 create mode 100644 2021/29xxx/CVE-2021-29560.json
 create mode 100644 2021/29xxx/CVE-2021-29561.json
 create mode 100644 2021/29xxx/CVE-2021-29562.json
 create mode 100644 2021/29xxx/CVE-2021-29563.json
 create mode 100644 2021/29xxx/CVE-2021-29564.json
 create mode 100644 2021/29xxx/CVE-2021-29565.json
 create mode 100644 2021/29xxx/CVE-2021-29566.json
 create mode 100644 2021/29xxx/CVE-2021-29567.json
 create mode 100644 2021/29xxx/CVE-2021-29568.json
 create mode 100644 2021/29xxx/CVE-2021-29569.json
 create mode 100644 2021/29xxx/CVE-2021-29570.json
 create mode 100644 2021/29xxx/CVE-2021-29571.json
 create mode 100644 2021/29xxx/CVE-2021-29572.json
 create mode 100644 2021/29xxx/CVE-2021-29573.json

diff --git a/2021/29xxx/CVE-2021-29474.json b/2021/29xxx/CVE-2021-29474.json
new file mode 100644
index 00000000000..cd3530a76a4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29474.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29474",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29475.json b/2021/29xxx/CVE-2021-29475.json
new file mode 100644
index 00000000000..b864750f1fa
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29475.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29475",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29476.json b/2021/29xxx/CVE-2021-29476.json
new file mode 100644
index 00000000000..b697018445c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29476.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29476",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29477.json b/2021/29xxx/CVE-2021-29477.json
new file mode 100644
index 00000000000..c8ca6fd1a0a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29477.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29477",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29478.json b/2021/29xxx/CVE-2021-29478.json
new file mode 100644
index 00000000000..626f3287c2d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29478.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29478",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29479.json b/2021/29xxx/CVE-2021-29479.json
new file mode 100644
index 00000000000..03b17ea8b49
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29479.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29479",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29480.json b/2021/29xxx/CVE-2021-29480.json
new file mode 100644
index 00000000000..df4fa40b3db
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29480.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29480",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29481.json b/2021/29xxx/CVE-2021-29481.json
new file mode 100644
index 00000000000..9a51f87b8e8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29481.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29481",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29482.json b/2021/29xxx/CVE-2021-29482.json
new file mode 100644
index 00000000000..4323adecb2d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29482.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29482",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29483.json b/2021/29xxx/CVE-2021-29483.json
new file mode 100644
index 00000000000..6864b2cf276
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29483.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29483",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29484.json b/2021/29xxx/CVE-2021-29484.json
new file mode 100644
index 00000000000..39b8a4f4a5e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29484.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29484",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29485.json b/2021/29xxx/CVE-2021-29485.json
new file mode 100644
index 00000000000..e795b1fa5fb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29485.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29485",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29486.json b/2021/29xxx/CVE-2021-29486.json
new file mode 100644
index 00000000000..dbc31d92a81
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29486.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29486",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29487.json b/2021/29xxx/CVE-2021-29487.json
new file mode 100644
index 00000000000..952d9cbcbae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29487.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29487",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29488.json b/2021/29xxx/CVE-2021-29488.json
new file mode 100644
index 00000000000..f6f73dc1d3f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29488.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29488",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29489.json b/2021/29xxx/CVE-2021-29489.json
new file mode 100644
index 00000000000..d19ee9e2a46
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29489.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29489",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29490.json b/2021/29xxx/CVE-2021-29490.json
new file mode 100644
index 00000000000..e2a43f3f9cc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29490.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29490",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29491.json b/2021/29xxx/CVE-2021-29491.json
new file mode 100644
index 00000000000..27ec3852feb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29491.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29491",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29492.json b/2021/29xxx/CVE-2021-29492.json
new file mode 100644
index 00000000000..586e977443f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29492.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29492",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29493.json b/2021/29xxx/CVE-2021-29493.json
new file mode 100644
index 00000000000..95e90b5525d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29493.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29493",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29494.json b/2021/29xxx/CVE-2021-29494.json
new file mode 100644
index 00000000000..b804e1a2c08
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29494.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29494",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29495.json b/2021/29xxx/CVE-2021-29495.json
new file mode 100644
index 00000000000..6cd6fd349cc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29495.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29495",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29496.json b/2021/29xxx/CVE-2021-29496.json
new file mode 100644
index 00000000000..2d8bb09018f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29496.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29496",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29497.json b/2021/29xxx/CVE-2021-29497.json
new file mode 100644
index 00000000000..4df422b4fa4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29497.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29497",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29498.json b/2021/29xxx/CVE-2021-29498.json
new file mode 100644
index 00000000000..58c4db96a5f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29498.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29498",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29499.json b/2021/29xxx/CVE-2021-29499.json
new file mode 100644
index 00000000000..c668e0294e2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29499.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29499",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29500.json b/2021/29xxx/CVE-2021-29500.json
new file mode 100644
index 00000000000..8d0fb5a85dd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29500.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29500",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29501.json b/2021/29xxx/CVE-2021-29501.json
new file mode 100644
index 00000000000..f57f8abe26a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29501.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29501",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29502.json b/2021/29xxx/CVE-2021-29502.json
new file mode 100644
index 00000000000..3636bf84509
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29502.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29502",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29503.json b/2021/29xxx/CVE-2021-29503.json
new file mode 100644
index 00000000000..2d714f8c912
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29503.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29503",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29504.json b/2021/29xxx/CVE-2021-29504.json
new file mode 100644
index 00000000000..9e55644c244
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29504.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29504",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29505.json b/2021/29xxx/CVE-2021-29505.json
new file mode 100644
index 00000000000..14b7e1aa928
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29505.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29505",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29506.json b/2021/29xxx/CVE-2021-29506.json
new file mode 100644
index 00000000000..936852dd01c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29506.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29506",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29507.json b/2021/29xxx/CVE-2021-29507.json
new file mode 100644
index 00000000000..74c8b3e2625
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29507.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29507",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29508.json b/2021/29xxx/CVE-2021-29508.json
new file mode 100644
index 00000000000..e62ab129528
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29508.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29508",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29509.json b/2021/29xxx/CVE-2021-29509.json
new file mode 100644
index 00000000000..e009f2d21de
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29509.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29509",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29510.json b/2021/29xxx/CVE-2021-29510.json
new file mode 100644
index 00000000000..dc9f4e07c96
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29510.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29510",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29511.json b/2021/29xxx/CVE-2021-29511.json
new file mode 100644
index 00000000000..50a02613c92
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29511.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29511",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29512.json b/2021/29xxx/CVE-2021-29512.json
new file mode 100644
index 00000000000..ca2c8e83d0d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29512.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29512",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29513.json b/2021/29xxx/CVE-2021-29513.json
new file mode 100644
index 00000000000..ba6a52f1f9a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29513.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29513",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29514.json b/2021/29xxx/CVE-2021-29514.json
new file mode 100644
index 00000000000..c42d1cafbfc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29514.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29514",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29515.json b/2021/29xxx/CVE-2021-29515.json
new file mode 100644
index 00000000000..070214aa750
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29515.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29515",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29516.json b/2021/29xxx/CVE-2021-29516.json
new file mode 100644
index 00000000000..9dbfcb7ab87
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29516.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29516",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29517.json b/2021/29xxx/CVE-2021-29517.json
new file mode 100644
index 00000000000..596ed3301e7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29517.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29517",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29518.json b/2021/29xxx/CVE-2021-29518.json
new file mode 100644
index 00000000000..3d61b1e646a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29518.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29518",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29519.json b/2021/29xxx/CVE-2021-29519.json
new file mode 100644
index 00000000000..0b7b2ffada4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29519.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29519",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29520.json b/2021/29xxx/CVE-2021-29520.json
new file mode 100644
index 00000000000..25c8104b36e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29520.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29520",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29521.json b/2021/29xxx/CVE-2021-29521.json
new file mode 100644
index 00000000000..b5a60f4f5e4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29521.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29521",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29522.json b/2021/29xxx/CVE-2021-29522.json
new file mode 100644
index 00000000000..1fef9523c75
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29522.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29522",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29523.json b/2021/29xxx/CVE-2021-29523.json
new file mode 100644
index 00000000000..11e92d433b0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29523.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29523",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29524.json b/2021/29xxx/CVE-2021-29524.json
new file mode 100644
index 00000000000..febbb3e9829
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29524.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29524",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29525.json b/2021/29xxx/CVE-2021-29525.json
new file mode 100644
index 00000000000..2d2b63c0080
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29525.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29525",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29526.json b/2021/29xxx/CVE-2021-29526.json
new file mode 100644
index 00000000000..64e9755857b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29526.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29526",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29527.json b/2021/29xxx/CVE-2021-29527.json
new file mode 100644
index 00000000000..6f9ecab0ff2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29527.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29527",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29528.json b/2021/29xxx/CVE-2021-29528.json
new file mode 100644
index 00000000000..2b25f5d35da
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29528.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29528",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29529.json b/2021/29xxx/CVE-2021-29529.json
new file mode 100644
index 00000000000..aecd8f5ffd8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29529.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29529",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29530.json b/2021/29xxx/CVE-2021-29530.json
new file mode 100644
index 00000000000..1eae2ab7e7d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29530.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29530",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29531.json b/2021/29xxx/CVE-2021-29531.json
new file mode 100644
index 00000000000..83ccfe20e8e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29531.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29531",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29532.json b/2021/29xxx/CVE-2021-29532.json
new file mode 100644
index 00000000000..ef82894ae8d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29532.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29532",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29533.json b/2021/29xxx/CVE-2021-29533.json
new file mode 100644
index 00000000000..b99a2136af3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29533.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29533",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29534.json b/2021/29xxx/CVE-2021-29534.json
new file mode 100644
index 00000000000..25ac5e60f65
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29534.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29534",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29535.json b/2021/29xxx/CVE-2021-29535.json
new file mode 100644
index 00000000000..ed8a29a45e9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29535.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29535",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29536.json b/2021/29xxx/CVE-2021-29536.json
new file mode 100644
index 00000000000..16f0f2b6fb3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29536.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29536",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29537.json b/2021/29xxx/CVE-2021-29537.json
new file mode 100644
index 00000000000..a9e1ddb9081
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29537.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29537",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29538.json b/2021/29xxx/CVE-2021-29538.json
new file mode 100644
index 00000000000..c79e901aa7a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29538.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29538",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29539.json b/2021/29xxx/CVE-2021-29539.json
new file mode 100644
index 00000000000..d2c73f7b266
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29539.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29539",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29540.json b/2021/29xxx/CVE-2021-29540.json
new file mode 100644
index 00000000000..7340ab8e57a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29540.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29540",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29541.json b/2021/29xxx/CVE-2021-29541.json
new file mode 100644
index 00000000000..c226183f8b4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29541.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29541",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29542.json b/2021/29xxx/CVE-2021-29542.json
new file mode 100644
index 00000000000..046b16799fc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29542.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29542",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29543.json b/2021/29xxx/CVE-2021-29543.json
new file mode 100644
index 00000000000..ef1783c8aef
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29543.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29543",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29544.json b/2021/29xxx/CVE-2021-29544.json
new file mode 100644
index 00000000000..1114578a6b6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29544.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29544",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29545.json b/2021/29xxx/CVE-2021-29545.json
new file mode 100644
index 00000000000..2dbbe4abb92
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29545.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29545",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29546.json b/2021/29xxx/CVE-2021-29546.json
new file mode 100644
index 00000000000..5a5edf58353
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29546.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29546",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29547.json b/2021/29xxx/CVE-2021-29547.json
new file mode 100644
index 00000000000..4fb6cb80360
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29547.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29547",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29548.json b/2021/29xxx/CVE-2021-29548.json
new file mode 100644
index 00000000000..b5e77d80e5d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29548.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29548",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29549.json b/2021/29xxx/CVE-2021-29549.json
new file mode 100644
index 00000000000..1f929a8ccd5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29549.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29549",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29550.json b/2021/29xxx/CVE-2021-29550.json
new file mode 100644
index 00000000000..d1ae7e88b73
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29550.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29550",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29551.json b/2021/29xxx/CVE-2021-29551.json
new file mode 100644
index 00000000000..046a8c0b932
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29551.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29551",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29552.json b/2021/29xxx/CVE-2021-29552.json
new file mode 100644
index 00000000000..20e951fbee5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29552.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29552",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29553.json b/2021/29xxx/CVE-2021-29553.json
new file mode 100644
index 00000000000..2a204b9639b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29553.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29553",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29554.json b/2021/29xxx/CVE-2021-29554.json
new file mode 100644
index 00000000000..c639f4f617f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29554.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29554",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29555.json b/2021/29xxx/CVE-2021-29555.json
new file mode 100644
index 00000000000..c84d6c4b771
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29555.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29555",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29556.json b/2021/29xxx/CVE-2021-29556.json
new file mode 100644
index 00000000000..39cd3cf12fe
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29556.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29556",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29557.json b/2021/29xxx/CVE-2021-29557.json
new file mode 100644
index 00000000000..72ea60b55eb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29557.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29557",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29558.json b/2021/29xxx/CVE-2021-29558.json
new file mode 100644
index 00000000000..8c895e56666
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29558.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29558",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29559.json b/2021/29xxx/CVE-2021-29559.json
new file mode 100644
index 00000000000..0cee6f03299
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29559.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29559",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29560.json b/2021/29xxx/CVE-2021-29560.json
new file mode 100644
index 00000000000..5935ccd6334
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29560.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29560",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29561.json b/2021/29xxx/CVE-2021-29561.json
new file mode 100644
index 00000000000..26ccaa83712
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29561.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29561",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29562.json b/2021/29xxx/CVE-2021-29562.json
new file mode 100644
index 00000000000..a6d7b3eb3c0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29562.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29562",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29563.json b/2021/29xxx/CVE-2021-29563.json
new file mode 100644
index 00000000000..6ed31bc833f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29563.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29563",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29564.json b/2021/29xxx/CVE-2021-29564.json
new file mode 100644
index 00000000000..1184abb23fd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29564.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29564",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29565.json b/2021/29xxx/CVE-2021-29565.json
new file mode 100644
index 00000000000..cd783d0d09b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29565.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29565",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29566.json b/2021/29xxx/CVE-2021-29566.json
new file mode 100644
index 00000000000..56ece5b31ce
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29566.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29566",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29567.json b/2021/29xxx/CVE-2021-29567.json
new file mode 100644
index 00000000000..c2cbdbc76d0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29567.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29567",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29568.json b/2021/29xxx/CVE-2021-29568.json
new file mode 100644
index 00000000000..4a6c9aab7a7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29568.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29568",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29569.json b/2021/29xxx/CVE-2021-29569.json
new file mode 100644
index 00000000000..350cbe046e1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29569.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29569",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29570.json b/2021/29xxx/CVE-2021-29570.json
new file mode 100644
index 00000000000..6339dcb201b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29570.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29570",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29571.json b/2021/29xxx/CVE-2021-29571.json
new file mode 100644
index 00000000000..dedf8738a76
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29571.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29571",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29572.json b/2021/29xxx/CVE-2021-29572.json
new file mode 100644
index 00000000000..7f6ba528db2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29572.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29572",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29573.json b/2021/29xxx/CVE-2021-29573.json
new file mode 100644
index 00000000000..44468e24714
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29573.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29573",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 5eb15c4e6288d6675a273b58a4c4caf2a7a2d912 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 18:00:55 +0000
Subject: [PATCH 770/845] "-Synchronized-Data."

---
 2020/35xxx/CVE-2020-35138.json |  2 +-
 2021/29xxx/CVE-2021-29574.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29575.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29576.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29577.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29578.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29579.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29580.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29581.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29582.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29583.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29584.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29585.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29586.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29587.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29588.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29589.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29590.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29591.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29592.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29593.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29594.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29595.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29596.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29597.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29598.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29599.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29600.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29601.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29602.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29603.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29604.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29605.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29606.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29607.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29608.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29609.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29610.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29611.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29612.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29613.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29614.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29615.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29616.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29617.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29618.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29619.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29620.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29621.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29622.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29623.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29624.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29625.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29626.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29627.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29628.json | 18 ++++++++++++++++++
 56 files changed, 991 insertions(+), 1 deletion(-)
 create mode 100644 2021/29xxx/CVE-2021-29574.json
 create mode 100644 2021/29xxx/CVE-2021-29575.json
 create mode 100644 2021/29xxx/CVE-2021-29576.json
 create mode 100644 2021/29xxx/CVE-2021-29577.json
 create mode 100644 2021/29xxx/CVE-2021-29578.json
 create mode 100644 2021/29xxx/CVE-2021-29579.json
 create mode 100644 2021/29xxx/CVE-2021-29580.json
 create mode 100644 2021/29xxx/CVE-2021-29581.json
 create mode 100644 2021/29xxx/CVE-2021-29582.json
 create mode 100644 2021/29xxx/CVE-2021-29583.json
 create mode 100644 2021/29xxx/CVE-2021-29584.json
 create mode 100644 2021/29xxx/CVE-2021-29585.json
 create mode 100644 2021/29xxx/CVE-2021-29586.json
 create mode 100644 2021/29xxx/CVE-2021-29587.json
 create mode 100644 2021/29xxx/CVE-2021-29588.json
 create mode 100644 2021/29xxx/CVE-2021-29589.json
 create mode 100644 2021/29xxx/CVE-2021-29590.json
 create mode 100644 2021/29xxx/CVE-2021-29591.json
 create mode 100644 2021/29xxx/CVE-2021-29592.json
 create mode 100644 2021/29xxx/CVE-2021-29593.json
 create mode 100644 2021/29xxx/CVE-2021-29594.json
 create mode 100644 2021/29xxx/CVE-2021-29595.json
 create mode 100644 2021/29xxx/CVE-2021-29596.json
 create mode 100644 2021/29xxx/CVE-2021-29597.json
 create mode 100644 2021/29xxx/CVE-2021-29598.json
 create mode 100644 2021/29xxx/CVE-2021-29599.json
 create mode 100644 2021/29xxx/CVE-2021-29600.json
 create mode 100644 2021/29xxx/CVE-2021-29601.json
 create mode 100644 2021/29xxx/CVE-2021-29602.json
 create mode 100644 2021/29xxx/CVE-2021-29603.json
 create mode 100644 2021/29xxx/CVE-2021-29604.json
 create mode 100644 2021/29xxx/CVE-2021-29605.json
 create mode 100644 2021/29xxx/CVE-2021-29606.json
 create mode 100644 2021/29xxx/CVE-2021-29607.json
 create mode 100644 2021/29xxx/CVE-2021-29608.json
 create mode 100644 2021/29xxx/CVE-2021-29609.json
 create mode 100644 2021/29xxx/CVE-2021-29610.json
 create mode 100644 2021/29xxx/CVE-2021-29611.json
 create mode 100644 2021/29xxx/CVE-2021-29612.json
 create mode 100644 2021/29xxx/CVE-2021-29613.json
 create mode 100644 2021/29xxx/CVE-2021-29614.json
 create mode 100644 2021/29xxx/CVE-2021-29615.json
 create mode 100644 2021/29xxx/CVE-2021-29616.json
 create mode 100644 2021/29xxx/CVE-2021-29617.json
 create mode 100644 2021/29xxx/CVE-2021-29618.json
 create mode 100644 2021/29xxx/CVE-2021-29619.json
 create mode 100644 2021/29xxx/CVE-2021-29620.json
 create mode 100644 2021/29xxx/CVE-2021-29621.json
 create mode 100644 2021/29xxx/CVE-2021-29622.json
 create mode 100644 2021/29xxx/CVE-2021-29623.json
 create mode 100644 2021/29xxx/CVE-2021-29624.json
 create mode 100644 2021/29xxx/CVE-2021-29625.json
 create mode 100644 2021/29xxx/CVE-2021-29626.json
 create mode 100644 2021/29xxx/CVE-2021-29627.json
 create mode 100644 2021/29xxx/CVE-2021-29628.json

diff --git a/2020/35xxx/CVE-2020-35138.json b/2020/35xxx/CVE-2020-35138.json
index 2a06da52d37..f2625910169 100644
--- a/2020/35xxx/CVE-2020-35138.json
+++ b/2020/35xxx/CVE-2020-35138.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The keys is in the com/mobileiron/common/utils/C4928m.java file."
+                "value": "The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in the com/mobileiron/common/utils/C4928m.java file."
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29574.json b/2021/29xxx/CVE-2021-29574.json
new file mode 100644
index 00000000000..c87f80e6db9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29574.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29574",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29575.json b/2021/29xxx/CVE-2021-29575.json
new file mode 100644
index 00000000000..d2bc194f3ca
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29575.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29575",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29576.json b/2021/29xxx/CVE-2021-29576.json
new file mode 100644
index 00000000000..4ae5561a271
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29576.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29576",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29577.json b/2021/29xxx/CVE-2021-29577.json
new file mode 100644
index 00000000000..04bec9eba36
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29577.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29577",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29578.json b/2021/29xxx/CVE-2021-29578.json
new file mode 100644
index 00000000000..75c93fc241a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29578.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29578",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29579.json b/2021/29xxx/CVE-2021-29579.json
new file mode 100644
index 00000000000..9082a00b5a1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29579.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29579",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29580.json b/2021/29xxx/CVE-2021-29580.json
new file mode 100644
index 00000000000..55e7b0ee53f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29580.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29580",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29581.json b/2021/29xxx/CVE-2021-29581.json
new file mode 100644
index 00000000000..ed88e5061fc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29581.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29581",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29582.json b/2021/29xxx/CVE-2021-29582.json
new file mode 100644
index 00000000000..ccf0c970d6f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29582.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29582",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29583.json b/2021/29xxx/CVE-2021-29583.json
new file mode 100644
index 00000000000..79d8617df85
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29583.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29583",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29584.json b/2021/29xxx/CVE-2021-29584.json
new file mode 100644
index 00000000000..a8a7f450067
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29584.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29584",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29585.json b/2021/29xxx/CVE-2021-29585.json
new file mode 100644
index 00000000000..87146ef4650
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29585.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29585",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29586.json b/2021/29xxx/CVE-2021-29586.json
new file mode 100644
index 00000000000..0673f97a5b1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29586.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29586",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29587.json b/2021/29xxx/CVE-2021-29587.json
new file mode 100644
index 00000000000..ec642be57d8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29587.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29587",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29588.json b/2021/29xxx/CVE-2021-29588.json
new file mode 100644
index 00000000000..49c7f497f1d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29588.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29588",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29589.json b/2021/29xxx/CVE-2021-29589.json
new file mode 100644
index 00000000000..4fbafa00dfb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29589.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29589",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29590.json b/2021/29xxx/CVE-2021-29590.json
new file mode 100644
index 00000000000..b4f9c7ab42f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29590.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29590",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29591.json b/2021/29xxx/CVE-2021-29591.json
new file mode 100644
index 00000000000..97945af055c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29591.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29591",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29592.json b/2021/29xxx/CVE-2021-29592.json
new file mode 100644
index 00000000000..b4b3a579d51
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29592.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29592",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29593.json b/2021/29xxx/CVE-2021-29593.json
new file mode 100644
index 00000000000..826e2902c7d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29593.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29593",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29594.json b/2021/29xxx/CVE-2021-29594.json
new file mode 100644
index 00000000000..bf21ec36a64
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29594.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29594",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29595.json b/2021/29xxx/CVE-2021-29595.json
new file mode 100644
index 00000000000..d89b94dbffb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29595.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29595",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29596.json b/2021/29xxx/CVE-2021-29596.json
new file mode 100644
index 00000000000..3a3c8263403
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29596.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29596",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29597.json b/2021/29xxx/CVE-2021-29597.json
new file mode 100644
index 00000000000..909a5a55dbc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29597.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29597",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29598.json b/2021/29xxx/CVE-2021-29598.json
new file mode 100644
index 00000000000..d69b5ed6c2c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29598.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29598",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29599.json b/2021/29xxx/CVE-2021-29599.json
new file mode 100644
index 00000000000..bd0a5902d86
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29599.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29599",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29600.json b/2021/29xxx/CVE-2021-29600.json
new file mode 100644
index 00000000000..8a2e9412313
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29600.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29600",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29601.json b/2021/29xxx/CVE-2021-29601.json
new file mode 100644
index 00000000000..9fddd22b1cc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29601.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29601",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29602.json b/2021/29xxx/CVE-2021-29602.json
new file mode 100644
index 00000000000..47890e11265
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29602.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29602",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29603.json b/2021/29xxx/CVE-2021-29603.json
new file mode 100644
index 00000000000..2af12e8b82c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29603.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29603",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29604.json b/2021/29xxx/CVE-2021-29604.json
new file mode 100644
index 00000000000..d0a5b5b06b0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29604.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29604",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29605.json b/2021/29xxx/CVE-2021-29605.json
new file mode 100644
index 00000000000..e139bb850c8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29605.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29605",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29606.json b/2021/29xxx/CVE-2021-29606.json
new file mode 100644
index 00000000000..cb4c903905d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29606.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29606",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29607.json b/2021/29xxx/CVE-2021-29607.json
new file mode 100644
index 00000000000..23722001e7c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29607.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29607",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29608.json b/2021/29xxx/CVE-2021-29608.json
new file mode 100644
index 00000000000..dc77c541e02
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29608.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29608",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29609.json b/2021/29xxx/CVE-2021-29609.json
new file mode 100644
index 00000000000..404fbc82a22
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29609.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29609",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29610.json b/2021/29xxx/CVE-2021-29610.json
new file mode 100644
index 00000000000..52e577aabb9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29610.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29610",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29611.json b/2021/29xxx/CVE-2021-29611.json
new file mode 100644
index 00000000000..7be5229656d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29611.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29611",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29612.json b/2021/29xxx/CVE-2021-29612.json
new file mode 100644
index 00000000000..0a91981d828
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29612.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29612",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29613.json b/2021/29xxx/CVE-2021-29613.json
new file mode 100644
index 00000000000..c171d65fcb6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29613.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29613",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29614.json b/2021/29xxx/CVE-2021-29614.json
new file mode 100644
index 00000000000..1dbae216efb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29614.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29614",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29615.json b/2021/29xxx/CVE-2021-29615.json
new file mode 100644
index 00000000000..b594582beae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29615.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29615",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29616.json b/2021/29xxx/CVE-2021-29616.json
new file mode 100644
index 00000000000..3694fb7cd9b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29616.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29616",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29617.json b/2021/29xxx/CVE-2021-29617.json
new file mode 100644
index 00000000000..819e2929764
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29617.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29617",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29618.json b/2021/29xxx/CVE-2021-29618.json
new file mode 100644
index 00000000000..0d531bb833f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29618.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29618",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29619.json b/2021/29xxx/CVE-2021-29619.json
new file mode 100644
index 00000000000..5b5fcf6a846
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29619.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29619",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29620.json b/2021/29xxx/CVE-2021-29620.json
new file mode 100644
index 00000000000..86f2a59ed54
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29620.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29620",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29621.json b/2021/29xxx/CVE-2021-29621.json
new file mode 100644
index 00000000000..ca9c6297d68
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29621.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29621",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29622.json b/2021/29xxx/CVE-2021-29622.json
new file mode 100644
index 00000000000..709fb9c6762
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29622.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29622",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29623.json b/2021/29xxx/CVE-2021-29623.json
new file mode 100644
index 00000000000..b6c28720400
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29623.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29623",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29624.json b/2021/29xxx/CVE-2021-29624.json
new file mode 100644
index 00000000000..e7f8c35973a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29624.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29624",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29625.json b/2021/29xxx/CVE-2021-29625.json
new file mode 100644
index 00000000000..66096e36210
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29625.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29625",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29626.json b/2021/29xxx/CVE-2021-29626.json
new file mode 100644
index 00000000000..18635165b0b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29626.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29626",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29627.json b/2021/29xxx/CVE-2021-29627.json
new file mode 100644
index 00000000000..45979bf2e81
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29627.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29627",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29628.json b/2021/29xxx/CVE-2021-29628.json
new file mode 100644
index 00000000000..56c04278508
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29628.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29628",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From afe1973cc16e86b03c4a5efc74509d1bd8819f17 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 18:01:10 +0000
Subject: [PATCH 771/845] "-Synchronized-Data."

---
 2020/35xxx/CVE-2020-35774.json |  5 ++++
 2021/21xxx/CVE-2021-21412.json |  2 +-
 2021/26xxx/CVE-2021-26579.json | 50 +++++++++++++++++++++++++++++--
 2021/29xxx/CVE-2021-29426.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29427.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29428.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29429.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29430.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29431.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29432.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29433.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29434.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29435.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29436.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29437.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29438.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29439.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29440.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29441.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29442.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29443.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29444.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29445.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29446.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29447.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29629.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29630.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29631.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29632.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29633.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29634.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29635.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29636.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29637.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29638.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29639.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29640.json | 18 +++++++++++
 2021/29xxx/CVE-2021-29641.json | 18 +++++++++++
 2021/3xxx/CVE-2021-3474.json   | 55 ++++++++++++++++++++++++++++++++--
 2021/3xxx/CVE-2021-3475.json   | 55 ++++++++++++++++++++++++++++++++--
 2021/3xxx/CVE-2021-3476.json   | 55 ++++++++++++++++++++++++++++++++--
 41 files changed, 839 insertions(+), 13 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29426.json
 create mode 100644 2021/29xxx/CVE-2021-29427.json
 create mode 100644 2021/29xxx/CVE-2021-29428.json
 create mode 100644 2021/29xxx/CVE-2021-29429.json
 create mode 100644 2021/29xxx/CVE-2021-29430.json
 create mode 100644 2021/29xxx/CVE-2021-29431.json
 create mode 100644 2021/29xxx/CVE-2021-29432.json
 create mode 100644 2021/29xxx/CVE-2021-29433.json
 create mode 100644 2021/29xxx/CVE-2021-29434.json
 create mode 100644 2021/29xxx/CVE-2021-29435.json
 create mode 100644 2021/29xxx/CVE-2021-29436.json
 create mode 100644 2021/29xxx/CVE-2021-29437.json
 create mode 100644 2021/29xxx/CVE-2021-29438.json
 create mode 100644 2021/29xxx/CVE-2021-29439.json
 create mode 100644 2021/29xxx/CVE-2021-29440.json
 create mode 100644 2021/29xxx/CVE-2021-29441.json
 create mode 100644 2021/29xxx/CVE-2021-29442.json
 create mode 100644 2021/29xxx/CVE-2021-29443.json
 create mode 100644 2021/29xxx/CVE-2021-29444.json
 create mode 100644 2021/29xxx/CVE-2021-29445.json
 create mode 100644 2021/29xxx/CVE-2021-29446.json
 create mode 100644 2021/29xxx/CVE-2021-29447.json
 create mode 100644 2021/29xxx/CVE-2021-29629.json
 create mode 100644 2021/29xxx/CVE-2021-29630.json
 create mode 100644 2021/29xxx/CVE-2021-29631.json
 create mode 100644 2021/29xxx/CVE-2021-29632.json
 create mode 100644 2021/29xxx/CVE-2021-29633.json
 create mode 100644 2021/29xxx/CVE-2021-29634.json
 create mode 100644 2021/29xxx/CVE-2021-29635.json
 create mode 100644 2021/29xxx/CVE-2021-29636.json
 create mode 100644 2021/29xxx/CVE-2021-29637.json
 create mode 100644 2021/29xxx/CVE-2021-29638.json
 create mode 100644 2021/29xxx/CVE-2021-29639.json
 create mode 100644 2021/29xxx/CVE-2021-29640.json
 create mode 100644 2021/29xxx/CVE-2021-29641.json

diff --git a/2020/35xxx/CVE-2020-35774.json b/2020/35xxx/CVE-2020-35774.json
index 0ca1ecc3393..959d3da64fc 100644
--- a/2020/35xxx/CVE-2020-35774.json
+++ b/2020/35xxx/CVE-2020-35774.json
@@ -61,6 +61,11 @@
                 "url": "https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0",
                 "refsource": "MISC",
                 "name": "https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4287",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4287"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21412.json b/2021/21xxx/CVE-2021-21412.json
index 9b57f531651..bcd05fafc29 100644
--- a/2021/21xxx/CVE-2021-21412.json
+++ b/2021/21xxx/CVE-2021-21412.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Potential for arbitrary code execution in npm package @thi.ng/egf `#gpg`-tagged property values (only if `decrypt: true` option is enabled). \nPR with patch has been submitted and will has been released as of v0.4.0\nBy default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env).\nHowever, if GPG encrypted values are used/required:\n1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\\`) chars in the encrypted value string\n2. Replace/remove them or skip parsing if present."
+                "value": "Potential for arbitrary code execution in npm package @thi.ng/egf `#gpg`-tagged property values (only if `decrypt: true` option is enabled). PR with patch has been submitted and will has been released as of v0.4.0 By default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\\`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present."
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26579.json b/2021/26xxx/CVE-2021-26579.json
index 72679c4b783..51299c4a105 100644
--- a/2021/26xxx/CVE-2021-26579.json
+++ b/2021/26xxx/CVE-2021-26579.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26579",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "HPE Unified Data Management (UDM)",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Versions 1.2009.0 and 1.2101.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "local disclosure of privileged information"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu04112en_us",
+                "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu04112en_us"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A security vulnerability in HPE Unified Data Management (UDM) could allow the local disclosure of privileged information (CWE-321: Use of Hard-coded Cryptographic Key in a product). HPE has provided updates to versions 1.2009.0 and 1.2101.0 of HPE Unified Data Management (UDM). Version 1.2103.0 of HPE Unified Data Management (UDM) removes all hard-coded cryptographic keys."
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29426.json b/2021/29xxx/CVE-2021-29426.json
new file mode 100644
index 00000000000..976faf745c1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29426.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29426",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29427.json b/2021/29xxx/CVE-2021-29427.json
new file mode 100644
index 00000000000..d4c5f92ba18
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29427.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29427",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29428.json b/2021/29xxx/CVE-2021-29428.json
new file mode 100644
index 00000000000..82f3ada6155
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29428.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29428",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29429.json b/2021/29xxx/CVE-2021-29429.json
new file mode 100644
index 00000000000..72b330a47a9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29429.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29429",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29430.json b/2021/29xxx/CVE-2021-29430.json
new file mode 100644
index 00000000000..581335e3773
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29430.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29430",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29431.json b/2021/29xxx/CVE-2021-29431.json
new file mode 100644
index 00000000000..c966323ad69
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29431.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29431",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29432.json b/2021/29xxx/CVE-2021-29432.json
new file mode 100644
index 00000000000..6020ba656b1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29432.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29432",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29433.json b/2021/29xxx/CVE-2021-29433.json
new file mode 100644
index 00000000000..391d834fe6b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29433.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29433",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29434.json b/2021/29xxx/CVE-2021-29434.json
new file mode 100644
index 00000000000..655bd1a0af9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29434.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29434",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29435.json b/2021/29xxx/CVE-2021-29435.json
new file mode 100644
index 00000000000..e6da3ca5340
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29435.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29435",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29436.json b/2021/29xxx/CVE-2021-29436.json
new file mode 100644
index 00000000000..15ed5b8b359
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29436.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29436",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29437.json b/2021/29xxx/CVE-2021-29437.json
new file mode 100644
index 00000000000..d9b306b5abd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29437.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29437",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29438.json b/2021/29xxx/CVE-2021-29438.json
new file mode 100644
index 00000000000..7896ddcb423
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29438.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29438",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29439.json b/2021/29xxx/CVE-2021-29439.json
new file mode 100644
index 00000000000..17477fcb081
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29439.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29439",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29440.json b/2021/29xxx/CVE-2021-29440.json
new file mode 100644
index 00000000000..593b5b0253b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29440.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29440",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29441.json b/2021/29xxx/CVE-2021-29441.json
new file mode 100644
index 00000000000..0d1bb29458f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29441.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29441",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29442.json b/2021/29xxx/CVE-2021-29442.json
new file mode 100644
index 00000000000..f6e33426809
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29442.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29442",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29443.json b/2021/29xxx/CVE-2021-29443.json
new file mode 100644
index 00000000000..e3973fc6138
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29443.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29443",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29444.json b/2021/29xxx/CVE-2021-29444.json
new file mode 100644
index 00000000000..7fe6ed0c47f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29444.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29444",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29445.json b/2021/29xxx/CVE-2021-29445.json
new file mode 100644
index 00000000000..3d6d0d77a6d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29445.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29445",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29446.json b/2021/29xxx/CVE-2021-29446.json
new file mode 100644
index 00000000000..b241f99c556
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29446.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29446",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29447.json b/2021/29xxx/CVE-2021-29447.json
new file mode 100644
index 00000000000..ce7de9801b7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29447.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29447",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29629.json b/2021/29xxx/CVE-2021-29629.json
new file mode 100644
index 00000000000..15350337b01
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29629.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29629",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29630.json b/2021/29xxx/CVE-2021-29630.json
new file mode 100644
index 00000000000..e7398d61f69
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29630.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29630",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29631.json b/2021/29xxx/CVE-2021-29631.json
new file mode 100644
index 00000000000..6f417b2800a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29631.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29631",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29632.json b/2021/29xxx/CVE-2021-29632.json
new file mode 100644
index 00000000000..a36ed5e58a4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29632.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29632",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29633.json b/2021/29xxx/CVE-2021-29633.json
new file mode 100644
index 00000000000..e31b749cce5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29633.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29633",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29634.json b/2021/29xxx/CVE-2021-29634.json
new file mode 100644
index 00000000000..99eb3567090
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29634.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29634",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29635.json b/2021/29xxx/CVE-2021-29635.json
new file mode 100644
index 00000000000..0e2e200d909
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29635.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29635",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29636.json b/2021/29xxx/CVE-2021-29636.json
new file mode 100644
index 00000000000..0d59678f744
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29636.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29636",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29637.json b/2021/29xxx/CVE-2021-29637.json
new file mode 100644
index 00000000000..61a4dbb6c3d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29637.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29637",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29638.json b/2021/29xxx/CVE-2021-29638.json
new file mode 100644
index 00000000000..29eb4475890
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29638.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29638",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29639.json b/2021/29xxx/CVE-2021-29639.json
new file mode 100644
index 00000000000..03c1c781f51
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29639.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29639",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29640.json b/2021/29xxx/CVE-2021-29640.json
new file mode 100644
index 00000000000..9f45fa5a71c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29640.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29640",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29641.json b/2021/29xxx/CVE-2021-29641.json
new file mode 100644
index 00000000000..cad2eead6f9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29641.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29641",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3474.json b/2021/3xxx/CVE-2021-3474.json
index 245363c2f3e..4bf30aa3337 100644
--- a/2021/3xxx/CVE-2021-3474.json
+++ b/2021/3xxx/CVE-2021-3474.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3474",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-190"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939142",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939142"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3475.json b/2021/3xxx/CVE-2021-3475.json
index 676e852ccfa..46c618d792f 100644
--- a/2021/3xxx/CVE-2021-3475.json
+++ b/2021/3xxx/CVE-2021-3475.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3475",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-190"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939144",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939144"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3476.json b/2021/3xxx/CVE-2021-3476.json
index fbe722edc6e..0b883304a9c 100644
--- a/2021/3xxx/CVE-2021-3476.json
+++ b/2021/3xxx/CVE-2021-3476.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3476",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-190"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939145",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939145"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability."
             }
         ]
     }

From 560d6dfb9b39697d9e608bd0d891bcd3a0778324 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 18:01:24 +0000
Subject: [PATCH 772/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29448.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29449.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29450.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29451.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29452.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29453.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29454.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29455.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29456.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29457.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29458.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29459.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29460.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29461.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29462.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29463.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29464.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29465.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29466.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29467.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29468.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29469.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29470.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29471.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29472.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29473.json | 18 ++++++++++++++++++
 26 files changed, 468 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29448.json
 create mode 100644 2021/29xxx/CVE-2021-29449.json
 create mode 100644 2021/29xxx/CVE-2021-29450.json
 create mode 100644 2021/29xxx/CVE-2021-29451.json
 create mode 100644 2021/29xxx/CVE-2021-29452.json
 create mode 100644 2021/29xxx/CVE-2021-29453.json
 create mode 100644 2021/29xxx/CVE-2021-29454.json
 create mode 100644 2021/29xxx/CVE-2021-29455.json
 create mode 100644 2021/29xxx/CVE-2021-29456.json
 create mode 100644 2021/29xxx/CVE-2021-29457.json
 create mode 100644 2021/29xxx/CVE-2021-29458.json
 create mode 100644 2021/29xxx/CVE-2021-29459.json
 create mode 100644 2021/29xxx/CVE-2021-29460.json
 create mode 100644 2021/29xxx/CVE-2021-29461.json
 create mode 100644 2021/29xxx/CVE-2021-29462.json
 create mode 100644 2021/29xxx/CVE-2021-29463.json
 create mode 100644 2021/29xxx/CVE-2021-29464.json
 create mode 100644 2021/29xxx/CVE-2021-29465.json
 create mode 100644 2021/29xxx/CVE-2021-29466.json
 create mode 100644 2021/29xxx/CVE-2021-29467.json
 create mode 100644 2021/29xxx/CVE-2021-29468.json
 create mode 100644 2021/29xxx/CVE-2021-29469.json
 create mode 100644 2021/29xxx/CVE-2021-29470.json
 create mode 100644 2021/29xxx/CVE-2021-29471.json
 create mode 100644 2021/29xxx/CVE-2021-29472.json
 create mode 100644 2021/29xxx/CVE-2021-29473.json

diff --git a/2021/29xxx/CVE-2021-29448.json b/2021/29xxx/CVE-2021-29448.json
new file mode 100644
index 00000000000..2997c6f4b1c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29448.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29448",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29449.json b/2021/29xxx/CVE-2021-29449.json
new file mode 100644
index 00000000000..dcf552f4f27
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29449.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29449",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29450.json b/2021/29xxx/CVE-2021-29450.json
new file mode 100644
index 00000000000..e1377149d7f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29450.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29450",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29451.json b/2021/29xxx/CVE-2021-29451.json
new file mode 100644
index 00000000000..fabc268854f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29451.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29451",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29452.json b/2021/29xxx/CVE-2021-29452.json
new file mode 100644
index 00000000000..b13f71b99da
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29452.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29452",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29453.json b/2021/29xxx/CVE-2021-29453.json
new file mode 100644
index 00000000000..239cef919dc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29453.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29453",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29454.json b/2021/29xxx/CVE-2021-29454.json
new file mode 100644
index 00000000000..48a990c6adf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29454.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29454",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29455.json b/2021/29xxx/CVE-2021-29455.json
new file mode 100644
index 00000000000..41e032597bc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29455.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29455",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29456.json b/2021/29xxx/CVE-2021-29456.json
new file mode 100644
index 00000000000..1344e90fabf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29456.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29456",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29457.json b/2021/29xxx/CVE-2021-29457.json
new file mode 100644
index 00000000000..5ef0bd4a4be
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29457.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29457",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29458.json b/2021/29xxx/CVE-2021-29458.json
new file mode 100644
index 00000000000..29a8fdeb6fb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29458.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29458",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29459.json b/2021/29xxx/CVE-2021-29459.json
new file mode 100644
index 00000000000..ce8f792406a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29459.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29459",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29460.json b/2021/29xxx/CVE-2021-29460.json
new file mode 100644
index 00000000000..9de00901c4e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29460.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29460",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29461.json b/2021/29xxx/CVE-2021-29461.json
new file mode 100644
index 00000000000..08653bc1a26
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29461.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29461",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29462.json b/2021/29xxx/CVE-2021-29462.json
new file mode 100644
index 00000000000..aafdf69b733
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29462.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29462",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29463.json b/2021/29xxx/CVE-2021-29463.json
new file mode 100644
index 00000000000..42708c36b81
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29463.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29463",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29464.json b/2021/29xxx/CVE-2021-29464.json
new file mode 100644
index 00000000000..855ba829bd3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29464.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29464",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29465.json b/2021/29xxx/CVE-2021-29465.json
new file mode 100644
index 00000000000..9a6c81a9c5b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29465.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29465",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29466.json b/2021/29xxx/CVE-2021-29466.json
new file mode 100644
index 00000000000..142d023d9ca
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29466.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29466",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29467.json b/2021/29xxx/CVE-2021-29467.json
new file mode 100644
index 00000000000..b88a1d09a40
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29467.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29467",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29468.json b/2021/29xxx/CVE-2021-29468.json
new file mode 100644
index 00000000000..fe3c7d7a134
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29468.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29468",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29469.json b/2021/29xxx/CVE-2021-29469.json
new file mode 100644
index 00000000000..62c84550419
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29469.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29469",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29470.json b/2021/29xxx/CVE-2021-29470.json
new file mode 100644
index 00000000000..fc090d9dadb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29470.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29470",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29471.json b/2021/29xxx/CVE-2021-29471.json
new file mode 100644
index 00000000000..1927f581ecd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29471.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29471",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29472.json b/2021/29xxx/CVE-2021-29472.json
new file mode 100644
index 00000000000..8cf86abd3d1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29472.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29472",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29473.json b/2021/29xxx/CVE-2021-29473.json
new file mode 100644
index 00000000000..104f00f3e66
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29473.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29473",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 70b30e048543aaecf4fbbf2a2d9bcdb3708a5f0a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 19:00:46 +0000
Subject: [PATCH 773/845] "-Synchronized-Data."

---
 2020/26xxx/CVE-2020-26275.json |  5 +++
 2021/23xxx/CVE-2021-23326.json |  7 +++-
 2021/26xxx/CVE-2021-26276.json |  5 +++
 2021/29xxx/CVE-2021-29642.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29643.json | 18 +++++++++
 2021/3xxx/CVE-2021-3477.json   | 18 +++++++++
 2021/3xxx/CVE-2021-3478.json   | 18 +++++++++
 2021/3xxx/CVE-2021-3479.json   | 18 +++++++++
 2021/3xxx/CVE-2021-3480.json   | 18 +++++++++
 9 files changed, 173 insertions(+), 1 deletion(-)
 create mode 100644 2021/29xxx/CVE-2021-29642.json
 create mode 100644 2021/29xxx/CVE-2021-29643.json
 create mode 100644 2021/3xxx/CVE-2021-3477.json
 create mode 100644 2021/3xxx/CVE-2021-3478.json
 create mode 100644 2021/3xxx/CVE-2021-3479.json
 create mode 100644 2021/3xxx/CVE-2021-3480.json

diff --git a/2020/26xxx/CVE-2020-26275.json b/2020/26xxx/CVE-2020-26275.json
index 36f5049d009..56f93bb3dee 100644
--- a/2020/26xxx/CVE-2020-26275.json
+++ b/2020/26xxx/CVE-2020-26275.json
@@ -83,6 +83,11 @@
                 "name": "https://pypi.org/project/jupyter-server/",
                 "refsource": "MISC",
                 "url": "https://pypi.org/project/jupyter-server/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4291",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4291"
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23326.json b/2021/23xxx/CVE-2021-23326.json
index 8b57f26141b..c1095f7fc52 100644
--- a/2021/23xxx/CVE-2021-23326.json
+++ b/2021/23xxx/CVE-2021-23326.json
@@ -66,6 +66,11 @@
                 "refsource": "MISC",
                 "url": "https://github.com/ardatan/graphql-tools/releases/tag/%40graphql-tools%2Fgit-loader%406.2.6",
                 "name": "https://github.com/ardatan/graphql-tools/releases/tag/%40graphql-tools%2Fgit-loader%406.2.6"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4300",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4300"
             }
         ]
     },
@@ -99,4 +104,4 @@
             "value": "Dotan Simha"
         }
     ]
-}
+}
\ No newline at end of file
diff --git a/2021/26xxx/CVE-2021-26276.json b/2021/26xxx/CVE-2021-26276.json
index ab9c9ec545c..0ff2c93dea2 100644
--- a/2021/26xxx/CVE-2021-26276.json
+++ b/2021/26xxx/CVE-2021-26276.json
@@ -56,6 +56,11 @@
                 "url": "https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6",
                 "refsource": "MISC",
                 "name": "https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2021-4773",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2021-4773"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29642.json b/2021/29xxx/CVE-2021-29642.json
new file mode 100644
index 00000000000..1c834bf8d4d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29642.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29642",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "GistPad before 0.2.7 allows a crafted workspace folder to change the URL for the Gist API, which leads to leakage of GitHub access tokens."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://vuln.ryotak.me/advisories/7.txt",
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/7.txt"
+            },
+            {
+                "url": "https://github.com/lostintangent/gistpad/commit/230b05e8dea8d7ac5aae998bbe0a591d7f081b70",
+                "refsource": "MISC",
+                "name": "https://github.com/lostintangent/gistpad/commit/230b05e8dea8d7ac5aae998bbe0a591d7f081b70"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29643.json b/2021/29xxx/CVE-2021-29643.json
new file mode 100644
index 00000000000..aacee526d46
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29643.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29643",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3477.json b/2021/3xxx/CVE-2021-3477.json
new file mode 100644
index 00000000000..31ee90a7239
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3477.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3477",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3478.json b/2021/3xxx/CVE-2021-3478.json
new file mode 100644
index 00000000000..0132379121f
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3478.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3478",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3479.json b/2021/3xxx/CVE-2021-3479.json
new file mode 100644
index 00000000000..2db0fa93673
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3479.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3479",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3480.json b/2021/3xxx/CVE-2021-3480.json
new file mode 100644
index 00000000000..a58bcb60cac
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3480.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3480",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From cb8f9e8ca74ed43b346a55af7e60700d94034ca9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 20:00:38 +0000
Subject: [PATCH 774/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26541.json |  5 +++++
 2021/29xxx/CVE-2021-29644.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29645.json | 18 ++++++++++++++++++
 3 files changed, 41 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29644.json
 create mode 100644 2021/29xxx/CVE-2021-29645.json

diff --git a/2021/26xxx/CVE-2021-26541.json b/2021/26xxx/CVE-2021-26541.json
index 300946738ac..281a56829b6 100644
--- a/2021/26xxx/CVE-2021-26541.json
+++ b/2021/26xxx/CVE-2021-26541.json
@@ -61,6 +61,11 @@
                 "url": "https://www.npmjs.com/package/gitlog",
                 "refsource": "MISC",
                 "name": "https://www.npmjs.com/package/gitlog"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4301",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4301"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29644.json b/2021/29xxx/CVE-2021-29644.json
new file mode 100644
index 00000000000..d3fa3d735fb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29644.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29644",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29645.json b/2021/29xxx/CVE-2021-29645.json
new file mode 100644
index 00000000000..e042ff73a2c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29645.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29645",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 55bbcbe79b913f83d14b64593380e2ded884a45f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 21:00:40 +0000
Subject: [PATCH 775/845] "-Synchronized-Data."

---
 2020/11xxx/CVE-2020-11984.json | 45 +++++++++++++++++++++++
 2020/11xxx/CVE-2020-11993.json | 15 ++++++++
 2020/13xxx/CVE-2020-13942.json |  5 +++
 2020/24xxx/CVE-2020-24391.json | 61 ++++++++++++++++++++++++++++---
 2020/27xxx/CVE-2020-27783.json |  5 +++
 2021/29xxx/CVE-2021-29646.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29647.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29648.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29649.json | 67 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29650.json | 67 ++++++++++++++++++++++++++++++++++
 10 files changed, 460 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29646.json
 create mode 100644 2021/29xxx/CVE-2021-29647.json
 create mode 100644 2021/29xxx/CVE-2021-29648.json
 create mode 100644 2021/29xxx/CVE-2021-29649.json
 create mode 100644 2021/29xxx/CVE-2021-29650.json

diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json
index 6c32a0defa2..69c11222c66 100644
--- a/2020/11xxx/CVE-2020-11984.json
+++ b/2020/11xxx/CVE-2020-11984.json
@@ -153,6 +153,51 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
                 "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
+                "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/",
+                "url": "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
+                "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml",
+                "url": "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073171 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-11984.json security/json/CVE-2020-11993.json security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888228 - in /httpd/site/trunk/content/security/json: CVE-2020-11984.json CVE-2020-11993.json",
+                "url": "https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json
index b2376274f31..a925b508e6d 100644
--- a/2020/11xxx/CVE-2020-11993.json
+++ b/2020/11xxx/CVE-2020-11993.json
@@ -153,6 +153,21 @@
                 "refsource": "MLIST",
                 "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
                 "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
+                "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1073171 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-11984.json security/json/CVE-2020-11993.json security/vulnerabilities_24.html",
+                "url": "https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9@%3Ccvs.httpd.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[httpd-cvs] 20210330 svn commit: r1888228 - in /httpd/site/trunk/content/security/json: CVE-2020-11984.json CVE-2020-11993.json",
+                "url": "https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255@%3Ccvs.httpd.apache.org%3E"
             }
         ]
     },
diff --git a/2020/13xxx/CVE-2020-13942.json b/2020/13xxx/CVE-2020-13942.json
index a42bf7be379..7f72113e7ab 100644
--- a/2020/13xxx/CVE-2020-13942.json
+++ b/2020/13xxx/CVE-2020-13942.json
@@ -92,6 +92,11 @@
                 "refsource": "MLIST",
                 "name": "[announce] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi",
                 "url": "https://lists.apache.org/thread.html/r08a4057ff7196b8880117edaa4b6207cbd36ed692d8dd1f5a56b4d0f@%3Cannounce.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4284",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4284"
             }
         ]
     },
diff --git a/2020/24xxx/CVE-2020-24391.json b/2020/24xxx/CVE-2020-24391.json
index ed37670c14e..eb7a5b66116 100644
--- a/2020/24xxx/CVE-2020-24391.json
+++ b/2020/24xxx/CVE-2020-24391.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-24391",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-24391",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a",
+                "refsource": "MISC",
+                "name": "https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/mongodb-js/query-parser/issues/16",
+                "url": "https://github.com/mongodb-js/query-parser/issues/16"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27783.json b/2020/27xxx/CVE-2020-27783.json
index b4dd2f972ef..d9211630562 100644
--- a/2020/27xxx/CVE-2020-27783.json
+++ b/2020/27xxx/CVE-2020-27783.json
@@ -68,6 +68,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2020-307946cfb6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4286",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4286"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29646.json b/2021/29xxx/CVE-2021-29646.json
new file mode 100644
index 00000000000..3ea750d8beb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29646.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29646",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, aka CID-0217ed2848e8."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0217ed2848e8538bcf9172d97ed2eeb4a26041bb",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0217ed2848e8538bcf9172d97ed2eeb4a26041bb"
+            },
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29647.json b/2021/29xxx/CVE-2021-29647.json
new file mode 100644
index 00000000000..9f45e763ab1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29647.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29647",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11"
+            },
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29648.json b/2021/29xxx/CVE-2021-29648.json
new file mode 100644
index 00000000000..87ae378e1db
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29648.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29648",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11"
+            },
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29649.json b/2021/29xxx/CVE-2021-29649.json
new file mode 100644
index 00000000000..c195d1e1f8e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29649.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29649",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.11. The user mode driver (UMD) has a copy_process() memory leak, related to a lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c, aka CID-f60a85cad677."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11"
+            },
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29650.json b/2021/29xxx/CVE-2021-29650.json
new file mode 100644
index 00000000000..81ba76e6d7a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29650.json
@@ -0,0 +1,67 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29650",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11"
+            },
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
+            }
+        ]
+    }
+}
\ No newline at end of file

From c016ea62820292671e3bd75bb8883377b4c89c90 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 22:00:40 +0000
Subject: [PATCH 776/845] "-Synchronized-Data."

---
 2020/14xxx/CVE-2020-14042.json |  5 +++
 2020/14xxx/CVE-2020-14043.json |  5 +++
 2020/14xxx/CVE-2020-14044.json |  5 +++
 2020/15xxx/CVE-2020-15275.json |  5 +++
 2020/24xxx/CVE-2020-24995.json | 71 +++++++++++++++++++++++++++++++---
 2020/26xxx/CVE-2020-26935.json |  5 +++
 2020/6xxx/CVE-2020-6802.json   |  5 +++
 7 files changed, 95 insertions(+), 6 deletions(-)

diff --git a/2020/14xxx/CVE-2020-14042.json b/2020/14xxx/CVE-2020-14042.json
index 4c57e185867..07ae26b68ca 100644
--- a/2020/14xxx/CVE-2020-14042.json
+++ b/2020/14xxx/CVE-2020-14042.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/Codiad/Codiad/issues/1122",
                 "url": "https://github.com/Codiad/Codiad/issues/1122"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4278",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4278"
             }
         ]
     }
diff --git a/2020/14xxx/CVE-2020-14043.json b/2020/14xxx/CVE-2020-14043.json
index 8fe6ea4b682..db96476477f 100644
--- a/2020/14xxx/CVE-2020-14043.json
+++ b/2020/14xxx/CVE-2020-14043.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/Codiad/Codiad/issues/1122",
                 "url": "https://github.com/Codiad/Codiad/issues/1122"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4279",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4279"
             }
         ]
     }
diff --git a/2020/14xxx/CVE-2020-14044.json b/2020/14xxx/CVE-2020-14044.json
index ccd848a16c5..d1ba114b3fa 100644
--- a/2020/14xxx/CVE-2020-14044.json
+++ b/2020/14xxx/CVE-2020-14044.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/Codiad/Codiad/issues/1122",
                 "url": "https://github.com/Codiad/Codiad/issues/1122"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4280",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4280"
             }
         ]
     }
diff --git a/2020/15xxx/CVE-2020-15275.json b/2020/15xxx/CVE-2020-15275.json
index 18aabf3b47c..6e6c05648cc 100644
--- a/2020/15xxx/CVE-2020-15275.json
+++ b/2020/15xxx/CVE-2020-15275.json
@@ -83,6 +83,11 @@
                 "name": "https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2",
                 "refsource": "MISC",
                 "url": "https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4285",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4285"
             }
         ]
     },
diff --git a/2020/24xxx/CVE-2020-24995.json b/2020/24xxx/CVE-2020-24995.json
index bebe84e6ff7..27ceaa43ba4 100644
--- a/2020/24xxx/CVE-2020-24995.json
+++ b/2020/24xxx/CVE-2020-24995.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-24995",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-24995",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Buffer overflow vulnerability in sniff_channel_order function in aacdec_template.c in ffmpeg 3.1.2, allows attackers to execute arbitrary code (local)."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://trac.ffmpeg.org/ticket/8845",
+                "refsource": "MISC",
+                "name": "https://trac.ffmpeg.org/ticket/8845"
+            },
+            {
+                "url": "https://trac.ffmpeg.org/ticket/8859",
+                "refsource": "MISC",
+                "name": "https://trac.ffmpeg.org/ticket/8859"
+            },
+            {
+                "url": "https://trac.ffmpeg.org/ticket/8860",
+                "refsource": "MISC",
+                "name": "https://trac.ffmpeg.org/ticket/8860"
+            },
+            {
+                "url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d6f293353c94c7ce200f6e0975ae3de49787f91f",
+                "refsource": "MISC",
+                "name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d6f293353c94c7ce200f6e0975ae3de49787f91f"
             }
         ]
     }
diff --git a/2020/26xxx/CVE-2020-26935.json b/2020/26xxx/CVE-2020-26935.json
index 36370a07303..57bc915c5f6 100644
--- a/2020/26xxx/CVE-2020-26935.json
+++ b/2020/26xxx/CVE-2020-26935.json
@@ -91,6 +91,11 @@
                 "refsource": "GENTOO",
                 "name": "GLSA-202101-35",
                 "url": "https://security.gentoo.org/glsa/202101-35"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4281",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4281"
             }
         ]
     }
diff --git a/2020/6xxx/CVE-2020-6802.json b/2020/6xxx/CVE-2020-6802.json
index 5afcf3a0e3f..fa443310ed7 100644
--- a/2020/6xxx/CVE-2020-6802.json
+++ b/2020/6xxx/CVE-2020-6802.json
@@ -68,6 +68,11 @@
                 "refsource": "MISC",
                 "name": "https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach",
                 "url": "https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4276",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4276"
             }
         ]
     },

From 2c1c613e98af8494718cf8aaf03459aa540739ec Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Tue, 30 Mar 2021 15:22:41 -0700
Subject: [PATCH 777/845] Add CVE-2021-21413 for GHSA-mmhj-4w6j-76h7

---
 2021/21xxx/CVE-2021-21413.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21413.json b/2021/21xxx/CVE-2021-21413.json
index 8adbeee6e76..6d60ab1f423 100644
--- a/2021/21xxx/CVE-2021-21413.json
+++ b/2021/21xxx/CVE-2021-21413.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21413",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "isolated-vm",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 4.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "laverdet"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "isolated-vm is a library for nodejs which gives you access to v8's Isolate interface.\nVersions of isolated-vm before v4.0.0 have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.\n\nReference objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker they would be able to use it to acquire a Reference to the nodejs context's Function object.\n\nSimilar application-specific attacks could be possible by modifying the local prototype of other API objects.\n\nAccess to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution.\n\nThis is addressed in v4.0.0 through a series of related changes."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "ADJACENT_NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 8,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "{\"CWE-913\":\"Improper Control of Dynamically-Managed Code Resources\"}"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7"
+            },
+            {
+                "name": "https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15",
+                "refsource": "MISC",
+                "url": "https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15"
+            },
+            {
+                "name": "https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704",
+                "refsource": "MISC",
+                "url": "https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704"
+            },
+            {
+                "name": "https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400",
+                "refsource": "MISC",
+                "url": "https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-mmhj-4w6j-76h7",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 32261b23b893bdc3b1a9eaf75ed4411aeb637d5a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Tue, 30 Mar 2021 23:00:44 +0000
Subject: [PATCH 778/845] "-Synchronized-Data."

---
 2016/10xxx/CVE-2016-10703.json |  5 +++++
 2017/14xxx/CVE-2017-14077.json |  5 +++++
 2019/17xxx/CVE-2019-17564.json |  5 +++++
 2020/36xxx/CVE-2020-36284.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36285.json | 18 ++++++++++++++++++
 2020/6xxx/CVE-2020-6816.json   |  5 +++++
 2021/21xxx/CVE-2021-21413.json |  2 +-
 7 files changed, 57 insertions(+), 1 deletion(-)
 create mode 100644 2020/36xxx/CVE-2020-36284.json
 create mode 100644 2020/36xxx/CVE-2020-36285.json

diff --git a/2016/10xxx/CVE-2016-10703.json b/2016/10xxx/CVE-2016-10703.json
index 34ce13d19dc..48d04845b7f 100644
--- a/2016/10xxx/CVE-2016-10703.json
+++ b/2016/10xxx/CVE-2016-10703.json
@@ -61,6 +61,11 @@
                 "name": "https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01",
                 "refsource": "MISC",
                 "url": "https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2016-4450",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2016-4450"
             }
         ]
     }
diff --git a/2017/14xxx/CVE-2017-14077.json b/2017/14xxx/CVE-2017-14077.json
index d1854a7d9c3..384af5b322d 100644
--- a/2017/14xxx/CVE-2017-14077.json
+++ b/2017/14xxx/CVE-2017-14077.json
@@ -56,6 +56,11 @@
                 "name": "https://www.checkmarx.com/advisories/html-injection-securimage/",
                 "refsource": "MISC",
                 "url": "https://www.checkmarx.com/advisories/html-injection-securimage/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2017-4223",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2017-4223"
             }
         ]
     }
diff --git a/2019/17xxx/CVE-2019-17564.json b/2019/17xxx/CVE-2019-17564.json
index 7ef9af926be..de984765afa 100644
--- a/2019/17xxx/CVE-2019-17564.json
+++ b/2019/17xxx/CVE-2019-17564.json
@@ -54,6 +54,11 @@
                 "refsource": "MISC",
                 "name": "https://lists.apache.org/thread.html/r13f7a58fa5d61d729e538a378687118e00c3e229903ba1e7b3a807a2%40%3Cdev.dubbo.apache.org%3E",
                 "url": "https://lists.apache.org/thread.html/r13f7a58fa5d61d729e538a378687118e00c3e229903ba1e7b3a807a2%40%3Cdev.dubbo.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4275",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4275"
             }
         ]
     },
diff --git a/2020/36xxx/CVE-2020-36284.json b/2020/36xxx/CVE-2020-36284.json
new file mode 100644
index 00000000000..8015b184778
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36284.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36284",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36285.json b/2020/36xxx/CVE-2020-36285.json
new file mode 100644
index 00000000000..d07849f3424
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36285.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36285",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/6xxx/CVE-2020-6816.json b/2020/6xxx/CVE-2020-6816.json
index f587cbb4926..5422953ea6b 100644
--- a/2020/6xxx/CVE-2020-6816.json
+++ b/2020/6xxx/CVE-2020-6816.json
@@ -58,6 +58,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2020-e0f35d634c",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EDQU2SZLZMSSACCBUBJ6NOSRNNBDYFW5/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4277",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4277"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21413.json b/2021/21xxx/CVE-2021-21413.json
index 6d60ab1f423..9064fa066c2 100644
--- a/2021/21xxx/CVE-2021-21413.json
+++ b/2021/21xxx/CVE-2021-21413.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "isolated-vm is a library for nodejs which gives you access to v8's Isolate interface.\nVersions of isolated-vm before v4.0.0 have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.\n\nReference objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker they would be able to use it to acquire a Reference to the nodejs context's Function object.\n\nSimilar application-specific attacks could be possible by modifying the local prototype of other API objects.\n\nAccess to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution.\n\nThis is addressed in v4.0.0 through a series of related changes."
+                "value": "isolated-vm is a library for nodejs which gives you access to v8's Isolate interface. Versions of isolated-vm before v4.0.0 have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. Reference objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker they would be able to use it to acquire a Reference to the nodejs context's Function object. Similar application-specific attacks could be possible by modifying the local prototype of other API objects. Access to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution. This is addressed in v4.0.0 through a series of related changes."
             }
         ]
     },

From aa29242560aa614440798b344e200456f192969c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 00:00:42 +0000
Subject: [PATCH 779/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27170.json | 5 +++++
 2020/27xxx/CVE-2020-27171.json | 5 +++++
 2021/26xxx/CVE-2021-26930.json | 5 +++++
 2021/26xxx/CVE-2021-26931.json | 5 +++++
 2021/26xxx/CVE-2021-26932.json | 5 +++++
 2021/27xxx/CVE-2021-27363.json | 5 +++++
 2021/27xxx/CVE-2021-27364.json | 5 +++++
 2021/27xxx/CVE-2021-27365.json | 5 +++++
 2021/28xxx/CVE-2021-28038.json | 5 +++++
 2021/28xxx/CVE-2021-28660.json | 5 +++++
 2021/29xxx/CVE-2021-29376.json | 5 +++++
 2021/3xxx/CVE-2021-3348.json   | 5 +++++
 12 files changed, 60 insertions(+)

diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json
index a034e9a6a2b..a1a5cf3ca38 100644
--- a/2020/27xxx/CVE-2020-27170.json
+++ b/2020/27xxx/CVE-2020-27170.json
@@ -86,6 +86,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-9503fffad9",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json
index ff0de7c9ff7..86f499e9471 100644
--- a/2020/27xxx/CVE-2020-27171.json
+++ b/2020/27xxx/CVE-2020-27171.json
@@ -86,6 +86,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-9503fffad9",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26930.json b/2021/26xxx/CVE-2021-26930.json
index 034aa0deb69..7417b219df9 100644
--- a/2021/26xxx/CVE-2021-26930.json
+++ b/2021/26xxx/CVE-2021-26930.json
@@ -76,6 +76,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
                 "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26931.json b/2021/26xxx/CVE-2021-26931.json
index d224b6f3462..b1390567492 100644
--- a/2021/26xxx/CVE-2021-26931.json
+++ b/2021/26xxx/CVE-2021-26931.json
@@ -76,6 +76,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
                 "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26932.json b/2021/26xxx/CVE-2021-26932.json
index 61ca54c1216..47d5caceaeb 100644
--- a/2021/26xxx/CVE-2021-26932.json
+++ b/2021/26xxx/CVE-2021-26932.json
@@ -76,6 +76,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210326-0001/",
                 "url": "https://security.netapp.com/advisory/ntap-20210326-0001/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27363.json b/2021/27xxx/CVE-2021-27363.json
index 001d7b31f90..7f8169a4121 100644
--- a/2021/27xxx/CVE-2021-27363.json
+++ b/2021/27xxx/CVE-2021-27363.json
@@ -76,6 +76,11 @@
                 "refsource": "MISC",
                 "name": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html",
                 "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27364.json b/2021/27xxx/CVE-2021-27364.json
index 86a6fc68735..62942a1d480 100644
--- a/2021/27xxx/CVE-2021-27364.json
+++ b/2021/27xxx/CVE-2021-27364.json
@@ -76,6 +76,11 @@
                 "refsource": "MISC",
                 "name": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html",
                 "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27365.json b/2021/27xxx/CVE-2021-27365.json
index ecd31266ad2..5cb2c5646ec 100644
--- a/2021/27xxx/CVE-2021-27365.json
+++ b/2021/27xxx/CVE-2021-27365.json
@@ -81,6 +81,11 @@
                 "refsource": "MISC",
                 "name": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html",
                 "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28038.json b/2021/28xxx/CVE-2021-28038.json
index 49a9ff05895..53823ca4033 100644
--- a/2021/28xxx/CVE-2021-28038.json
+++ b/2021/28xxx/CVE-2021-28038.json
@@ -66,6 +66,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28660.json b/2021/28xxx/CVE-2021-28660.json
index 5c28da436f3..c8cfa0c00ae 100644
--- a/2021/28xxx/CVE-2021-28660.json
+++ b/2021/28xxx/CVE-2021-28660.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-bb755ed5e3",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29376.json b/2021/29xxx/CVE-2021-29376.json
index be9e0fbfb2d..9646f9c1c54 100644
--- a/2021/29xxx/CVE-2021-29376.json
+++ b/2021/29xxx/CVE-2021-29376.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "http://www.eterna.com.au/ircii/",
                 "url": "http://www.eterna.com.au/ircii/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210330 Re: Remote DoS Vulnerability in bitchx, ircii < 20210314 and scrollz",
+                "url": "http://www.openwall.com/lists/oss-security/2021/03/30/4"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3348.json b/2021/3xxx/CVE-2021-3348.json
index a63328f0612..b9445f1b20a 100644
--- a/2021/3xxx/CVE-2021-3348.json
+++ b/2021/3xxx/CVE-2021-3348.json
@@ -66,6 +66,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq",
                 "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
             }
         ]
     }

From 7c83ba594a4f31d6c6d897a59a5ba5489eb20745 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 02:00:38 +0000
Subject: [PATCH 780/845] "-Synchronized-Data."

---
 2020/1xxx/CVE-2020-1946.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/1xxx/CVE-2020-1946.json b/2020/1xxx/CVE-2020-1946.json
index 9fb4ca0130e..62166d5602a 100644
--- a/2020/1xxx/CVE-2020-1946.json
+++ b/2020/1xxx/CVE-2020-1946.json
@@ -74,6 +74,11 @@
                 "refsource": "DEBIAN",
                 "name": "DSA-4879",
                 "url": "https://www.debian.org/security/2021/dsa-4879"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-bf06dcffa8",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V2SBVTKVLFFT36ECJQ7TQ7KAQCQZDRZ/"
             }
         ]
     },

From 7b71f11faef2db280bbe450b004fbf9d8398969e Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 03:00:38 +0000
Subject: [PATCH 781/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28831.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2021/28xxx/CVE-2021-28831.json b/2021/28xxx/CVE-2021-28831.json
index 252a224ab7d..54eff32ae0b 100644
--- a/2021/28xxx/CVE-2021-28831.json
+++ b/2021/28xxx/CVE-2021-28831.json
@@ -61,6 +61,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-e82915eee1",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-d20c8a4730",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/"
             }
         ]
     },

From f6ec5b582e18a43b2eb49e4ef613e953905d0173 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 06:00:39 +0000
Subject: [PATCH 782/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29651.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29652.json | 18 ++++++++++++++++++
 2 files changed, 36 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29651.json
 create mode 100644 2021/29xxx/CVE-2021-29652.json

diff --git a/2021/29xxx/CVE-2021-29651.json b/2021/29xxx/CVE-2021-29651.json
new file mode 100644
index 00000000000..f4e5adc7847
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29651.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29651",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29652.json b/2021/29xxx/CVE-2021-29652.json
new file mode 100644
index 00000000000..aa9dc4c8715
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29652.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29652",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 65a792f75138af4ca78154bf8b7146af673724fd Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 07:00:40 +0000
Subject: [PATCH 783/845] "-Synchronized-Data."

---
 2020/27xxx/CVE-2020-27216.json |  5 +++++
 2021/29xxx/CVE-2021-29653.json | 18 ++++++++++++++++++
 2 files changed, 23 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29653.json

diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json
index 7ea543aa7b0..f5b596a1b7f 100644
--- a/2020/27xxx/CVE-2020-27216.json
+++ b/2020/27xxx/CVE-2020-27216.json
@@ -565,6 +565,11 @@
                 "refsource": "MLIST",
                 "name": "[beam-issues] 20210330 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
                 "url": "https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[beam-issues] 20210331 [jira] [Work logged] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
+                "url": "https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29653.json b/2021/29xxx/CVE-2021-29653.json
new file mode 100644
index 00000000000..ee4cdef1b5f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29653.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29653",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 46dc3bfa1b5f1de866fcca9050e892cce60b11df Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Wed, 31 Mar 2021 08:33:16 +0100
Subject: [PATCH 784/845] Add CVE-2021-28657

---
 2021/28xxx/CVE-2021-28657.json | 81 ++++++++++++++++++++++++++++++----
 1 file changed, 73 insertions(+), 8 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28657.json b/2021/28xxx/CVE-2021-28657.json
index bfab20e03d1..8b0a9d9592a 100644
--- a/2021/28xxx/CVE-2021-28657.json
+++ b/2021/28xxx/CVE-2021-28657.json
@@ -1,18 +1,83 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-28657",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "READY",
+        "TITLE": "Infinite loop in Apache Tika's MP3 parser"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache Tika",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_name": "Apache Tika",
+                                            "version_value": "1.26"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Apache Tika would like to thank Khaled Nassar for reporting this issue."
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later."
             }
         ]
-    }
-}
\ No newline at end of file
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-835 Infinite Loop"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
+    },
+    "work_around": [
+        {
+            "lang": "eng",
+            "value": "Users should upgrade to 1.26 or later."
+        }
+    ]
+}

From 9268c633abff16640cd4b3a37a38b4a88e356df0 Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Wed, 31 Mar 2021 08:33:52 +0100
Subject: [PATCH 785/845] Fix state

---
 2021/28xxx/CVE-2021-28657.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2021/28xxx/CVE-2021-28657.json b/2021/28xxx/CVE-2021-28657.json
index 8b0a9d9592a..6f61e7cd590 100644
--- a/2021/28xxx/CVE-2021-28657.json
+++ b/2021/28xxx/CVE-2021-28657.json
@@ -2,7 +2,7 @@
     "CVE_data_meta": {
         "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-28657",
-        "STATE": "READY",
+        "STATE": "PUBLIC",
         "TITLE": "Infinite loop in Apache Tika's MP3 parser"
     },
     "affects": {

From 388e5c19a7c9b3c878450c23887942a3243abe5f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 08:00:40 +0000
Subject: [PATCH 786/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28657.json | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28657.json b/2021/28xxx/CVE-2021-28657.json
index 6f61e7cd590..d4ad6e65482 100644
--- a/2021/28xxx/CVE-2021-28657.json
+++ b/2021/28xxx/CVE-2021-28657.json
@@ -66,8 +66,9 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E"
+                "refsource": "MISC",
+                "url": "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E",
+                "name": "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E"
             }
         ]
     },
@@ -80,4 +81,4 @@
             "value": "Users should upgrade to 1.26 or later."
         }
     ]
-}
+}
\ No newline at end of file

From f0d612dcaadec396f22e66abc7223e0fd57a1707 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 09:00:40 +0000
Subject: [PATCH 787/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 4be136e244b..880cd761b0a 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -163,6 +163,16 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-issues] 20210330 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210331 [jira] [Assigned] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210331 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E"
             }
         ]
     },

From 253cfba2ddc9fdcb6789a48562633b7f55ced69c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 10:00:38 +0000
Subject: [PATCH 788/845] "-Synchronized-Data."

---
 2020/12xxx/CVE-2020-12497.json |  5 +++++
 2021/21xxx/CVE-2021-21295.json | 20 ++++++++++++++++++++
 2 files changed, 25 insertions(+)

diff --git a/2020/12xxx/CVE-2020-12497.json b/2020/12xxx/CVE-2020-12497.json
index 00dbf46b5eb..26e4736d4b5 100644
--- a/2020/12xxx/CVE-2020-12497.json
+++ b/2020/12xxx/CVE-2020-12497.json
@@ -99,6 +99,11 @@
                 "refsource": "MISC",
                 "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-825/",
                 "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-825/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-398/",
+                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-398/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 880cd761b0a..4d129b8be3e 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -173,6 +173,26 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-issues] 20210331 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] ayushmantri opened a new pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210331 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210331 [GitHub] [kafka] dongjinleekr commented on pull request #10448: KAFKA-12583: Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210331 [GitHub] [kafka] dongjinleekr opened a new pull request #10448: KAFKA-12583: Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E"
             }
         ]
     },

From d4772a5e208b7f299ae4efa14721a89dbfaef2b0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 12:00:43 +0000
Subject: [PATCH 789/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 4d129b8be3e..52ff3d43240 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -193,6 +193,16 @@
                 "refsource": "MLIST",
                 "name": "[kafka-jira] 20210331 [GitHub] [kafka] dongjinleekr opened a new pull request #10448: KAFKA-12583: Upgrade of netty-codec due to CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] arshadmohammad commented on pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E",
+                "url": "https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E"
             }
         ]
     },

From b1b7162c663a9b395beb43b812e70702ebf5518c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 13:00:39 +0000
Subject: [PATCH 790/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28172.json | 71 +++++++++++++++++++++++++++++++---
 2020/28xxx/CVE-2020-28173.json | 71 +++++++++++++++++++++++++++++++---
 2020/36xxx/CVE-2020-36277.json |  5 +++
 2020/36xxx/CVE-2020-36278.json |  5 +++
 2020/36xxx/CVE-2020-36279.json |  5 +++
 2020/36xxx/CVE-2020-36281.json |  5 +++
 2021/21xxx/CVE-2021-21295.json |  5 +++
 7 files changed, 155 insertions(+), 12 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28172.json b/2020/28xxx/CVE-2020-28172.json
index 5f1d6da4f25..02c61e9ae7c 100644
--- a/2020/28xxx/CVE-2020-28172.json
+++ b/2020/28xxx/CVE-2020-28172.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-28172",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-28172",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A SQL injection vulnerability in Simple College Website 1.0 allows remote unauthenticated attackers to bypass the admin authentication mechanism in college_website/admin/ajax.php?action=login, thus gaining access to the website administrative panel."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://dl.packetstormsecurity.net/2010-exploits/simplecollegewebsite10-sqlexec.txt",
+                "refsource": "MISC",
+                "name": "https://dl.packetstormsecurity.net/2010-exploits/simplecollegewebsite10-sqlexec.txt"
+            },
+            {
+                "url": "https://www.sourcecodester.com/php/14548/simple-college-website-using-htmlphpmysqli-source-code.html",
+                "refsource": "MISC",
+                "name": "https://www.sourcecodester.com/php/14548/simple-college-website-using-htmlphpmysqli-source-code.html"
+            },
+            {
+                "url": "https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip",
+                "refsource": "MISC",
+                "name": "https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip"
+            },
+            {
+                "url": "https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py",
+                "refsource": "MISC",
+                "name": "https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py"
             }
         ]
     }
diff --git a/2020/28xxx/CVE-2020-28173.json b/2020/28xxx/CVE-2020-28173.json
index e36f8625c32..70c95c518db 100644
--- a/2020/28xxx/CVE-2020-28173.json
+++ b/2020/28xxx/CVE-2020-28173.json
@@ -1,17 +1,76 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-28173",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-28173",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Simple College Website 1.0 allows a user to conduct remote code execution via /alumni/admin/ajax.php?action=save_settings when uploading a malicious file using the image upload functionality, which is stored in /alumni/admin/assets/uploads/."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://dl.packetstormsecurity.net/2010-exploits/simplecollegewebsite10-sqlexec.txt",
+                "refsource": "MISC",
+                "name": "https://dl.packetstormsecurity.net/2010-exploits/simplecollegewebsite10-sqlexec.txt"
+            },
+            {
+                "url": "https://www.sourcecodester.com/php/14548/simple-college-website-using-htmlphpmysqli-source-code.html",
+                "refsource": "MISC",
+                "name": "https://www.sourcecodester.com/php/14548/simple-college-website-using-htmlphpmysqli-source-code.html"
+            },
+            {
+                "url": "https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip",
+                "refsource": "MISC",
+                "name": "https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip"
+            },
+            {
+                "url": "https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py",
+                "refsource": "MISC",
+                "name": "https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36277.json b/2020/36xxx/CVE-2020-36277.json
index 2d1380dd452..58df77b069d 100644
--- a/2020/36xxx/CVE-2020-36277.json
+++ b/2020/36xxx/CVE-2020-36277.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0",
                 "refsource": "MISC",
                 "name": "https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36278.json b/2020/36xxx/CVE-2020-36278.json
index f4bf4944623..d7cc09ed92c 100644
--- a/2020/36xxx/CVE-2020-36278.json
+++ b/2020/36xxx/CVE-2020-36278.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842",
                 "refsource": "MISC",
                 "name": "https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36279.json b/2020/36xxx/CVE-2020-36279.json
index 0bcae086db6..af9b40dcb62 100644
--- a/2020/36xxx/CVE-2020-36279.json
+++ b/2020/36xxx/CVE-2020-36279.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4",
                 "refsource": "MISC",
                 "name": "https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36281.json b/2020/36xxx/CVE-2020-36281.json
index 87e804e4282..ff69914e690 100644
--- a/2020/36xxx/CVE-2020-36281.json
+++ b/2020/36xxx/CVE-2020-36281.json
@@ -66,6 +66,11 @@
                 "url": "https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5",
                 "refsource": "MISC",
                 "name": "https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2612-1] leptonlib security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html"
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 52ff3d43240..ebf5e5844a6 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -203,6 +203,11 @@
                 "refsource": "MISC",
                 "name": "https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E",
                 "url": "https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] eolivelli commented on pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E"
             }
         ]
     },

From 3259168ab6e15ec64d3b7e032a9c0ec9c6857330 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 14:00:39 +0000
Subject: [PATCH 791/845] "-Synchronized-Data."

---
 2020/28xxx/CVE-2020-28243.json |  5 ++
 2020/28xxx/CVE-2020-28972.json |  5 ++
 2020/35xxx/CVE-2020-35662.json |  5 ++
 2021/20xxx/CVE-2021-20227.json |  5 ++
 2021/21xxx/CVE-2021-21295.json |  5 ++
 2021/21xxx/CVE-2021-21309.json |  5 ++
 2021/21xxx/CVE-2021-21773.json | 50 +++++++++++++++++--
 2021/23xxx/CVE-2021-23840.json |  5 ++
 2021/23xxx/CVE-2021-23841.json |  5 ++
 2021/23xxx/CVE-2021-23981.json | 88 ++++++++++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23982.json | 88 ++++++++++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23983.json | 56 ++++++++++++++++++++--
 2021/23xxx/CVE-2021-23984.json | 88 ++++++++++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23985.json | 56 ++++++++++++++++++++--
 2021/23xxx/CVE-2021-23986.json | 56 ++++++++++++++++++++--
 2021/23xxx/CVE-2021-23987.json | 88 ++++++++++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23988.json | 56 ++++++++++++++++++++--
 2021/25xxx/CVE-2021-25281.json |  5 ++
 2021/25xxx/CVE-2021-25282.json |  5 ++
 2021/25xxx/CVE-2021-25283.json |  5 ++
 2021/25xxx/CVE-2021-25284.json |  5 ++
 2021/28xxx/CVE-2021-28245.json | 56 +++++++++++++++++++---
 2021/3xxx/CVE-2021-3144.json   |  5 ++
 2021/3xxx/CVE-2021-3148.json   |  5 ++
 2021/3xxx/CVE-2021-3197.json   |  5 ++
 2021/3xxx/CVE-2021-3449.json   |  5 ++
 2021/3xxx/CVE-2021-3450.json   |  5 ++
 2021/3xxx/CVE-2021-3470.json   | 50 +++++++++++++++++--
 2021/3xxx/CVE-2021-3477.json   | 55 +++++++++++++++++++--
 2021/3xxx/CVE-2021-3478.json   | 55 +++++++++++++++++++--
 2021/3xxx/CVE-2021-3479.json   | 55 +++++++++++++++++++--
 31 files changed, 937 insertions(+), 45 deletions(-)

diff --git a/2020/28xxx/CVE-2020-28243.json b/2020/28xxx/CVE-2020-28243.json
index 63454488edb..419cc97f7fd 100644
--- a/2020/28xxx/CVE-2020-28243.json
+++ b/2020/28xxx/CVE-2020-28243.json
@@ -81,6 +81,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2020/28xxx/CVE-2020-28972.json b/2020/28xxx/CVE-2020-28972.json
index 66aba89452c..9bdec434190 100644
--- a/2020/28xxx/CVE-2020-28972.json
+++ b/2020/28xxx/CVE-2020-28972.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35662.json b/2020/35xxx/CVE-2020-35662.json
index 1a26299e06f..f6f161cf72e 100644
--- a/2020/35xxx/CVE-2020-35662.json
+++ b/2020/35xxx/CVE-2020-35662.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     },
diff --git a/2021/20xxx/CVE-2021-20227.json b/2021/20xxx/CVE-2021-20227.json
index ab8835bb7b6..3ba51d07700 100644
--- a/2021/20xxx/CVE-2021-20227.json
+++ b/2021/20xxx/CVE-2021-20227.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://www.sqlite.org/releaselog/3_34_1.html",
                 "url": "https://www.sqlite.org/releaselog/3_34_1.html"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-04",
+                "url": "https://security.gentoo.org/glsa/202103-04"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index ebf5e5844a6..047e96a5d21 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -208,6 +208,11 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] eolivelli commented on pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] ayushmantri opened a new pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21309.json b/2021/21xxx/CVE-2021-21309.json
index 315871ebca9..94f6d4a538b 100644
--- a/2021/21xxx/CVE-2021-21309.json
+++ b/2021/21xxx/CVE-2021-21309.json
@@ -86,6 +86,11 @@
                 "name": "https://github.com/redis/redis/pull/8522",
                 "refsource": "MISC",
                 "url": "https://github.com/redis/redis/pull/8522"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-02",
+                "url": "https://security.gentoo.org/glsa/202103-02"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21773.json b/2021/21xxx/CVE-2021-21773.json
index c1c0c2d0c1e..e168cbba56a 100644
--- a/2021/21xxx/CVE-2021-21773.json
+++ b/2021/21xxx/CVE-2021-21773.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21773",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "talos-cna@cisco.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Accusoft",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Accusoft ImageGear 19.8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "out of bounds write"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1227",
+                "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1227"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An out-of-bounds write vulnerability exists in the TIFF header count-processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23840.json b/2021/23xxx/CVE-2021-23840.json
index ec5432b0a38..d3caa148e06 100644
--- a/2021/23xxx/CVE-2021-23840.json
+++ b/2021/23xxx/CVE-2021-23840.json
@@ -99,6 +99,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-03",
                 "url": "https://www.tenable.com/security/tns-2021-03"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-03",
+                "url": "https://security.gentoo.org/glsa/202103-03"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23841.json b/2021/23xxx/CVE-2021-23841.json
index f825046ad84..d7d840d3c1a 100644
--- a/2021/23xxx/CVE-2021-23841.json
+++ b/2021/23xxx/CVE-2021-23841.json
@@ -99,6 +99,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-03",
                 "url": "https://www.tenable.com/security/tns-2021-03"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-03",
+                "url": "https://security.gentoo.org/glsa/202103-03"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23981.json b/2021/23xxx/CVE-2021-23981.json
index f9aa416728d..056584d0032 100644
--- a/2021/23xxx/CVE-2021-23981.json
+++ b/2021/23xxx/CVE-2021-23981.json
@@ -4,14 +4,96 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23981",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox ESR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Thunderbird",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Texture upload into an unbound backing buffer resulted in an out-of-bound read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-12/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-12/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-11/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-11/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692832",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692832"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23982.json b/2021/23xxx/CVE-2021-23982.json
index 6e31e11917c..cc834690a60 100644
--- a/2021/23xxx/CVE-2021-23982.json
+++ b/2021/23xxx/CVE-2021-23982.json
@@ -4,14 +4,96 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23982",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox ESR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Thunderbird",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Internal network hosts could have been probed by a malicious webpage"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-12/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-12/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-11/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-11/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1677046",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1677046"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23983.json b/2021/23xxx/CVE-2021-23983.json
index 4af3a2bdf36..bd6b455b96c 100644
--- a/2021/23xxx/CVE-2021-23983.json
+++ b/2021/23xxx/CVE-2021-23983.json
@@ -4,14 +4,64 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23983",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Transitions for invalid ::marker properties resulted in memory corruption"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692684",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692684"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "By causing a transition on a parent node by removing a CSS rule, an invalid property for a marker could have been applied, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23984.json b/2021/23xxx/CVE-2021-23984.json
index c5dd1e35a38..97994def6bf 100644
--- a/2021/23xxx/CVE-2021-23984.json
+++ b/2021/23xxx/CVE-2021-23984.json
@@ -4,14 +4,96 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23984",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox ESR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Thunderbird",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Malicious extensions could have spoofed popup information"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-12/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-12/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-11/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-11/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1693664",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1693664"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23985.json b/2021/23xxx/CVE-2021-23985.json
index c9cbcad7cb3..99cedf50024 100644
--- a/2021/23xxx/CVE-2021-23985.json
+++ b/2021/23xxx/CVE-2021-23985.json
@@ -4,14 +4,64 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23985",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Devtools remote debugging feature could have been enabled without indication to the user"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1659129",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1659129"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "If an attacker is able to alter specific about:config values (for example malware running on the user's computer), the Devtools remote debugging feature could have been enabled in a way that was unnoticable to the user. This would have allowed a remote attacker (able to make a direct network connection to the victim) to monitor the user's browsing activity and (plaintext) network traffic. This was addressed by providing a visual cue when Devtools has an open network socket. This vulnerability affects Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23986.json b/2021/23xxx/CVE-2021-23986.json
index 1d3d1a1aeef..bc5442274b3 100644
--- a/2021/23xxx/CVE-2021-23986.json
+++ b/2021/23xxx/CVE-2021-23986.json
@@ -4,14 +4,64 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23986",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "A malicious extension could have performed credential-less same origin policy violations"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692623",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692623"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23987.json b/2021/23xxx/CVE-2021-23987.json
index b9593a5b4a9..02dca130b89 100644
--- a/2021/23xxx/CVE-2021-23987.json
+++ b/2021/23xxx/CVE-2021-23987.json
@@ -4,14 +4,96 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23987",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox ESR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Thunderbird",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "78.9",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-12/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-12/"
+            },
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-11/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-11/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1513519%2C1683439%2C1690169%2C1690718",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1513519%2C1683439%2C1690169%2C1690718"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23988.json b/2021/23xxx/CVE-2021-23988.json
index 8c788af4297..91aa73762d2 100644
--- a/2021/23xxx/CVE-2021-23988.json
+++ b/2021/23xxx/CVE-2021-23988.json
@@ -4,14 +4,64 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23988",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@mozilla.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "Mozilla",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Firefox",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "87",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Memory safety bugs fixed in Firefox 87"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.mozilla.org/security/advisories/mfsa2021-10/",
+                "refsource": "MISC",
+                "name": "https://www.mozilla.org/security/advisories/mfsa2021-10/"
+            },
+            {
+                "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1684994%2C1686653",
+                "refsource": "MISC",
+                "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1684994%2C1686653"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 87."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25281.json b/2021/25xxx/CVE-2021-25281.json
index 3607414384a..2459bc19e0f 100644
--- a/2021/25xxx/CVE-2021-25281.json
+++ b/2021/25xxx/CVE-2021-25281.json
@@ -81,6 +81,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25282.json b/2021/25xxx/CVE-2021-25282.json
index e1fe6b4d794..262650be5da 100644
--- a/2021/25xxx/CVE-2021-25282.json
+++ b/2021/25xxx/CVE-2021-25282.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25283.json b/2021/25xxx/CVE-2021-25283.json
index 85406db16cf..2daebf0759e 100644
--- a/2021/25xxx/CVE-2021-25283.json
+++ b/2021/25xxx/CVE-2021-25283.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25284.json b/2021/25xxx/CVE-2021-25284.json
index 656455ea1b5..fe3b1ce316d 100644
--- a/2021/25xxx/CVE-2021-25284.json
+++ b/2021/25xxx/CVE-2021-25284.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28245.json b/2021/28xxx/CVE-2021-28245.json
index 8c01e28f634..659e3bdda2a 100644
--- a/2021/28xxx/CVE-2021-28245.json
+++ b/2021/28xxx/CVE-2021-28245.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28245",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28245",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "PbootCMS 3.0.4 contains a SQL injection vulnerability through index.php via the search parameter that can reveal sensitive information through adding an admin account."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/M40k1n9/vulner/issues/1",
+                "refsource": "MISC",
+                "name": "https://github.com/M40k1n9/vulner/issues/1"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3144.json b/2021/3xxx/CVE-2021-3144.json
index ed7ce187841..ba1e0ca0849 100644
--- a/2021/3xxx/CVE-2021-3144.json
+++ b/2021/3xxx/CVE-2021-3144.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3148.json b/2021/3xxx/CVE-2021-3148.json
index 33b3373f625..8538bdf2023 100644
--- a/2021/3xxx/CVE-2021-3148.json
+++ b/2021/3xxx/CVE-2021-3148.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3197.json b/2021/3xxx/CVE-2021-3197.json
index 9a8ac581bf5..2530728f2a5 100644
--- a/2021/3xxx/CVE-2021-3197.json
+++ b/2021/3xxx/CVE-2021-3197.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-43eb5584ad",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-01",
+                "url": "https://security.gentoo.org/glsa/202103-01"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index 359e042fed3..f537155b0e8 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -116,6 +116,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-03",
+                "url": "https://security.gentoo.org/glsa/202103-03"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 29d40d4833b..921c846018c 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -111,6 +111,11 @@
                 "refsource": "MLIST",
                 "name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
                 "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4"
+            },
+            {
+                "refsource": "GENTOO",
+                "name": "GLSA-202103-03",
+                "url": "https://security.gentoo.org/glsa/202103-03"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3470.json b/2021/3xxx/CVE-2021-3470.json
index eba385e6521..03b769ee779 100644
--- a/2021/3xxx/CVE-2021-3470.json
+++ b/2021/3xxx/CVE-2021-3470.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3470",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "redis",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "redis 5.0.10, redis 6.0.9, redis 6.2.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-119"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1943623",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943623"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3477.json b/2021/3xxx/CVE-2021-3477.json
index 31ee90a7239..2a8eff2e634 100644
--- a/2021/3xxx/CVE-2021-3477.json
+++ b/2021/3xxx/CVE-2021-3477.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3477",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-190->CWE-125"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939159",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939159"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3478.json b/2021/3xxx/CVE-2021-3478.json
index 0132379121f..900f7ed4a28 100644
--- a/2021/3xxx/CVE-2021-3478.json
+++ b/2021/3xxx/CVE-2021-3478.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3478",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939160",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939160"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3479.json b/2021/3xxx/CVE-2021-3479.json
index 2db0fa93673..a9e66284013 100644
--- a/2021/3xxx/CVE-2021-3479.json
+++ b/2021/3xxx/CVE-2021-3479.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3479",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939149",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939149"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability."
             }
         ]
     }

From 4788c9ddf6fd4f3cd5b88ba539e913bbb4946d62 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 14:00:53 +0000
Subject: [PATCH 792/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21776.json | 50 ++++++++++++++++++++++++++++++++--
 1 file changed, 47 insertions(+), 3 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21776.json b/2021/21xxx/CVE-2021-21776.json
index eade6c6bc92..876e67adf33 100644
--- a/2021/21xxx/CVE-2021-21776.json
+++ b/2021/21xxx/CVE-2021-21776.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21776",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "talos-cna@cisco.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Accusoft",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Accusoft ImageGear Accusoft ImageGear 19.8."
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "out of bounds write"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1232",
+                "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1232"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An out-of-bounds write vulnerability exists in the SGI Format Buffer Size Processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability."
             }
         ]
     }

From 673c2fa2dd08fd800713f36164ff4b277d2fd6c2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 14:01:07 +0000
Subject: [PATCH 793/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21782.json | 50 ++++++++++++++++++++++++++++++++--
 1 file changed, 47 insertions(+), 3 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21782.json b/2021/21xxx/CVE-2021-21782.json
index 45efaf12c70..9aa569ca0e6 100644
--- a/2021/21xxx/CVE-2021-21782.json
+++ b/2021/21xxx/CVE-2021-21782.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21782",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "talos-cna@cisco.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Accusoft",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Accusoft ImageGear Accusoft ImageGear 19.8"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "out of bounds write"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1244",
+                "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1244"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An out-of-bounds write vulnerability exists in the SGI format buffer size processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability."
             }
         ]
     }

From e1bcf9618effdfd7cb1b589898a29be56fbbee87 Mon Sep 17 00:00:00 2001
From: snyk-security-bot <66014823+snyk-security-bot@users.noreply.github.com>
Date: Wed, 31 Mar 2021 17:24:12 +0300
Subject: [PATCH 794/845] Adds CVE-2021-23348

---
 2021/23xxx/CVE-2021-23348.json | 88 ++++++++++++++++++++++++++++++++--
 1 file changed, 84 insertions(+), 4 deletions(-)

diff --git a/2021/23xxx/CVE-2021-23348.json b/2021/23xxx/CVE-2021-23348.json
index 64d15ef0e4b..a5204616db0 100644
--- a/2021/23xxx/CVE-2021-23348.json
+++ b/2021/23xxx/CVE-2021-23348.json
@@ -3,16 +3,96 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "report@snyk.io",
+        "DATE_PUBLIC": "2021-03-31T14:24:10.046969Z",
         "ID": "CVE-2021-23348",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Arbitrary Command Injection"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "portprocesses",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "1.0.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Arbitrary Command Injection"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm"
+            },
+            {
+                "refsource": "CONFIRM",
+                "url": "https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "This affects the package portprocesses before 1.0.5.\n If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\n"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "version": "3.1",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P",
+            "baseScore": 6.3,
+            "baseSeverity": "MEDIUM",
+            "attackVector": "NETWORK",
+            "attackComplexity": "LOW",
+            "privilegesRequired": "LOW",
+            "userInteraction": "NONE",
+            "scope": "UNCHANGED",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "availabilityImpact": "LOW"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "OmniTaint"
+        }
+    ]
 }
\ No newline at end of file

From 49e9e413a4a3d45c82021e52999139d36534910c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 15:00:41 +0000
Subject: [PATCH 795/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json | 35 ++++++++++++++++++++++
 2021/22xxx/CVE-2021-22986.json | 53 ++++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22988.json | 50 ++++++++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23348.json | 22 ++++++++------
 4 files changed, 145 insertions(+), 15 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 047e96a5d21..085f35574d2 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -213,6 +213,41 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] ayushmantri opened a new pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] arshadmohammad commented on pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] arshadmohammad closed pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] asfgit closed pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-commits] 20210331 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-commits] 20210331 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E",
+                "url": "https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-commits] 20210331 [zookeeper] branch master updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/22xxx/CVE-2021-22986.json b/2021/22xxx/CVE-2021-22986.json
index b6600538695..25fb819fca3 100644
--- a/2021/22xxx/CVE-2021-22986.json
+++ b/2021/22xxx/CVE-2021-22986.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22986",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP; BIG-IQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "BIG-IP 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3"
+                                        },
+                                        {
+                                            "version_value": "BIG-IQ 7.1.0.x before 7.1.0.3, 7.0.0.x before 7.0.0.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Remote Command Execution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K03009991",
+                "url": "https://support.f5.com/csp/article/K03009991"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22988.json b/2021/22xxx/CVE-2021-22988.json
index 8a42a0f75fe..9a6e24d342e 100644
--- a/2021/22xxx/CVE-2021-22988.json
+++ b/2021/22xxx/CVE-2021-22988.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22988",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "RCE"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K70031188",
+                "url": "https://support.f5.com/csp/article/K70031188"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, TMUI, also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23348.json b/2021/23xxx/CVE-2021-23348.json
index a5204616db0..d1dd55ed3d9 100644
--- a/2021/23xxx/CVE-2021-23348.json
+++ b/2021/23xxx/CVE-2021-23348.json
@@ -48,20 +48,24 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536"
+                "refsource": "MISC",
+                "url": "https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536",
+                "name": "https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23"
+                "refsource": "MISC",
+                "url": "https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23",
+                "name": "https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm"
+                "refsource": "MISC",
+                "url": "https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm",
+                "name": "https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm"
             },
             {
-                "refsource": "CONFIRM",
-                "url": "https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1"
+                "refsource": "MISC",
+                "url": "https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1",
+                "name": "https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1"
             }
         ]
     },
@@ -69,7 +73,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "This affects the package portprocesses before 1.0.5.\n If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\n"
+                "value": "This affects the package portprocesses before 1.0.5. If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization."
             }
         ]
     },

From 20581c963088a7fd3839bd9dcf2e44a4d62f0a32 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 17:00:40 +0000
Subject: [PATCH 796/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22987.json | 50 +++++++++++++++++++++--
 2021/22xxx/CVE-2021-22989.json | 50 +++++++++++++++++++++--
 2021/22xxx/CVE-2021-22990.json | 50 +++++++++++++++++++++--
 2021/22xxx/CVE-2021-22992.json | 50 +++++++++++++++++++++--
 2021/22xxx/CVE-2021-22995.json | 50 +++++++++++++++++++++--
 2021/29xxx/CVE-2021-29654.json | 18 +++++++++
 2021/29xxx/CVE-2021-29655.json | 18 +++++++++
 2021/29xxx/CVE-2021-29656.json | 18 +++++++++
 2021/29xxx/CVE-2021-29657.json | 18 +++++++++
 2021/29xxx/CVE-2021-29658.json | 72 ++++++++++++++++++++++++++++++++++
 10 files changed, 379 insertions(+), 15 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29654.json
 create mode 100644 2021/29xxx/CVE-2021-29655.json
 create mode 100644 2021/29xxx/CVE-2021-29656.json
 create mode 100644 2021/29xxx/CVE-2021-29657.json
 create mode 100644 2021/29xxx/CVE-2021-29658.json

diff --git a/2021/22xxx/CVE-2021-22987.json b/2021/22xxx/CVE-2021-22987.json
index c5be4298608..a4a5e15df38 100644
--- a/2021/22xxx/CVE-2021-22987.json
+++ b/2021/22xxx/CVE-2021-22987.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22987",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP Appliance Mode",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Remote Command Execution"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K18132488",
+                "url": "https://support.f5.com/csp/article/K18132488"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3 when running in Appliance mode, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22989.json b/2021/22xxx/CVE-2021-22989.json
index 8c6157c64d4..e54f7eb247c 100644
--- a/2021/22xxx/CVE-2021-22989.json
+++ b/2021/22xxx/CVE-2021-22989.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22989",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP Advanced WAF or BIG-IP ASM in Appliance Mode",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "RCE"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K56142644",
+                "url": "https://support.f5.com/csp/article/K56142644"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, when running in Appliance mode with Advanced WAF or BIG-IP ASM provisioned, the TMUI, also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22990.json b/2021/22xxx/CVE-2021-22990.json
index de118611da2..996ab76f417 100644
--- a/2021/22xxx/CVE-2021-22990.json
+++ b/2021/22xxx/CVE-2021-22990.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22990",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP Advanced WAF or BIG-IP ASM",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "RCE"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K45056101",
+                "url": "https://support.f5.com/csp/article/K45056101"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, on systems with Advanced WAF or BIG-IP ASM provisioned, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22992.json b/2021/22xxx/CVE-2021-22992.json
index 9b2b9e20d65..cb06d52267f 100644
--- a/2021/22xxx/CVE-2021-22992.json
+++ b/2021/22xxx/CVE-2021-22992.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22992",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP Advanced WAF and BIG-IP ASM",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "RCE"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K52510511",
+                "url": "https://support.f5.com/csp/article/K52510511"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, a malicious HTTP response to an Advanced WAF/BIG-IP ASM virtual server with Login Page configured in its policy may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may allow remote code execution (RCE), leading to complete system compromise. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22995.json b/2021/22xxx/CVE-2021-22995.json
index af66ce528f1..c78afe557f3 100644
--- a/2021/22xxx/CVE-2021-22995.json
+++ b/2021/22xxx/CVE-2021-22995.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22995",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All 7.x and 6.x versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K13155201",
+                "url": "https://support.f5.com/csp/article/K13155201"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ high availability (HA) when using a Quorum device for automatic failover does not implement any form of authentication with the Corosync daemon. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29654.json b/2021/29xxx/CVE-2021-29654.json
new file mode 100644
index 00000000000..1e365b9b15a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29654.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29654",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29655.json b/2021/29xxx/CVE-2021-29655.json
new file mode 100644
index 00000000000..6ddceed21e3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29655.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29655",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29656.json b/2021/29xxx/CVE-2021-29656.json
new file mode 100644
index 00000000000..c40d183864b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29656.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29656",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29657.json b/2021/29xxx/CVE-2021-29657.json
new file mode 100644
index 00000000000..7b0c06ede8e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29657.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29657",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29658.json b/2021/29xxx/CVE-2021-29658.json
new file mode 100644
index 00000000000..2869d20d1c6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29658.json
@@ -0,0 +1,72 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29658",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The unofficial vscode-rufo extension before 0.0.4 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace folder."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/jnbt/vscode-rufo/commit/bc0d212436f76d12cbdab287802fa5bc743f818a",
+                "refsource": "MISC",
+                "name": "https://github.com/jnbt/vscode-rufo/commit/bc0d212436f76d12cbdab287802fa5bc743f818a"
+            },
+            {
+                "url": "https://marketplace.visualstudio.com/items/jnbt.vscode-rufo/changelog",
+                "refsource": "MISC",
+                "name": "https://marketplace.visualstudio.com/items/jnbt.vscode-rufo/changelog"
+            },
+            {
+                "url": "https://vuln.ryotak.me/advisories/8.txt",
+                "refsource": "MISC",
+                "name": "https://vuln.ryotak.me/advisories/8.txt"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 07c06dd4822f964454ad41dd4bc2756347fef156 Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Wed, 31 Mar 2021 10:31:18 -0700
Subject: [PATCH 797/845] Add CVE-2021-21418 for GHSA-vwfx-hh3w-fj99

---
 2021/21xxx/CVE-2021-21418.json | 92 +++++++++++++++++++++++++++++++---
 1 file changed, 86 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21418.json b/2021/21xxx/CVE-2021-21418.json
index 6725e10255d..f0ee622dc46 100644
--- a/2021/21xxx/CVE-2021-21418.json
+++ b/2021/21xxx/CVE-2021-21418.json
@@ -1,18 +1,98 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21418",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Potential XSS injection in the newsletter conditions field"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ps_emailsubscription",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 2.6.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "PrestaShop"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "ps_emailsubscription is a newsletter subscription module for the PrestaShop platform. An employee can inject javascript in the newsletter condition field that will then be executed on the front office\n\nThe issue has been fixed in 2.6.1"
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "NONE",
+            "baseScore": 4.6,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "{\"CWE-79\":\"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99"
+            },
+            {
+                "name": "https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70",
+                "refsource": "MISC",
+                "url": "https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70"
+            },
+            {
+                "name": "https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1",
+                "refsource": "MISC",
+                "url": "https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1"
+            },
+            {
+                "name": "https://packagist.org/packages/prestashop/ps_emailsubscription",
+                "refsource": "MISC",
+                "url": "https://packagist.org/packages/prestashop/ps_emailsubscription"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-vwfx-hh3w-fj99",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 443255d99d6c27b889e11b8463d16e3d98902f1b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 18:00:41 +0000
Subject: [PATCH 798/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json | 10 ++++++
 2021/21xxx/CVE-2021-21418.json |  2 +-
 2021/21xxx/CVE-2021-21975.json | 50 +++++++++++++++++++++++++--
 2021/21xxx/CVE-2021-21983.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22991.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22993.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22994.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22996.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22997.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22998.json | 50 +++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22999.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23000.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23001.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23002.json | 53 +++++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23003.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23004.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23005.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23006.json | 50 +++++++++++++++++++++++++--
 2021/23xxx/CVE-2021-23007.json | 50 +++++++++++++++++++++++++--
 2021/29xxx/CVE-2021-29659.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29660.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29661.json | 18 ++++++++++
 2021/29xxx/CVE-2021-29662.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29663.json | 18 ++++++++++
 24 files changed, 947 insertions(+), 52 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29659.json
 create mode 100644 2021/29xxx/CVE-2021-29660.json
 create mode 100644 2021/29xxx/CVE-2021-29661.json
 create mode 100644 2021/29xxx/CVE-2021-29662.json
 create mode 100644 2021/29xxx/CVE-2021-29663.json

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 085f35574d2..0ea7861ea13 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -248,6 +248,16 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-commits] 20210331 [zookeeper] branch master updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-commits] 20210331 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4272 ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210331 [jira] [Resolved] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21418.json b/2021/21xxx/CVE-2021-21418.json
index f0ee622dc46..0c0b9d5d8e4 100644
--- a/2021/21xxx/CVE-2021-21418.json
+++ b/2021/21xxx/CVE-2021-21418.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "ps_emailsubscription is a newsletter subscription module for the PrestaShop platform. An employee can inject javascript in the newsletter condition field that will then be executed on the front office\n\nThe issue has been fixed in 2.6.1"
+                "value": "ps_emailsubscription is a newsletter subscription module for the PrestaShop platform. An employee can inject javascript in the newsletter condition field that will then be executed on the front office The issue has been fixed in 2.6.1"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21975.json b/2021/21xxx/CVE-2021-21975.json
index 3f49422a134..68c39bc93cd 100644
--- a/2021/21xxx/CVE-2021-21975.json
+++ b/2021/21xxx/CVE-2021-21975.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21975",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@vmware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "VMware vRealize Operations",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "VMware vRealize Operations prior to 8.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Server Side Request Forgery"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.vmware.com/security/advisories/VMSA-2021-0004.html",
+                "url": "https://www.vmware.com/security/advisories/VMSA-2021-0004.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21983.json b/2021/21xxx/CVE-2021-21983.json
index 78117bf748d..a042c79487a 100644
--- a/2021/21xxx/CVE-2021-21983.json
+++ b/2021/21xxx/CVE-2021-21983.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21983",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@vmware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "VMware vRealize Operations",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "VMware vRealize Operations prior to 8.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Arbitrary file write vulnerability"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.vmware.com/security/advisories/VMSA-2021-0004.html",
+                "url": "https://www.vmware.com/security/advisories/VMSA-2021-0004.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22991.json b/2021/22xxx/CVE-2021-22991.json
index 1faa2994b32..c4b89050fe7 100644
--- a/2021/22xxx/CVE-2021-22991.json
+++ b/2021/22xxx/CVE-2021-22991.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22991",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "RCE"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K56715231",
+                "url": "https://support.f5.com/csp/article/K56715231"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22993.json b/2021/22xxx/CVE-2021-22993.json
index 844f2ead747..a177fb82b62 100644
--- a/2021/22xxx/CVE-2021-22993.json
+++ b/2021/22xxx/CVE-2021-22993.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22993",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP Advanced WAF and BIG-IP ASM",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "XSS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K55237223",
+                "url": "https://support.f5.com/csp/article/K55237223"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP Advanced WAF and BIG-IP ASM versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, DOM-based XSS on DoS Profile properties page. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22994.json b/2021/22xxx/CVE-2021-22994.json
index 6ab9acbf641..fbda2e05323 100644
--- a/2021/22xxx/CVE-2021-22994.json
+++ b/2021/22xxx/CVE-2021-22994.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22994",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "XSS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K66851119",
+                "url": "https://support.f5.com/csp/article/K66851119"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role. This vulnerability is due to an incomplete fix for CVE-2020-5948. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22996.json b/2021/22xxx/CVE-2021-22996.json
index 036ececbed8..3e012206f2c 100644
--- a/2021/22xxx/CVE-2021-22996.json
+++ b/2021/22xxx/CVE-2021-22996.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22996",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All 7.x versons"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K16352404",
+                "url": "https://support.f5.com/csp/article/K16352404"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On all 7.x versions (fixed in 8.0.0), when set up for auto failover, a BIG-IQ Data Collection Device (DCD) cluster member that receives an undisclosed message may cause the corosync process to abort. This behavior may lead to a denial-of-service (DoS) and impact the stability of a BIG-IQ high availability (HA) cluster. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22997.json b/2021/22xxx/CVE-2021-22997.json
index f5e24cd2ae0..173a034cf9a 100644
--- a/2021/22xxx/CVE-2021-22997.json
+++ b/2021/22xxx/CVE-2021-22997.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22997",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All 7.x and 6.x versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "information disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K34074377",
+                "url": "https://support.f5.com/csp/article/K34074377"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ HA ElasticSearch service does not implement any form of authentication for the clustering transport services, and all data used by ElasticSearch for transport is unencrypted. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22998.json b/2021/22xxx/CVE-2021-22998.json
index b69d2362075..cf94a0598c9 100644
--- a/2021/22xxx/CVE-2021-22998.json
+++ b/2021/22xxx/CVE-2021-22998.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22998",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K31934524",
+                "url": "https://support.f5.com/csp/article/K31934524"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, SYN flood protection thresholds are not enforced in secure network address translation (SNAT) listeners. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22999.json b/2021/22xxx/CVE-2021-22999.json
index db353f133f9..b30b86e4396 100644
--- a/2021/22xxx/CVE-2021-22999.json
+++ b/2021/22xxx/CVE-2021-22999.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22999",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "15.0.x before 15.1.0, 14.1.x before 14.1.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K02333782",
+                "url": "https://support.f5.com/csp/article/K02333782"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On versions 15.0.x before 15.1.0 and 14.1.x before 14.1.4, the BIG-IP system provides an option to connect HTTP/2 clients to HTTP/1.x servers. When a client is slow to accept responses and it closes a connection prematurely, the BIG-IP system may indefinitely retain some streams unclosed. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23000.json b/2021/23xxx/CVE-2021-23000.json
index c6b96f15e7c..54f6be84362 100644
--- a/2021/23xxx/CVE-2021-23000.json
+++ b/2021/23xxx/CVE-2021-23000.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23000",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "13.1.3.4-13.1.3.5, 12.1.5.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K34441555",
+                "url": "https://support.f5.com/csp/article/K34441555"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23001.json b/2021/23xxx/CVE-2021-23001.json
index 4e59c49c4b7..c257c3ef9ed 100644
--- a/2021/23xxx/CVE-2021-23001.json
+++ b/2021/23xxx/CVE-2021-23001.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23001",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP Advanced WAF and BIG-IP ASM",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K06440657",
+                "url": "https://support.f5.com/csp/article/K06440657"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, the upload functionality in BIG-IP Advanced WAF and BIG-IP ASM allows an authenticated user to upload files to the BIG-IP system using a call to an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23002.json b/2021/23xxx/CVE-2021-23002.json
index 6696b027fa7..6e9f5033ce2 100644
--- a/2021/23xxx/CVE-2021-23002.json
+++ b/2021/23xxx/CVE-2021-23002.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23002",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP APM and Edge Client",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "BIG-IP APM 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, all 12.1.x and 11.6.x versions"
+                                        },
+                                        {
+                                            "version_value": "Edge Client 7.2.1.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, 7.1.8.x before 7.1.8.5"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information leakage"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K71891773",
+                "url": "https://support.f5.com/csp/article/K71891773"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "When using BIG-IP APM 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, or all 12.1.x and 11.6.x versions or Edge Client versions 7.2.1.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, or 7.1.8.x before 7.1.8.5, the session ID is visible in the arguments of the f5vpn.exe command when VPN is launched from the browser on a Windows system. Addressing this issue requires both the client and server fixes. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23003.json b/2021/23xxx/CVE-2021-23003.json
index 642afddc183..d831f2f2a3b 100644
--- a/2021/23xxx/CVE-2021-23003.json
+++ b/2021/23xxx/CVE-2021-23003.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23003",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K43470422",
+                "url": "https://support.f5.com/csp/article/K43470422"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, the Traffic Management Microkernel (TMM) process may produce a core file when undisclosed MPTCP traffic passes through a standard virtual server. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23004.json b/2021/23xxx/CVE-2021-23004.json
index e0d4dd24289..32a5a389559 100644
--- a/2021/23xxx/CVE-2021-23004.json
+++ b/2021/23xxx/CVE-2021-23004.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23004",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K31025212",
+                "url": "https://support.f5.com/csp/article/K31025212"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, Multipath TCP (MPTCP) forwarding flows may be created on standard virtual servers without MPTCP enabled in the applied TCP profile. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23005.json b/2021/23xxx/CVE-2021-23005.json
index 061d07ef72e..08a81d49c31 100644
--- a/2021/23xxx/CVE-2021-23005.json
+++ b/2021/23xxx/CVE-2021-23005.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23005",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All 7.x and 6.x versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K01243064",
+                "url": "https://support.f5.com/csp/article/K01243064"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On all 7.x and 6.x versions (fixed in 8.0.0), when using a Quorum device for BIG-IQ high availability (HA) for automatic failover, BIG-IQ does not make use of Transport Layer Security (TLS) with the Corosync protocol. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23006.json b/2021/23xxx/CVE-2021-23006.json
index 6cd04e2abe7..ef4e4220567 100644
--- a/2021/23xxx/CVE-2021-23006.json
+++ b/2021/23xxx/CVE-2021-23006.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23006",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IQ",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All 7.x and 6.x versions"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "XSS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K30585021",
+                "url": "https://support.f5.com/csp/article/K30585021"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On all 7.x and 6.x versions (fixed in 8.0.0), undisclosed BIG-IQ pages have a reflected cross-site scripting vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23007.json b/2021/23xxx/CVE-2021-23007.json
index af0e9f89f25..a87dbe50290 100644
--- a/2021/23xxx/CVE-2021-23007.json
+++ b/2021/23xxx/CVE-2021-23007.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-23007",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "f5sirt@f5.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "BIG-IP",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "14.1.4 and 16.0.1.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "DoS"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.f5.com/csp/article/K37451543",
+                "url": "https://support.f5.com/csp/article/K37451543"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "On BIG-IP versions 14.1.4 and 16.0.1.1, when the Traffic Management Microkernel (TMM) process handles certain undisclosed traffic, it may start dropping all fragmented IP traffic. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29659.json b/2021/29xxx/CVE-2021-29659.json
new file mode 100644
index 00000000000..f1c3520e0a8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29659.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29659",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29660.json b/2021/29xxx/CVE-2021-29660.json
new file mode 100644
index 00000000000..e79900cb9a1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29660.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29660",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29661.json b/2021/29xxx/CVE-2021-29661.json
new file mode 100644
index 00000000000..ee17b3c4745
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29661.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29661",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29662.json b/2021/29xxx/CVE-2021-29662.json
new file mode 100644
index 00000000000..95efb9e445a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29662.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29662",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e",
+                "refsource": "MISC",
+                "name": "https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29663.json b/2021/29xxx/CVE-2021-29663.json
new file mode 100644
index 00000000000..3bef38760d9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29663.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29663",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 4405adc85f469bba4c65211061ab83c77ec2d4eb Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 19:00:42 +0000
Subject: [PATCH 799/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 1dbb4691127..97904860036 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -149,6 +149,11 @@
                 "refsource": "MLIST",
                 "name": "[turbine-commits] 20210329 svn commit: r1888167 - /turbine/core/trunk/pom.xml",
                 "url": "https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7@%3Ccommits.turbine.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210331 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad@%3Cdev.ws.apache.org%3E"
             }
         ]
     },

From c17aedf8b775882bda6bc9abecb80f5620d3a4ff Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 20:00:40 +0000
Subject: [PATCH 800/845] "-Synchronized-Data."

---
 2016/10xxx/CVE-2016-10510.json |  5 +++
 2020/35xxx/CVE-2020-35308.json | 56 +++++++++++++++++++++++++++----
 2021/25xxx/CVE-2021-25646.json | 25 ++++++++++++++
 2021/26xxx/CVE-2021-26919.json |  5 +++
 2021/26xxx/CVE-2021-26943.json | 61 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29663.json | 61 ++++++++++++++++++++++++++++++----
 6 files changed, 195 insertions(+), 18 deletions(-)

diff --git a/2016/10xxx/CVE-2016-10510.json b/2016/10xxx/CVE-2016-10510.json
index 077c9b5212d..83fbea2316c 100644
--- a/2016/10xxx/CVE-2016-10510.json
+++ b/2016/10xxx/CVE-2016-10510.json
@@ -71,6 +71,11 @@
                 "name": "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/",
                 "refsource": "MISC",
                 "url": "https://www.checkmarx.com/advisories/cross-site-scripting-xss-vulnerability-in-kohana/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2016-4451",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2016-4451"
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35308.json b/2020/35xxx/CVE-2020-35308.json
index 61276e8f416..cc9adc3e7d9 100644
--- a/2020/35xxx/CVE-2020-35308.json
+++ b/2020/35xxx/CVE-2020-35308.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-35308",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-35308",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "CONQUEST DICOM SERVER before 1.5.0 has a code execution vulnerability which can be exploited by attackers to execute malicious code."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.cnvd.org.cn/flaw/show/2017713",
+                "refsource": "MISC",
+                "name": "https://www.cnvd.org.cn/flaw/show/2017713"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25646.json b/2021/25xxx/CVE-2021-25646.json
index d623508b5ee..1bcd1feb842 100644
--- a/2021/25xxx/CVE-2021-25646.json
+++ b/2021/25xxx/CVE-2021-25646.json
@@ -114,6 +114,31 @@
                 "refsource": "MLIST",
                 "name": "[druid-commits] 20210204 [GitHub] [druid] jihoonson merged pull request #10854: [Backport] Fix CVE-2021-25646",
                 "url": "https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210205 [GitHub] [druid] jihoonson opened a new pull request #10854: [Backport] Fix CVE-2021-25646",
+                "url": "https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210205 [GitHub] [druid] jihoonson merged pull request #10818: Fix CVE-2021-25646",
+                "url": "https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210205 [GitHub] [druid] jihoonson commented on pull request #10818: Fix CVE-2021-25646",
+                "url": "https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210205 [GitHub] [druid] jihoonson merged pull request #10854: [Backport] Fix CVE-2021-25646",
+                "url": "https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-dev] 20210331 Regarding the 0.21.0 release",
+                "url": "https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26919.json b/2021/26xxx/CVE-2021-26919.json
index 20213c15a80..ca3f4711a05 100644
--- a/2021/26xxx/CVE-2021-26919.json
+++ b/2021/26xxx/CVE-2021-26919.json
@@ -69,6 +69,11 @@
                 "refsource": "MISC",
                 "url": "https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E",
                 "name": "https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-dev] 20210331 Regarding the 0.21.0 release",
+                "url": "https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26943.json b/2021/26xxx/CVE-2021-26943.json
index 073e4ba0509..3ab7f2afa1d 100644
--- a/2021/26xxx/CVE-2021-26943.json
+++ b/2021/26xxx/CVE-2021-26943.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-26943",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-26943",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly arbitrary physical memory locations, including SMRAM, and execute arbitrary code in the SMM (issue 3 of 3)."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.asus.com/support/FAQ/1045541/",
+                "url": "https://www.asus.com/support/FAQ/1045541/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.youtube.com/watch?v=1H3AfaVyeuk",
+                "url": "https://www.youtube.com/watch?v=1H3AfaVyeuk"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29663.json b/2021/29xxx/CVE-2021-29663.json
index 3bef38760d9..5c5526fc474 100644
--- a/2021/29xxx/CVE-2021-29663.json
+++ b/2021/29xxx/CVE-2021-29663.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29663",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29663",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "CourseMS (aka Course Registration Management System) 2.1 is affected by cross-site scripting (XSS). When an attacker with access to an Admin account creates a Job Title in the Site area (aka the admin/add_jobs.php name parameter), they can insert an XSS payload. This payload will execute whenever anyone visits the registration page."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "http://sourceforge.net/projects/coursems",
+                "refsource": "MISC",
+                "name": "http://sourceforge.net/projects/coursems"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/cptsticky/A-0day-Per-Day-Keeps-The-Cope-Away/blob/main/CVE-2021-29663",
+                "url": "https://github.com/cptsticky/A-0day-Per-Day-Keeps-The-Cope-Away/blob/main/CVE-2021-29663"
             }
         ]
     }

From 09c851dc689a4dd1d7da1a4a7a9da083a287f269 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 21:00:40 +0000
Subject: [PATCH 801/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29737.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29738.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29739.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29740.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29741.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29742.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29743.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29744.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29745.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29746.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29747.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29748.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29749.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29750.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29751.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29752.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29753.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29754.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29755.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29756.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29757.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29758.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29759.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29760.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29761.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29762.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29763.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29764.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29765.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29766.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29767.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29768.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29769.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29770.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29771.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29772.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29773.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29774.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29775.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29776.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29777.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29778.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29779.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29780.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29781.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29782.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29783.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29784.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29785.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29786.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29787.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29788.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29789.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29790.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29791.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29792.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29793.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29794.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29795.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29796.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29797.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29798.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29799.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29800.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29801.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29802.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29803.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29804.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29805.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29806.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29807.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29808.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29809.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29810.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29811.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29812.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29813.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29814.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29815.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29816.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29817.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29818.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29819.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29820.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29821.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29822.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29823.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29824.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29825.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29826.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29827.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29828.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29829.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29830.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29831.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29832.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29833.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29834.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29835.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29836.json | 18 ++++++++++++++++++
 100 files changed, 1800 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29737.json
 create mode 100644 2021/29xxx/CVE-2021-29738.json
 create mode 100644 2021/29xxx/CVE-2021-29739.json
 create mode 100644 2021/29xxx/CVE-2021-29740.json
 create mode 100644 2021/29xxx/CVE-2021-29741.json
 create mode 100644 2021/29xxx/CVE-2021-29742.json
 create mode 100644 2021/29xxx/CVE-2021-29743.json
 create mode 100644 2021/29xxx/CVE-2021-29744.json
 create mode 100644 2021/29xxx/CVE-2021-29745.json
 create mode 100644 2021/29xxx/CVE-2021-29746.json
 create mode 100644 2021/29xxx/CVE-2021-29747.json
 create mode 100644 2021/29xxx/CVE-2021-29748.json
 create mode 100644 2021/29xxx/CVE-2021-29749.json
 create mode 100644 2021/29xxx/CVE-2021-29750.json
 create mode 100644 2021/29xxx/CVE-2021-29751.json
 create mode 100644 2021/29xxx/CVE-2021-29752.json
 create mode 100644 2021/29xxx/CVE-2021-29753.json
 create mode 100644 2021/29xxx/CVE-2021-29754.json
 create mode 100644 2021/29xxx/CVE-2021-29755.json
 create mode 100644 2021/29xxx/CVE-2021-29756.json
 create mode 100644 2021/29xxx/CVE-2021-29757.json
 create mode 100644 2021/29xxx/CVE-2021-29758.json
 create mode 100644 2021/29xxx/CVE-2021-29759.json
 create mode 100644 2021/29xxx/CVE-2021-29760.json
 create mode 100644 2021/29xxx/CVE-2021-29761.json
 create mode 100644 2021/29xxx/CVE-2021-29762.json
 create mode 100644 2021/29xxx/CVE-2021-29763.json
 create mode 100644 2021/29xxx/CVE-2021-29764.json
 create mode 100644 2021/29xxx/CVE-2021-29765.json
 create mode 100644 2021/29xxx/CVE-2021-29766.json
 create mode 100644 2021/29xxx/CVE-2021-29767.json
 create mode 100644 2021/29xxx/CVE-2021-29768.json
 create mode 100644 2021/29xxx/CVE-2021-29769.json
 create mode 100644 2021/29xxx/CVE-2021-29770.json
 create mode 100644 2021/29xxx/CVE-2021-29771.json
 create mode 100644 2021/29xxx/CVE-2021-29772.json
 create mode 100644 2021/29xxx/CVE-2021-29773.json
 create mode 100644 2021/29xxx/CVE-2021-29774.json
 create mode 100644 2021/29xxx/CVE-2021-29775.json
 create mode 100644 2021/29xxx/CVE-2021-29776.json
 create mode 100644 2021/29xxx/CVE-2021-29777.json
 create mode 100644 2021/29xxx/CVE-2021-29778.json
 create mode 100644 2021/29xxx/CVE-2021-29779.json
 create mode 100644 2021/29xxx/CVE-2021-29780.json
 create mode 100644 2021/29xxx/CVE-2021-29781.json
 create mode 100644 2021/29xxx/CVE-2021-29782.json
 create mode 100644 2021/29xxx/CVE-2021-29783.json
 create mode 100644 2021/29xxx/CVE-2021-29784.json
 create mode 100644 2021/29xxx/CVE-2021-29785.json
 create mode 100644 2021/29xxx/CVE-2021-29786.json
 create mode 100644 2021/29xxx/CVE-2021-29787.json
 create mode 100644 2021/29xxx/CVE-2021-29788.json
 create mode 100644 2021/29xxx/CVE-2021-29789.json
 create mode 100644 2021/29xxx/CVE-2021-29790.json
 create mode 100644 2021/29xxx/CVE-2021-29791.json
 create mode 100644 2021/29xxx/CVE-2021-29792.json
 create mode 100644 2021/29xxx/CVE-2021-29793.json
 create mode 100644 2021/29xxx/CVE-2021-29794.json
 create mode 100644 2021/29xxx/CVE-2021-29795.json
 create mode 100644 2021/29xxx/CVE-2021-29796.json
 create mode 100644 2021/29xxx/CVE-2021-29797.json
 create mode 100644 2021/29xxx/CVE-2021-29798.json
 create mode 100644 2021/29xxx/CVE-2021-29799.json
 create mode 100644 2021/29xxx/CVE-2021-29800.json
 create mode 100644 2021/29xxx/CVE-2021-29801.json
 create mode 100644 2021/29xxx/CVE-2021-29802.json
 create mode 100644 2021/29xxx/CVE-2021-29803.json
 create mode 100644 2021/29xxx/CVE-2021-29804.json
 create mode 100644 2021/29xxx/CVE-2021-29805.json
 create mode 100644 2021/29xxx/CVE-2021-29806.json
 create mode 100644 2021/29xxx/CVE-2021-29807.json
 create mode 100644 2021/29xxx/CVE-2021-29808.json
 create mode 100644 2021/29xxx/CVE-2021-29809.json
 create mode 100644 2021/29xxx/CVE-2021-29810.json
 create mode 100644 2021/29xxx/CVE-2021-29811.json
 create mode 100644 2021/29xxx/CVE-2021-29812.json
 create mode 100644 2021/29xxx/CVE-2021-29813.json
 create mode 100644 2021/29xxx/CVE-2021-29814.json
 create mode 100644 2021/29xxx/CVE-2021-29815.json
 create mode 100644 2021/29xxx/CVE-2021-29816.json
 create mode 100644 2021/29xxx/CVE-2021-29817.json
 create mode 100644 2021/29xxx/CVE-2021-29818.json
 create mode 100644 2021/29xxx/CVE-2021-29819.json
 create mode 100644 2021/29xxx/CVE-2021-29820.json
 create mode 100644 2021/29xxx/CVE-2021-29821.json
 create mode 100644 2021/29xxx/CVE-2021-29822.json
 create mode 100644 2021/29xxx/CVE-2021-29823.json
 create mode 100644 2021/29xxx/CVE-2021-29824.json
 create mode 100644 2021/29xxx/CVE-2021-29825.json
 create mode 100644 2021/29xxx/CVE-2021-29826.json
 create mode 100644 2021/29xxx/CVE-2021-29827.json
 create mode 100644 2021/29xxx/CVE-2021-29828.json
 create mode 100644 2021/29xxx/CVE-2021-29829.json
 create mode 100644 2021/29xxx/CVE-2021-29830.json
 create mode 100644 2021/29xxx/CVE-2021-29831.json
 create mode 100644 2021/29xxx/CVE-2021-29832.json
 create mode 100644 2021/29xxx/CVE-2021-29833.json
 create mode 100644 2021/29xxx/CVE-2021-29834.json
 create mode 100644 2021/29xxx/CVE-2021-29835.json
 create mode 100644 2021/29xxx/CVE-2021-29836.json

diff --git a/2021/29xxx/CVE-2021-29737.json b/2021/29xxx/CVE-2021-29737.json
new file mode 100644
index 00000000000..4a1cc0ac129
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29737.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29737",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29738.json b/2021/29xxx/CVE-2021-29738.json
new file mode 100644
index 00000000000..7e557aad9f8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29738.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29738",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29739.json b/2021/29xxx/CVE-2021-29739.json
new file mode 100644
index 00000000000..954890ce3a3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29739.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29739",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29740.json b/2021/29xxx/CVE-2021-29740.json
new file mode 100644
index 00000000000..2a135c5ed29
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29740.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29740",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29741.json b/2021/29xxx/CVE-2021-29741.json
new file mode 100644
index 00000000000..041d816884a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29741.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29741",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29742.json b/2021/29xxx/CVE-2021-29742.json
new file mode 100644
index 00000000000..e676c4530f1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29742.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29742",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29743.json b/2021/29xxx/CVE-2021-29743.json
new file mode 100644
index 00000000000..d0c1054180b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29743.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29743",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29744.json b/2021/29xxx/CVE-2021-29744.json
new file mode 100644
index 00000000000..3c63c35aa2e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29744.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29744",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29745.json b/2021/29xxx/CVE-2021-29745.json
new file mode 100644
index 00000000000..f2009aa3232
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29745.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29745",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29746.json b/2021/29xxx/CVE-2021-29746.json
new file mode 100644
index 00000000000..1857787b8bf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29746.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29746",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29747.json b/2021/29xxx/CVE-2021-29747.json
new file mode 100644
index 00000000000..a949ee0a380
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29747.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29747",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29748.json b/2021/29xxx/CVE-2021-29748.json
new file mode 100644
index 00000000000..26fde6a9681
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29748.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29748",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29749.json b/2021/29xxx/CVE-2021-29749.json
new file mode 100644
index 00000000000..96430235abb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29749.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29749",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29750.json b/2021/29xxx/CVE-2021-29750.json
new file mode 100644
index 00000000000..2acd5d62917
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29750.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29750",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29751.json b/2021/29xxx/CVE-2021-29751.json
new file mode 100644
index 00000000000..c0e62d63f34
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29751.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29751",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29752.json b/2021/29xxx/CVE-2021-29752.json
new file mode 100644
index 00000000000..fb3d4eebfcc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29752.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29752",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29753.json b/2021/29xxx/CVE-2021-29753.json
new file mode 100644
index 00000000000..4c855aae649
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29753.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29753",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29754.json b/2021/29xxx/CVE-2021-29754.json
new file mode 100644
index 00000000000..10d4a7134b7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29754.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29754",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29755.json b/2021/29xxx/CVE-2021-29755.json
new file mode 100644
index 00000000000..96d7c8d5fe9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29755.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29755",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29756.json b/2021/29xxx/CVE-2021-29756.json
new file mode 100644
index 00000000000..d40245fb20d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29756.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29756",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29757.json b/2021/29xxx/CVE-2021-29757.json
new file mode 100644
index 00000000000..f2ab7d5cfd7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29757.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29757",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29758.json b/2021/29xxx/CVE-2021-29758.json
new file mode 100644
index 00000000000..a23873fb3bf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29758.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29758",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29759.json b/2021/29xxx/CVE-2021-29759.json
new file mode 100644
index 00000000000..664f46e59cf
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29759.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29759",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29760.json b/2021/29xxx/CVE-2021-29760.json
new file mode 100644
index 00000000000..35a2f1715d7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29760.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29760",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29761.json b/2021/29xxx/CVE-2021-29761.json
new file mode 100644
index 00000000000..12598b2cc19
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29761.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29761",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29762.json b/2021/29xxx/CVE-2021-29762.json
new file mode 100644
index 00000000000..44c1d2f78d2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29762.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29762",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29763.json b/2021/29xxx/CVE-2021-29763.json
new file mode 100644
index 00000000000..3dcda065196
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29763.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29763",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29764.json b/2021/29xxx/CVE-2021-29764.json
new file mode 100644
index 00000000000..1afa5ed7461
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29764.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29764",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29765.json b/2021/29xxx/CVE-2021-29765.json
new file mode 100644
index 00000000000..292eac4cf87
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29765.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29765",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29766.json b/2021/29xxx/CVE-2021-29766.json
new file mode 100644
index 00000000000..9fc623012a4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29766.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29766",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29767.json b/2021/29xxx/CVE-2021-29767.json
new file mode 100644
index 00000000000..4a0feb219ab
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29767.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29767",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29768.json b/2021/29xxx/CVE-2021-29768.json
new file mode 100644
index 00000000000..dc0a0746e5a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29768.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29768",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29769.json b/2021/29xxx/CVE-2021-29769.json
new file mode 100644
index 00000000000..624f2fc057c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29769.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29769",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29770.json b/2021/29xxx/CVE-2021-29770.json
new file mode 100644
index 00000000000..947e51895e6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29770.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29770",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29771.json b/2021/29xxx/CVE-2021-29771.json
new file mode 100644
index 00000000000..901aa3e7f0d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29771.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29771",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29772.json b/2021/29xxx/CVE-2021-29772.json
new file mode 100644
index 00000000000..0b3b2f8e9b5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29772.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29772",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29773.json b/2021/29xxx/CVE-2021-29773.json
new file mode 100644
index 00000000000..77c08e88f43
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29773.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29773",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29774.json b/2021/29xxx/CVE-2021-29774.json
new file mode 100644
index 00000000000..3233633cfb2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29774.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29774",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29775.json b/2021/29xxx/CVE-2021-29775.json
new file mode 100644
index 00000000000..9e18e490d7c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29775.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29775",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29776.json b/2021/29xxx/CVE-2021-29776.json
new file mode 100644
index 00000000000..440430d81bc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29776.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29776",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29777.json b/2021/29xxx/CVE-2021-29777.json
new file mode 100644
index 00000000000..c314b250e38
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29777.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29777",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29778.json b/2021/29xxx/CVE-2021-29778.json
new file mode 100644
index 00000000000..6f687a21182
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29778.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29778",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29779.json b/2021/29xxx/CVE-2021-29779.json
new file mode 100644
index 00000000000..a4dbd915e98
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29779.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29779",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29780.json b/2021/29xxx/CVE-2021-29780.json
new file mode 100644
index 00000000000..3b4b3d0935e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29780.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29780",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29781.json b/2021/29xxx/CVE-2021-29781.json
new file mode 100644
index 00000000000..321bd2100f3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29781.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29781",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29782.json b/2021/29xxx/CVE-2021-29782.json
new file mode 100644
index 00000000000..b6abedd8e8c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29782.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29782",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29783.json b/2021/29xxx/CVE-2021-29783.json
new file mode 100644
index 00000000000..cfb965c3005
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29783.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29783",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29784.json b/2021/29xxx/CVE-2021-29784.json
new file mode 100644
index 00000000000..12032ba3fda
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29784.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29784",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29785.json b/2021/29xxx/CVE-2021-29785.json
new file mode 100644
index 00000000000..57732418546
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29785.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29785",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29786.json b/2021/29xxx/CVE-2021-29786.json
new file mode 100644
index 00000000000..e47db64e85d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29786.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29786",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29787.json b/2021/29xxx/CVE-2021-29787.json
new file mode 100644
index 00000000000..cac5fa65699
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29787.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29787",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29788.json b/2021/29xxx/CVE-2021-29788.json
new file mode 100644
index 00000000000..5e794362852
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29788.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29788",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29789.json b/2021/29xxx/CVE-2021-29789.json
new file mode 100644
index 00000000000..f4347787137
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29789.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29789",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29790.json b/2021/29xxx/CVE-2021-29790.json
new file mode 100644
index 00000000000..b002cfb7570
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29790.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29790",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29791.json b/2021/29xxx/CVE-2021-29791.json
new file mode 100644
index 00000000000..756596e21c8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29791.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29791",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29792.json b/2021/29xxx/CVE-2021-29792.json
new file mode 100644
index 00000000000..2ea141be7b0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29792.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29792",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29793.json b/2021/29xxx/CVE-2021-29793.json
new file mode 100644
index 00000000000..8e539c8d77e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29793.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29793",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29794.json b/2021/29xxx/CVE-2021-29794.json
new file mode 100644
index 00000000000..b3b1d38e4fe
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29794.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29794",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29795.json b/2021/29xxx/CVE-2021-29795.json
new file mode 100644
index 00000000000..3bf7d6505fe
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29795.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29795",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29796.json b/2021/29xxx/CVE-2021-29796.json
new file mode 100644
index 00000000000..c9a6e1830b7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29796.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29796",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29797.json b/2021/29xxx/CVE-2021-29797.json
new file mode 100644
index 00000000000..49a728bf153
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29797.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29797",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29798.json b/2021/29xxx/CVE-2021-29798.json
new file mode 100644
index 00000000000..a72cc47462f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29798.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29798",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29799.json b/2021/29xxx/CVE-2021-29799.json
new file mode 100644
index 00000000000..e06b82fe495
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29799.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29799",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29800.json b/2021/29xxx/CVE-2021-29800.json
new file mode 100644
index 00000000000..77ae1e7988a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29800.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29800",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29801.json b/2021/29xxx/CVE-2021-29801.json
new file mode 100644
index 00000000000..19cf8ef7317
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29801.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29801",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29802.json b/2021/29xxx/CVE-2021-29802.json
new file mode 100644
index 00000000000..973dfbc4227
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29802.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29802",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29803.json b/2021/29xxx/CVE-2021-29803.json
new file mode 100644
index 00000000000..92af66d1a51
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29803.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29803",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29804.json b/2021/29xxx/CVE-2021-29804.json
new file mode 100644
index 00000000000..59a773c1318
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29804.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29804",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29805.json b/2021/29xxx/CVE-2021-29805.json
new file mode 100644
index 00000000000..c3be181e7fc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29805.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29805",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29806.json b/2021/29xxx/CVE-2021-29806.json
new file mode 100644
index 00000000000..2163c597649
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29806.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29806",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29807.json b/2021/29xxx/CVE-2021-29807.json
new file mode 100644
index 00000000000..3da1fc814f3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29807.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29807",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29808.json b/2021/29xxx/CVE-2021-29808.json
new file mode 100644
index 00000000000..4b86ab05269
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29808.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29808",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29809.json b/2021/29xxx/CVE-2021-29809.json
new file mode 100644
index 00000000000..545963a47ea
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29809.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29809",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29810.json b/2021/29xxx/CVE-2021-29810.json
new file mode 100644
index 00000000000..cd709290f68
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29810.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29810",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29811.json b/2021/29xxx/CVE-2021-29811.json
new file mode 100644
index 00000000000..a615a612499
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29811.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29811",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29812.json b/2021/29xxx/CVE-2021-29812.json
new file mode 100644
index 00000000000..81e425b51e8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29812.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29812",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29813.json b/2021/29xxx/CVE-2021-29813.json
new file mode 100644
index 00000000000..48016bb387c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29813.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29813",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29814.json b/2021/29xxx/CVE-2021-29814.json
new file mode 100644
index 00000000000..9b97d746ec6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29814.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29814",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29815.json b/2021/29xxx/CVE-2021-29815.json
new file mode 100644
index 00000000000..475f8d97e73
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29815.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29815",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29816.json b/2021/29xxx/CVE-2021-29816.json
new file mode 100644
index 00000000000..c6a750ea8e2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29816.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29816",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29817.json b/2021/29xxx/CVE-2021-29817.json
new file mode 100644
index 00000000000..f5153e238a7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29817.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29817",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29818.json b/2021/29xxx/CVE-2021-29818.json
new file mode 100644
index 00000000000..f102a712681
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29818.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29818",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29819.json b/2021/29xxx/CVE-2021-29819.json
new file mode 100644
index 00000000000..86ceea304c5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29819.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29819",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29820.json b/2021/29xxx/CVE-2021-29820.json
new file mode 100644
index 00000000000..4f30c3b32d3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29820.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29820",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29821.json b/2021/29xxx/CVE-2021-29821.json
new file mode 100644
index 00000000000..07e5c646f62
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29821.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29821",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29822.json b/2021/29xxx/CVE-2021-29822.json
new file mode 100644
index 00000000000..748b5743788
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29822.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29822",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29823.json b/2021/29xxx/CVE-2021-29823.json
new file mode 100644
index 00000000000..84860b48828
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29823.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29823",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29824.json b/2021/29xxx/CVE-2021-29824.json
new file mode 100644
index 00000000000..5ad54f36818
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29824.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29824",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29825.json b/2021/29xxx/CVE-2021-29825.json
new file mode 100644
index 00000000000..3432b9dd103
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29825.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29825",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29826.json b/2021/29xxx/CVE-2021-29826.json
new file mode 100644
index 00000000000..40eed58032b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29826.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29826",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29827.json b/2021/29xxx/CVE-2021-29827.json
new file mode 100644
index 00000000000..8481255b90f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29827.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29827",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29828.json b/2021/29xxx/CVE-2021-29828.json
new file mode 100644
index 00000000000..e4415068f51
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29828.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29828",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29829.json b/2021/29xxx/CVE-2021-29829.json
new file mode 100644
index 00000000000..b9b5d6f3a72
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29829.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29829",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29830.json b/2021/29xxx/CVE-2021-29830.json
new file mode 100644
index 00000000000..6164f4fb1ea
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29830.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29830",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29831.json b/2021/29xxx/CVE-2021-29831.json
new file mode 100644
index 00000000000..7137d65a031
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29831.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29831",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29832.json b/2021/29xxx/CVE-2021-29832.json
new file mode 100644
index 00000000000..a23fff8cba4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29832.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29832",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29833.json b/2021/29xxx/CVE-2021-29833.json
new file mode 100644
index 00000000000..4fcf1a1d290
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29833.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29833",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29834.json b/2021/29xxx/CVE-2021-29834.json
new file mode 100644
index 00000000000..776c79903bd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29834.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29834",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29835.json b/2021/29xxx/CVE-2021-29835.json
new file mode 100644
index 00000000000..90bdf90a392
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29835.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29835",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29836.json b/2021/29xxx/CVE-2021-29836.json
new file mode 100644
index 00000000000..ff962537985
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29836.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29836",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 0cea56ae3d9564b9ab7a3b329613baacfc0940f6 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 21:00:57 +0000
Subject: [PATCH 802/845] "-Synchronized-Data."

---
 2019/3xxx/CVE-2019-3826.json   |  5 +++++
 2020/35xxx/CVE-2020-35135.json |  5 +++++
 2020/35xxx/CVE-2020-35773.json |  5 +++++
 2020/36xxx/CVE-2020-36286.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36287.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36288.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36289.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36290.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36291.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36292.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36293.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36294.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36295.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36296.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36297.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36298.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36299.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36300.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36301.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36302.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36303.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29837.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29838.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29839.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29840.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29841.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29842.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29843.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29844.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29845.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29846.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29847.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29848.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29849.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29850.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29851.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29852.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29853.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29854.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29855.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29856.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29857.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29858.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29859.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29860.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29861.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29862.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29863.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29864.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29865.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29866.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29867.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29868.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29869.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29870.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29871.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29872.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29873.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29874.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29875.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29876.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29877.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29878.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29879.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29880.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29881.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29882.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29883.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29884.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29885.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29886.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29887.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29888.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29889.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29890.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29891.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29892.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29893.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29894.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29895.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29896.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29897.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29898.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29899.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29900.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29901.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29902.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29903.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29904.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29905.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29906.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29907.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29908.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29909.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29910.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29911.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29912.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29913.json | 18 ++++++++++++++++++
 2021/3xxx/CVE-2021-3133.json   |  5 +++++
 99 files changed, 1730 insertions(+)
 create mode 100644 2020/36xxx/CVE-2020-36286.json
 create mode 100644 2020/36xxx/CVE-2020-36287.json
 create mode 100644 2020/36xxx/CVE-2020-36288.json
 create mode 100644 2020/36xxx/CVE-2020-36289.json
 create mode 100644 2020/36xxx/CVE-2020-36290.json
 create mode 100644 2020/36xxx/CVE-2020-36291.json
 create mode 100644 2020/36xxx/CVE-2020-36292.json
 create mode 100644 2020/36xxx/CVE-2020-36293.json
 create mode 100644 2020/36xxx/CVE-2020-36294.json
 create mode 100644 2020/36xxx/CVE-2020-36295.json
 create mode 100644 2020/36xxx/CVE-2020-36296.json
 create mode 100644 2020/36xxx/CVE-2020-36297.json
 create mode 100644 2020/36xxx/CVE-2020-36298.json
 create mode 100644 2020/36xxx/CVE-2020-36299.json
 create mode 100644 2020/36xxx/CVE-2020-36300.json
 create mode 100644 2020/36xxx/CVE-2020-36301.json
 create mode 100644 2020/36xxx/CVE-2020-36302.json
 create mode 100644 2020/36xxx/CVE-2020-36303.json
 create mode 100644 2021/29xxx/CVE-2021-29837.json
 create mode 100644 2021/29xxx/CVE-2021-29838.json
 create mode 100644 2021/29xxx/CVE-2021-29839.json
 create mode 100644 2021/29xxx/CVE-2021-29840.json
 create mode 100644 2021/29xxx/CVE-2021-29841.json
 create mode 100644 2021/29xxx/CVE-2021-29842.json
 create mode 100644 2021/29xxx/CVE-2021-29843.json
 create mode 100644 2021/29xxx/CVE-2021-29844.json
 create mode 100644 2021/29xxx/CVE-2021-29845.json
 create mode 100644 2021/29xxx/CVE-2021-29846.json
 create mode 100644 2021/29xxx/CVE-2021-29847.json
 create mode 100644 2021/29xxx/CVE-2021-29848.json
 create mode 100644 2021/29xxx/CVE-2021-29849.json
 create mode 100644 2021/29xxx/CVE-2021-29850.json
 create mode 100644 2021/29xxx/CVE-2021-29851.json
 create mode 100644 2021/29xxx/CVE-2021-29852.json
 create mode 100644 2021/29xxx/CVE-2021-29853.json
 create mode 100644 2021/29xxx/CVE-2021-29854.json
 create mode 100644 2021/29xxx/CVE-2021-29855.json
 create mode 100644 2021/29xxx/CVE-2021-29856.json
 create mode 100644 2021/29xxx/CVE-2021-29857.json
 create mode 100644 2021/29xxx/CVE-2021-29858.json
 create mode 100644 2021/29xxx/CVE-2021-29859.json
 create mode 100644 2021/29xxx/CVE-2021-29860.json
 create mode 100644 2021/29xxx/CVE-2021-29861.json
 create mode 100644 2021/29xxx/CVE-2021-29862.json
 create mode 100644 2021/29xxx/CVE-2021-29863.json
 create mode 100644 2021/29xxx/CVE-2021-29864.json
 create mode 100644 2021/29xxx/CVE-2021-29865.json
 create mode 100644 2021/29xxx/CVE-2021-29866.json
 create mode 100644 2021/29xxx/CVE-2021-29867.json
 create mode 100644 2021/29xxx/CVE-2021-29868.json
 create mode 100644 2021/29xxx/CVE-2021-29869.json
 create mode 100644 2021/29xxx/CVE-2021-29870.json
 create mode 100644 2021/29xxx/CVE-2021-29871.json
 create mode 100644 2021/29xxx/CVE-2021-29872.json
 create mode 100644 2021/29xxx/CVE-2021-29873.json
 create mode 100644 2021/29xxx/CVE-2021-29874.json
 create mode 100644 2021/29xxx/CVE-2021-29875.json
 create mode 100644 2021/29xxx/CVE-2021-29876.json
 create mode 100644 2021/29xxx/CVE-2021-29877.json
 create mode 100644 2021/29xxx/CVE-2021-29878.json
 create mode 100644 2021/29xxx/CVE-2021-29879.json
 create mode 100644 2021/29xxx/CVE-2021-29880.json
 create mode 100644 2021/29xxx/CVE-2021-29881.json
 create mode 100644 2021/29xxx/CVE-2021-29882.json
 create mode 100644 2021/29xxx/CVE-2021-29883.json
 create mode 100644 2021/29xxx/CVE-2021-29884.json
 create mode 100644 2021/29xxx/CVE-2021-29885.json
 create mode 100644 2021/29xxx/CVE-2021-29886.json
 create mode 100644 2021/29xxx/CVE-2021-29887.json
 create mode 100644 2021/29xxx/CVE-2021-29888.json
 create mode 100644 2021/29xxx/CVE-2021-29889.json
 create mode 100644 2021/29xxx/CVE-2021-29890.json
 create mode 100644 2021/29xxx/CVE-2021-29891.json
 create mode 100644 2021/29xxx/CVE-2021-29892.json
 create mode 100644 2021/29xxx/CVE-2021-29893.json
 create mode 100644 2021/29xxx/CVE-2021-29894.json
 create mode 100644 2021/29xxx/CVE-2021-29895.json
 create mode 100644 2021/29xxx/CVE-2021-29896.json
 create mode 100644 2021/29xxx/CVE-2021-29897.json
 create mode 100644 2021/29xxx/CVE-2021-29898.json
 create mode 100644 2021/29xxx/CVE-2021-29899.json
 create mode 100644 2021/29xxx/CVE-2021-29900.json
 create mode 100644 2021/29xxx/CVE-2021-29901.json
 create mode 100644 2021/29xxx/CVE-2021-29902.json
 create mode 100644 2021/29xxx/CVE-2021-29903.json
 create mode 100644 2021/29xxx/CVE-2021-29904.json
 create mode 100644 2021/29xxx/CVE-2021-29905.json
 create mode 100644 2021/29xxx/CVE-2021-29906.json
 create mode 100644 2021/29xxx/CVE-2021-29907.json
 create mode 100644 2021/29xxx/CVE-2021-29908.json
 create mode 100644 2021/29xxx/CVE-2021-29909.json
 create mode 100644 2021/29xxx/CVE-2021-29910.json
 create mode 100644 2021/29xxx/CVE-2021-29911.json
 create mode 100644 2021/29xxx/CVE-2021-29912.json
 create mode 100644 2021/29xxx/CVE-2021-29913.json

diff --git a/2019/3xxx/CVE-2019-3826.json b/2019/3xxx/CVE-2019-3826.json
index 9047460d827..7c4bf71bc27 100644
--- a/2019/3xxx/CVE-2019-3826.json
+++ b/2019/3xxx/CVE-2019-3826.json
@@ -78,6 +78,11 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-commits] 20200118 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-3677: owasp checker failing for - CVE-2019-17571 Apache Log4j 1.2 deserialization of untrusted data in SocketServer",
                 "url": "https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2019-4297",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2019-4297"
             }
         ]
     },
diff --git a/2020/35xxx/CVE-2020-35135.json b/2020/35xxx/CVE-2020-35135.json
index adc2e6566dc..9412322324f 100644
--- a/2020/35xxx/CVE-2020-35135.json
+++ b/2020/35xxx/CVE-2020-35135.json
@@ -61,6 +61,11 @@
                 "url": "https://wordpress.org/plugins/ultimate-category-excluder/#developers",
                 "refsource": "MISC",
                 "name": "https://wordpress.org/plugins/ultimate-category-excluder/#developers"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4294",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4294"
             }
         ]
     }
diff --git a/2020/35xxx/CVE-2020-35773.json b/2020/35xxx/CVE-2020-35773.json
index 017a35793b4..56744e35e68 100644
--- a/2020/35xxx/CVE-2020-35773.json
+++ b/2020/35xxx/CVE-2020-35773.json
@@ -71,6 +71,11 @@
                 "url": "https://wordpress.org/plugins/site-offline/#developers",
                 "refsource": "MISC",
                 "name": "https://wordpress.org/plugins/site-offline/#developers"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4292",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4292"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36286.json b/2020/36xxx/CVE-2020-36286.json
new file mode 100644
index 00000000000..c04ea87f8e1
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36286.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36286",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36287.json b/2020/36xxx/CVE-2020-36287.json
new file mode 100644
index 00000000000..fd98a03ccdf
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36287.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36287",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36288.json b/2020/36xxx/CVE-2020-36288.json
new file mode 100644
index 00000000000..fdd0e424d85
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36288.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36288",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36289.json b/2020/36xxx/CVE-2020-36289.json
new file mode 100644
index 00000000000..f81052a6b3c
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36289.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36289",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36290.json b/2020/36xxx/CVE-2020-36290.json
new file mode 100644
index 00000000000..e4d32f58648
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36290.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36290",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36291.json b/2020/36xxx/CVE-2020-36291.json
new file mode 100644
index 00000000000..2d69896e9b1
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36291.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36291",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36292.json b/2020/36xxx/CVE-2020-36292.json
new file mode 100644
index 00000000000..a3bab55e3a8
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36292.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36292",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36293.json b/2020/36xxx/CVE-2020-36293.json
new file mode 100644
index 00000000000..9fdb46ceff3
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36293.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36293",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36294.json b/2020/36xxx/CVE-2020-36294.json
new file mode 100644
index 00000000000..5c4cf52c773
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36294.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36294",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36295.json b/2020/36xxx/CVE-2020-36295.json
new file mode 100644
index 00000000000..4af9e2920ea
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36295.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36295",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36296.json b/2020/36xxx/CVE-2020-36296.json
new file mode 100644
index 00000000000..153d48ec6e2
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36296.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36296",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36297.json b/2020/36xxx/CVE-2020-36297.json
new file mode 100644
index 00000000000..38dbdc6f5e2
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36297.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36297",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36298.json b/2020/36xxx/CVE-2020-36298.json
new file mode 100644
index 00000000000..360c207f85d
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36298.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36298",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36299.json b/2020/36xxx/CVE-2020-36299.json
new file mode 100644
index 00000000000..7a4e38c3fe1
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36299.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36299",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36300.json b/2020/36xxx/CVE-2020-36300.json
new file mode 100644
index 00000000000..c8cadffc03f
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36300.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36300",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36301.json b/2020/36xxx/CVE-2020-36301.json
new file mode 100644
index 00000000000..3bc69c8cbb8
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36301.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36301",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36302.json b/2020/36xxx/CVE-2020-36302.json
new file mode 100644
index 00000000000..6bcf06bfd5c
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36302.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36302",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36303.json b/2020/36xxx/CVE-2020-36303.json
new file mode 100644
index 00000000000..3a5d3276036
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36303.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36303",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29837.json b/2021/29xxx/CVE-2021-29837.json
new file mode 100644
index 00000000000..07133b9c826
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29837.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29837",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29838.json b/2021/29xxx/CVE-2021-29838.json
new file mode 100644
index 00000000000..880a8a90aa1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29838.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29838",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29839.json b/2021/29xxx/CVE-2021-29839.json
new file mode 100644
index 00000000000..8ee75d3abd9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29839.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29839",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29840.json b/2021/29xxx/CVE-2021-29840.json
new file mode 100644
index 00000000000..36924b71d05
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29840.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29840",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29841.json b/2021/29xxx/CVE-2021-29841.json
new file mode 100644
index 00000000000..5e0abce1626
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29841.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29841",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29842.json b/2021/29xxx/CVE-2021-29842.json
new file mode 100644
index 00000000000..ffd6371cf8e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29842.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29842",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29843.json b/2021/29xxx/CVE-2021-29843.json
new file mode 100644
index 00000000000..862a89ffc4c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29843.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29843",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29844.json b/2021/29xxx/CVE-2021-29844.json
new file mode 100644
index 00000000000..050f58b0aa4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29844.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29844",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29845.json b/2021/29xxx/CVE-2021-29845.json
new file mode 100644
index 00000000000..854a713ad33
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29845.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29845",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29846.json b/2021/29xxx/CVE-2021-29846.json
new file mode 100644
index 00000000000..5d45a98902e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29846.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29846",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29847.json b/2021/29xxx/CVE-2021-29847.json
new file mode 100644
index 00000000000..4d8a3987fcc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29847.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29847",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29848.json b/2021/29xxx/CVE-2021-29848.json
new file mode 100644
index 00000000000..b3d77b4f0e0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29848.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29848",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29849.json b/2021/29xxx/CVE-2021-29849.json
new file mode 100644
index 00000000000..64990a8beb7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29849.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29849",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29850.json b/2021/29xxx/CVE-2021-29850.json
new file mode 100644
index 00000000000..49ddbc1225c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29850.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29850",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29851.json b/2021/29xxx/CVE-2021-29851.json
new file mode 100644
index 00000000000..d1e71bc8a8c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29851.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29851",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29852.json b/2021/29xxx/CVE-2021-29852.json
new file mode 100644
index 00000000000..88ffe9a2363
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29852.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29852",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29853.json b/2021/29xxx/CVE-2021-29853.json
new file mode 100644
index 00000000000..0b7ad9cc4e2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29853.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29853",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29854.json b/2021/29xxx/CVE-2021-29854.json
new file mode 100644
index 00000000000..ede089db8f9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29854.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29854",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29855.json b/2021/29xxx/CVE-2021-29855.json
new file mode 100644
index 00000000000..d469a260544
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29855.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29855",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29856.json b/2021/29xxx/CVE-2021-29856.json
new file mode 100644
index 00000000000..507890e4297
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29856.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29856",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29857.json b/2021/29xxx/CVE-2021-29857.json
new file mode 100644
index 00000000000..cc9f90c2ecb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29857.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29857",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29858.json b/2021/29xxx/CVE-2021-29858.json
new file mode 100644
index 00000000000..ed55f094a50
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29858.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29858",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29859.json b/2021/29xxx/CVE-2021-29859.json
new file mode 100644
index 00000000000..b83c6ada723
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29859.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29859",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29860.json b/2021/29xxx/CVE-2021-29860.json
new file mode 100644
index 00000000000..0a3c070c7cd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29860.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29860",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29861.json b/2021/29xxx/CVE-2021-29861.json
new file mode 100644
index 00000000000..c0281092879
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29861.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29861",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29862.json b/2021/29xxx/CVE-2021-29862.json
new file mode 100644
index 00000000000..45f06b995c0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29862.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29862",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29863.json b/2021/29xxx/CVE-2021-29863.json
new file mode 100644
index 00000000000..7c3cdfa8bce
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29863.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29863",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29864.json b/2021/29xxx/CVE-2021-29864.json
new file mode 100644
index 00000000000..662cdc1c441
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29864.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29864",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29865.json b/2021/29xxx/CVE-2021-29865.json
new file mode 100644
index 00000000000..c92e1fec044
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29865.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29865",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29866.json b/2021/29xxx/CVE-2021-29866.json
new file mode 100644
index 00000000000..350c67d0e9e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29866.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29866",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29867.json b/2021/29xxx/CVE-2021-29867.json
new file mode 100644
index 00000000000..e962af588ed
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29867.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29867",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29868.json b/2021/29xxx/CVE-2021-29868.json
new file mode 100644
index 00000000000..e87282bcbcd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29868.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29868",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29869.json b/2021/29xxx/CVE-2021-29869.json
new file mode 100644
index 00000000000..e794df488a4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29869.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29869",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29870.json b/2021/29xxx/CVE-2021-29870.json
new file mode 100644
index 00000000000..0073cf949fc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29870.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29870",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29871.json b/2021/29xxx/CVE-2021-29871.json
new file mode 100644
index 00000000000..de7662c1f38
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29871.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29871",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29872.json b/2021/29xxx/CVE-2021-29872.json
new file mode 100644
index 00000000000..7a530f13cd6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29872.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29872",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29873.json b/2021/29xxx/CVE-2021-29873.json
new file mode 100644
index 00000000000..46b68f0993b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29873.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29873",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29874.json b/2021/29xxx/CVE-2021-29874.json
new file mode 100644
index 00000000000..c54f32efb4d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29874.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29874",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29875.json b/2021/29xxx/CVE-2021-29875.json
new file mode 100644
index 00000000000..a241396b459
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29875.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29875",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29876.json b/2021/29xxx/CVE-2021-29876.json
new file mode 100644
index 00000000000..4b8336e3d56
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29876.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29876",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29877.json b/2021/29xxx/CVE-2021-29877.json
new file mode 100644
index 00000000000..6896868b5b5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29877.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29877",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29878.json b/2021/29xxx/CVE-2021-29878.json
new file mode 100644
index 00000000000..582761f4f4d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29878.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29878",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29879.json b/2021/29xxx/CVE-2021-29879.json
new file mode 100644
index 00000000000..96500e78954
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29879.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29879",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29880.json b/2021/29xxx/CVE-2021-29880.json
new file mode 100644
index 00000000000..400650f9606
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29880.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29880",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29881.json b/2021/29xxx/CVE-2021-29881.json
new file mode 100644
index 00000000000..a5e0ed1ef62
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29881.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29881",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29882.json b/2021/29xxx/CVE-2021-29882.json
new file mode 100644
index 00000000000..58e0eaa4cab
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29882.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29882",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29883.json b/2021/29xxx/CVE-2021-29883.json
new file mode 100644
index 00000000000..3adb425c925
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29883.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29883",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29884.json b/2021/29xxx/CVE-2021-29884.json
new file mode 100644
index 00000000000..4f5c7b370b4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29884.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29884",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29885.json b/2021/29xxx/CVE-2021-29885.json
new file mode 100644
index 00000000000..5f186995b32
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29885.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29885",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29886.json b/2021/29xxx/CVE-2021-29886.json
new file mode 100644
index 00000000000..eb39dada644
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29886.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29886",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29887.json b/2021/29xxx/CVE-2021-29887.json
new file mode 100644
index 00000000000..2cad0a9641b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29887.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29887",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29888.json b/2021/29xxx/CVE-2021-29888.json
new file mode 100644
index 00000000000..7441012683c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29888.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29888",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29889.json b/2021/29xxx/CVE-2021-29889.json
new file mode 100644
index 00000000000..e43b72f4063
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29889.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29889",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29890.json b/2021/29xxx/CVE-2021-29890.json
new file mode 100644
index 00000000000..3e4adb76ffd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29890.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29890",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29891.json b/2021/29xxx/CVE-2021-29891.json
new file mode 100644
index 00000000000..1f360c1ff51
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29891.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29891",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29892.json b/2021/29xxx/CVE-2021-29892.json
new file mode 100644
index 00000000000..87be2d0eea8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29892.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29892",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29893.json b/2021/29xxx/CVE-2021-29893.json
new file mode 100644
index 00000000000..84baf158781
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29893.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29893",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29894.json b/2021/29xxx/CVE-2021-29894.json
new file mode 100644
index 00000000000..ea6c249369c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29894.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29894",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29895.json b/2021/29xxx/CVE-2021-29895.json
new file mode 100644
index 00000000000..a90ea611cd1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29895.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29895",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29896.json b/2021/29xxx/CVE-2021-29896.json
new file mode 100644
index 00000000000..40624b634f3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29896.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29896",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29897.json b/2021/29xxx/CVE-2021-29897.json
new file mode 100644
index 00000000000..c6f1aa0cd87
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29897.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29897",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29898.json b/2021/29xxx/CVE-2021-29898.json
new file mode 100644
index 00000000000..82a2e172198
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29898.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29898",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29899.json b/2021/29xxx/CVE-2021-29899.json
new file mode 100644
index 00000000000..db8437780a6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29899.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29899",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29900.json b/2021/29xxx/CVE-2021-29900.json
new file mode 100644
index 00000000000..2b70379b6d9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29900.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29900",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29901.json b/2021/29xxx/CVE-2021-29901.json
new file mode 100644
index 00000000000..314ce6a3b8a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29901.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29901",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29902.json b/2021/29xxx/CVE-2021-29902.json
new file mode 100644
index 00000000000..b3164d43995
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29902.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29902",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29903.json b/2021/29xxx/CVE-2021-29903.json
new file mode 100644
index 00000000000..fb030541073
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29903.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29903",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29904.json b/2021/29xxx/CVE-2021-29904.json
new file mode 100644
index 00000000000..9ee6895c378
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29904.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29904",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29905.json b/2021/29xxx/CVE-2021-29905.json
new file mode 100644
index 00000000000..e7ebf088d94
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29905.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29905",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29906.json b/2021/29xxx/CVE-2021-29906.json
new file mode 100644
index 00000000000..8e0dc41557b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29906.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29906",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29907.json b/2021/29xxx/CVE-2021-29907.json
new file mode 100644
index 00000000000..5c22f72900d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29907.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29907",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29908.json b/2021/29xxx/CVE-2021-29908.json
new file mode 100644
index 00000000000..fe50ea12380
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29908.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29908",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29909.json b/2021/29xxx/CVE-2021-29909.json
new file mode 100644
index 00000000000..646a568c90c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29909.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29909",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29910.json b/2021/29xxx/CVE-2021-29910.json
new file mode 100644
index 00000000000..083219280c9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29910.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29910",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29911.json b/2021/29xxx/CVE-2021-29911.json
new file mode 100644
index 00000000000..cbda718e18a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29911.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29911",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29912.json b/2021/29xxx/CVE-2021-29912.json
new file mode 100644
index 00000000000..9f59c07dc77
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29912.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29912",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29913.json b/2021/29xxx/CVE-2021-29913.json
new file mode 100644
index 00000000000..ffbbeed458d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29913.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29913",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3133.json b/2021/3xxx/CVE-2021-3133.json
index 25c80f99e9d..dfa3888f628 100644
--- a/2021/3xxx/CVE-2021-3133.json
+++ b/2021/3xxx/CVE-2021-3133.json
@@ -61,6 +61,11 @@
                 "url": "https://wordpress.org/plugins/sb-elementor-contact-form-db/#developers",
                 "refsource": "MISC",
                 "name": "https://wordpress.org/plugins/sb-elementor-contact-form-db/#developers"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://advisory.checkmarx.net/advisory/CX-2020-4293",
+                "url": "https://advisory.checkmarx.net/advisory/CX-2020-4293"
             }
         ]
     }

From 05d29be2c36348f65bb9a72fdc0111a687a9d6b9 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 21:01:12 +0000
Subject: [PATCH 803/845] "-Synchronized-Data."

---
 2020/36xxx/CVE-2020-36304.json | 18 ++++++++++++++++++
 2020/36xxx/CVE-2020-36305.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29664.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29665.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29666.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29667.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29668.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29669.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29670.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29671.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29672.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29673.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29674.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29675.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29676.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29677.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29678.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29679.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29680.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29681.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29682.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29683.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29684.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29685.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29686.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29687.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29688.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29689.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29690.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29691.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29692.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29693.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29694.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29695.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29696.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29697.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29698.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29699.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29700.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29701.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29702.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29703.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29704.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29705.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29706.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29707.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29708.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29709.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29710.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29711.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29712.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29713.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29714.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29715.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29716.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29717.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29718.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29719.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29720.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29721.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29722.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29723.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29724.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29725.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29726.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29727.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29728.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29729.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29730.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29731.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29732.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29733.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29734.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29735.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29736.json | 18 ++++++++++++++++++
 75 files changed, 1350 insertions(+)
 create mode 100644 2020/36xxx/CVE-2020-36304.json
 create mode 100644 2020/36xxx/CVE-2020-36305.json
 create mode 100644 2021/29xxx/CVE-2021-29664.json
 create mode 100644 2021/29xxx/CVE-2021-29665.json
 create mode 100644 2021/29xxx/CVE-2021-29666.json
 create mode 100644 2021/29xxx/CVE-2021-29667.json
 create mode 100644 2021/29xxx/CVE-2021-29668.json
 create mode 100644 2021/29xxx/CVE-2021-29669.json
 create mode 100644 2021/29xxx/CVE-2021-29670.json
 create mode 100644 2021/29xxx/CVE-2021-29671.json
 create mode 100644 2021/29xxx/CVE-2021-29672.json
 create mode 100644 2021/29xxx/CVE-2021-29673.json
 create mode 100644 2021/29xxx/CVE-2021-29674.json
 create mode 100644 2021/29xxx/CVE-2021-29675.json
 create mode 100644 2021/29xxx/CVE-2021-29676.json
 create mode 100644 2021/29xxx/CVE-2021-29677.json
 create mode 100644 2021/29xxx/CVE-2021-29678.json
 create mode 100644 2021/29xxx/CVE-2021-29679.json
 create mode 100644 2021/29xxx/CVE-2021-29680.json
 create mode 100644 2021/29xxx/CVE-2021-29681.json
 create mode 100644 2021/29xxx/CVE-2021-29682.json
 create mode 100644 2021/29xxx/CVE-2021-29683.json
 create mode 100644 2021/29xxx/CVE-2021-29684.json
 create mode 100644 2021/29xxx/CVE-2021-29685.json
 create mode 100644 2021/29xxx/CVE-2021-29686.json
 create mode 100644 2021/29xxx/CVE-2021-29687.json
 create mode 100644 2021/29xxx/CVE-2021-29688.json
 create mode 100644 2021/29xxx/CVE-2021-29689.json
 create mode 100644 2021/29xxx/CVE-2021-29690.json
 create mode 100644 2021/29xxx/CVE-2021-29691.json
 create mode 100644 2021/29xxx/CVE-2021-29692.json
 create mode 100644 2021/29xxx/CVE-2021-29693.json
 create mode 100644 2021/29xxx/CVE-2021-29694.json
 create mode 100644 2021/29xxx/CVE-2021-29695.json
 create mode 100644 2021/29xxx/CVE-2021-29696.json
 create mode 100644 2021/29xxx/CVE-2021-29697.json
 create mode 100644 2021/29xxx/CVE-2021-29698.json
 create mode 100644 2021/29xxx/CVE-2021-29699.json
 create mode 100644 2021/29xxx/CVE-2021-29700.json
 create mode 100644 2021/29xxx/CVE-2021-29701.json
 create mode 100644 2021/29xxx/CVE-2021-29702.json
 create mode 100644 2021/29xxx/CVE-2021-29703.json
 create mode 100644 2021/29xxx/CVE-2021-29704.json
 create mode 100644 2021/29xxx/CVE-2021-29705.json
 create mode 100644 2021/29xxx/CVE-2021-29706.json
 create mode 100644 2021/29xxx/CVE-2021-29707.json
 create mode 100644 2021/29xxx/CVE-2021-29708.json
 create mode 100644 2021/29xxx/CVE-2021-29709.json
 create mode 100644 2021/29xxx/CVE-2021-29710.json
 create mode 100644 2021/29xxx/CVE-2021-29711.json
 create mode 100644 2021/29xxx/CVE-2021-29712.json
 create mode 100644 2021/29xxx/CVE-2021-29713.json
 create mode 100644 2021/29xxx/CVE-2021-29714.json
 create mode 100644 2021/29xxx/CVE-2021-29715.json
 create mode 100644 2021/29xxx/CVE-2021-29716.json
 create mode 100644 2021/29xxx/CVE-2021-29717.json
 create mode 100644 2021/29xxx/CVE-2021-29718.json
 create mode 100644 2021/29xxx/CVE-2021-29719.json
 create mode 100644 2021/29xxx/CVE-2021-29720.json
 create mode 100644 2021/29xxx/CVE-2021-29721.json
 create mode 100644 2021/29xxx/CVE-2021-29722.json
 create mode 100644 2021/29xxx/CVE-2021-29723.json
 create mode 100644 2021/29xxx/CVE-2021-29724.json
 create mode 100644 2021/29xxx/CVE-2021-29725.json
 create mode 100644 2021/29xxx/CVE-2021-29726.json
 create mode 100644 2021/29xxx/CVE-2021-29727.json
 create mode 100644 2021/29xxx/CVE-2021-29728.json
 create mode 100644 2021/29xxx/CVE-2021-29729.json
 create mode 100644 2021/29xxx/CVE-2021-29730.json
 create mode 100644 2021/29xxx/CVE-2021-29731.json
 create mode 100644 2021/29xxx/CVE-2021-29732.json
 create mode 100644 2021/29xxx/CVE-2021-29733.json
 create mode 100644 2021/29xxx/CVE-2021-29734.json
 create mode 100644 2021/29xxx/CVE-2021-29735.json
 create mode 100644 2021/29xxx/CVE-2021-29736.json

diff --git a/2020/36xxx/CVE-2020-36304.json b/2020/36xxx/CVE-2020-36304.json
new file mode 100644
index 00000000000..79f21bc74ad
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36304.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36304",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2020/36xxx/CVE-2020-36305.json b/2020/36xxx/CVE-2020-36305.json
new file mode 100644
index 00000000000..81754a0fa33
--- /dev/null
+++ b/2020/36xxx/CVE-2020-36305.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2020-36305",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29664.json b/2021/29xxx/CVE-2021-29664.json
new file mode 100644
index 00000000000..884c57b2bd8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29664.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29664",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29665.json b/2021/29xxx/CVE-2021-29665.json
new file mode 100644
index 00000000000..b4030fd4064
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29665.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29665",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29666.json b/2021/29xxx/CVE-2021-29666.json
new file mode 100644
index 00000000000..9db15881ae0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29666.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29666",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29667.json b/2021/29xxx/CVE-2021-29667.json
new file mode 100644
index 00000000000..fa288399b13
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29667.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29667",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29668.json b/2021/29xxx/CVE-2021-29668.json
new file mode 100644
index 00000000000..056d12a8a83
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29668.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29668",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29669.json b/2021/29xxx/CVE-2021-29669.json
new file mode 100644
index 00000000000..42f57419456
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29669.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29669",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29670.json b/2021/29xxx/CVE-2021-29670.json
new file mode 100644
index 00000000000..a7d43557185
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29670.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29670",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29671.json b/2021/29xxx/CVE-2021-29671.json
new file mode 100644
index 00000000000..b3a88c8d08b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29671.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29671",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29672.json b/2021/29xxx/CVE-2021-29672.json
new file mode 100644
index 00000000000..33b965c707d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29672.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29672",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29673.json b/2021/29xxx/CVE-2021-29673.json
new file mode 100644
index 00000000000..3d6b39e74ad
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29673.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29673",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29674.json b/2021/29xxx/CVE-2021-29674.json
new file mode 100644
index 00000000000..fc01c8b1ca2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29674.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29674",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29675.json b/2021/29xxx/CVE-2021-29675.json
new file mode 100644
index 00000000000..4136d6f5e6f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29675.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29675",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29676.json b/2021/29xxx/CVE-2021-29676.json
new file mode 100644
index 00000000000..0c75807e017
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29676.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29676",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29677.json b/2021/29xxx/CVE-2021-29677.json
new file mode 100644
index 00000000000..d51d699ff13
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29677.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29677",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29678.json b/2021/29xxx/CVE-2021-29678.json
new file mode 100644
index 00000000000..08501510b0d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29678.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29678",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29679.json b/2021/29xxx/CVE-2021-29679.json
new file mode 100644
index 00000000000..bde90fb12f1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29679.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29679",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29680.json b/2021/29xxx/CVE-2021-29680.json
new file mode 100644
index 00000000000..25004083ae3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29680.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29680",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29681.json b/2021/29xxx/CVE-2021-29681.json
new file mode 100644
index 00000000000..a12d63c54d7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29681.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29681",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29682.json b/2021/29xxx/CVE-2021-29682.json
new file mode 100644
index 00000000000..f3c6f208518
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29682.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29682",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29683.json b/2021/29xxx/CVE-2021-29683.json
new file mode 100644
index 00000000000..30749fbfd13
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29683.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29683",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29684.json b/2021/29xxx/CVE-2021-29684.json
new file mode 100644
index 00000000000..b9d0ad11eff
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29684.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29684",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29685.json b/2021/29xxx/CVE-2021-29685.json
new file mode 100644
index 00000000000..6059d9183ba
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29685.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29685",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29686.json b/2021/29xxx/CVE-2021-29686.json
new file mode 100644
index 00000000000..c2e94491b30
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29686.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29686",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29687.json b/2021/29xxx/CVE-2021-29687.json
new file mode 100644
index 00000000000..d8a1ab43979
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29687.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29687",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29688.json b/2021/29xxx/CVE-2021-29688.json
new file mode 100644
index 00000000000..e83980a30e2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29688.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29688",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29689.json b/2021/29xxx/CVE-2021-29689.json
new file mode 100644
index 00000000000..2462d64e726
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29689.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29689",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29690.json b/2021/29xxx/CVE-2021-29690.json
new file mode 100644
index 00000000000..116e9b04b64
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29690.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29690",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29691.json b/2021/29xxx/CVE-2021-29691.json
new file mode 100644
index 00000000000..bd8800564f4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29691.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29691",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29692.json b/2021/29xxx/CVE-2021-29692.json
new file mode 100644
index 00000000000..76ee957664d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29692.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29692",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29693.json b/2021/29xxx/CVE-2021-29693.json
new file mode 100644
index 00000000000..8df7d3c0eda
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29693.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29693",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29694.json b/2021/29xxx/CVE-2021-29694.json
new file mode 100644
index 00000000000..517e5938fc0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29694.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29694",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29695.json b/2021/29xxx/CVE-2021-29695.json
new file mode 100644
index 00000000000..8f112f3e3cb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29695.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29695",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29696.json b/2021/29xxx/CVE-2021-29696.json
new file mode 100644
index 00000000000..bba1c63d9e8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29696.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29696",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29697.json b/2021/29xxx/CVE-2021-29697.json
new file mode 100644
index 00000000000..41a1db072dd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29697.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29697",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29698.json b/2021/29xxx/CVE-2021-29698.json
new file mode 100644
index 00000000000..1d991f017ae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29698.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29698",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29699.json b/2021/29xxx/CVE-2021-29699.json
new file mode 100644
index 00000000000..97145378455
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29699.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29699",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29700.json b/2021/29xxx/CVE-2021-29700.json
new file mode 100644
index 00000000000..6228a2c0718
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29700.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29700",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29701.json b/2021/29xxx/CVE-2021-29701.json
new file mode 100644
index 00000000000..bd077ab9119
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29701.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29701",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29702.json b/2021/29xxx/CVE-2021-29702.json
new file mode 100644
index 00000000000..10014f74dfa
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29702.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29702",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29703.json b/2021/29xxx/CVE-2021-29703.json
new file mode 100644
index 00000000000..c6644b6d450
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29703.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29703",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29704.json b/2021/29xxx/CVE-2021-29704.json
new file mode 100644
index 00000000000..47d3088d07a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29704.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29704",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29705.json b/2021/29xxx/CVE-2021-29705.json
new file mode 100644
index 00000000000..1d46e53bc76
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29705.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29705",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29706.json b/2021/29xxx/CVE-2021-29706.json
new file mode 100644
index 00000000000..9f9c17dedb7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29706.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29706",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29707.json b/2021/29xxx/CVE-2021-29707.json
new file mode 100644
index 00000000000..b5270e7a63c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29707.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29707",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29708.json b/2021/29xxx/CVE-2021-29708.json
new file mode 100644
index 00000000000..87fd762a821
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29708.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29708",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29709.json b/2021/29xxx/CVE-2021-29709.json
new file mode 100644
index 00000000000..c41a82db41d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29709.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29709",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29710.json b/2021/29xxx/CVE-2021-29710.json
new file mode 100644
index 00000000000..d332543cbf3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29710.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29710",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29711.json b/2021/29xxx/CVE-2021-29711.json
new file mode 100644
index 00000000000..1c92e9e5c0e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29711.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29711",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29712.json b/2021/29xxx/CVE-2021-29712.json
new file mode 100644
index 00000000000..4647cffe26f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29712.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29712",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29713.json b/2021/29xxx/CVE-2021-29713.json
new file mode 100644
index 00000000000..1373049282d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29713.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29713",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29714.json b/2021/29xxx/CVE-2021-29714.json
new file mode 100644
index 00000000000..7d24caa95e0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29714.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29714",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29715.json b/2021/29xxx/CVE-2021-29715.json
new file mode 100644
index 00000000000..9932c72f23b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29715.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29715",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29716.json b/2021/29xxx/CVE-2021-29716.json
new file mode 100644
index 00000000000..db358772017
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29716.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29716",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29717.json b/2021/29xxx/CVE-2021-29717.json
new file mode 100644
index 00000000000..9e945ea9388
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29717.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29717",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29718.json b/2021/29xxx/CVE-2021-29718.json
new file mode 100644
index 00000000000..ff2800211c0
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29718.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29718",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29719.json b/2021/29xxx/CVE-2021-29719.json
new file mode 100644
index 00000000000..67b171ca612
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29719.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29719",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29720.json b/2021/29xxx/CVE-2021-29720.json
new file mode 100644
index 00000000000..4260ac810a4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29720.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29720",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29721.json b/2021/29xxx/CVE-2021-29721.json
new file mode 100644
index 00000000000..03865e93d07
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29721.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29721",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29722.json b/2021/29xxx/CVE-2021-29722.json
new file mode 100644
index 00000000000..c7736466f73
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29722.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29722",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29723.json b/2021/29xxx/CVE-2021-29723.json
new file mode 100644
index 00000000000..52339bad46e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29723.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29723",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29724.json b/2021/29xxx/CVE-2021-29724.json
new file mode 100644
index 00000000000..7da5c6099ee
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29724.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29724",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29725.json b/2021/29xxx/CVE-2021-29725.json
new file mode 100644
index 00000000000..f24196c59b4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29725.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29725",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29726.json b/2021/29xxx/CVE-2021-29726.json
new file mode 100644
index 00000000000..e697d74d560
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29726.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29726",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29727.json b/2021/29xxx/CVE-2021-29727.json
new file mode 100644
index 00000000000..57f4ee4a27c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29727.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29727",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29728.json b/2021/29xxx/CVE-2021-29728.json
new file mode 100644
index 00000000000..81bae4e1b8f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29728.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29728",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29729.json b/2021/29xxx/CVE-2021-29729.json
new file mode 100644
index 00000000000..df72eca6747
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29729.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29729",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29730.json b/2021/29xxx/CVE-2021-29730.json
new file mode 100644
index 00000000000..cd9454e96fb
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29730.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29730",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29731.json b/2021/29xxx/CVE-2021-29731.json
new file mode 100644
index 00000000000..d43c64c685b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29731.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29731",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29732.json b/2021/29xxx/CVE-2021-29732.json
new file mode 100644
index 00000000000..6e111e3aff2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29732.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29732",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29733.json b/2021/29xxx/CVE-2021-29733.json
new file mode 100644
index 00000000000..b9359999c91
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29733.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29733",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29734.json b/2021/29xxx/CVE-2021-29734.json
new file mode 100644
index 00000000000..f6573405621
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29734.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29734",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29735.json b/2021/29xxx/CVE-2021-29735.json
new file mode 100644
index 00000000000..e42ce81c7ca
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29735.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29735",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29736.json b/2021/29xxx/CVE-2021-29736.json
new file mode 100644
index 00000000000..360af319861
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29736.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29736",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From fbe1222577585f8598cbe5004f8b6acc9bf516a0 Mon Sep 17 00:00:00 2001
From: Monsieur Francis Perron 
Date: Wed, 31 Mar 2021 23:05:25 +0200
Subject: [PATCH 804/845] GAEN Verification CVE-2021-22538 initial commit

---
 2021/22xxx/CVE-2021-22538.json | 106 ++++++++++++++++++++++++++++++---
 1 file changed, 99 insertions(+), 7 deletions(-)

diff --git a/2021/22xxx/CVE-2021-22538.json b/2021/22xxx/CVE-2021-22538.json
index 55716565cee..c99e02a596b 100644
--- a/2021/22xxx/CVE-2021-22538.json
+++ b/2021/22xxx/CVE-2021-22538.json
@@ -1,18 +1,110 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@google.com",
         "ID": "CVE-2021-22538",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Privilege escalation in RBAC system"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Exposure Notifications Verification Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "platform": "all",
+                                            "version_affected": "<=",
+                                            "version_name": "stable",
+                                            "version_value": "0.23.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Google LLC"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Michael Mazzolini (Ethical Hacker at WHO)"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A privilege escalation vulnerability impacting the Google Exposure Notification Verification Server (versions prior to 0.23.1), allows an attacker who (1) has UserWrite permissions and (2) is using a carefully crafted request or malicious proxy, to create another user with higher privileges than their own. This occurs due to insufficient checks on the allowed set of permissions. The new user creation event would be captured in the Event Log."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "baseScore": 6.3,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-20 Improper Input Validation"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6"
+            },
+            {
+                "name": "https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95"
+            },
+            {
+                "name": "https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1"
+            },
+            {
+                "name": "https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}
+

From 0067d530c8549641da87329b2233dbb2949960e5 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 22:00:43 +0000
Subject: [PATCH 805/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13933.json |  5 +++
 2020/17xxx/CVE-2020-17510.json |  5 +++
 2020/17xxx/CVE-2020-17523.json |  5 +++
 2020/24xxx/CVE-2020-24550.json | 56 ++++++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27220.json | 56 ++++++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27349.json | 56 ++++++++++++++++++++++++++++++----
 2021/27xxx/CVE-2021-27358.json |  7 ++++-
 7 files changed, 171 insertions(+), 19 deletions(-)

diff --git a/2020/13xxx/CVE-2020-13933.json b/2020/13xxx/CVE-2020-13933.json
index e7b0e9d022b..531079e778d 100644
--- a/2020/13xxx/CVE-2020-13933.json
+++ b/2020/13xxx/CVE-2020-13933.json
@@ -103,6 +103,11 @@
                 "refsource": "MLIST",
                 "name": "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix",
                 "url": "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[shiro-dev] 20210331 Re: Request for assistance to backport CVE-2020-13933 fix",
+                "url": "https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E"
             }
         ]
     },
diff --git a/2020/17xxx/CVE-2020-17510.json b/2020/17xxx/CVE-2020-17510.json
index a10ff922fcf..6aebd30d489 100644
--- a/2020/17xxx/CVE-2020-17510.json
+++ b/2020/17xxx/CVE-2020-17510.json
@@ -73,6 +73,11 @@
                 "refsource": "MLIST",
                 "name": "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix",
                 "url": "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[shiro-dev] 20210331 Re: Request for assistance to backport CVE-2020-13933 fix",
+                "url": "https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E"
             }
         ]
     },
diff --git a/2020/17xxx/CVE-2020-17523.json b/2020/17xxx/CVE-2020-17523.json
index a18122b2a15..80246f100f1 100644
--- a/2020/17xxx/CVE-2020-17523.json
+++ b/2020/17xxx/CVE-2020-17523.json
@@ -58,6 +58,11 @@
                 "refsource": "MLIST",
                 "name": "[activemq-issues] 20210301 [jira] [Created] (AMQ-8159) High severity security issues found in Apache Shiro v.1.7.0",
                 "url": "https://lists.apache.org/thread.html/rd4b613e121438b97e3eb263cac3137caddb1dbd8f648b73a4f1898a6@%3Cissues.activemq.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[shiro-dev] 20210331 Re: Request for assistance to backport CVE-2020-13933 fix",
+                "url": "https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E"
             }
         ]
     },
diff --git a/2020/24xxx/CVE-2020-24550.json b/2020/24xxx/CVE-2020-24550.json
index 5d681486626..3ebd1760724 100644
--- a/2020/24xxx/CVE-2020-24550.json
+++ b/2020/24xxx/CVE-2020-24550.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-24550",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-24550",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/",
+                "url": "https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27220.json b/2021/27xxx/CVE-2021-27220.json
index f62dfbe14cf..9b3330d06c1 100644
--- a/2021/27xxx/CVE-2021-27220.json
+++ b/2021/27xxx/CVE-2021-27220.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27220",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27220",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.paessler.com/prtg/history/stable#21.1.66.1623",
+                "url": "https://www.paessler.com/prtg/history/stable#21.1.66.1623"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27349.json b/2021/27xxx/CVE-2021-27349.json
index ab81c741db4..a18e80176f3 100644
--- a/2021/27xxx/CVE-2021-27349.json
+++ b/2021/27xxx/CVE-2021-27349.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-27349",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-27349",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Advanced Order Export before 3.1.8 for WooCommerce allows XSS, a different vulnerability than CVE-2020-11727."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://wordpress.org/plugins/woo-order-export-lite/#developers",
+                "refsource": "MISC",
+                "name": "https://wordpress.org/plugins/woo-order-export-lite/#developers"
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27358.json b/2021/27xxx/CVE-2021-27358.json
index 7f4ea029781..aba8205fd68 100644
--- a/2021/27xxx/CVE-2021-27358.json
+++ b/2021/27xxx/CVE-2021-27358.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "The snapshot feature in Grafana before 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set."
+                "value": "The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set."
             }
         ]
     },
@@ -61,6 +61,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/",
                 "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17",
+                "url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17"
             }
         ]
     }

From af26b077983034c6c42f8ef94ac82b0ffc516263 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Wed, 31 Mar 2021 23:00:37 +0000
Subject: [PATCH 806/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28994.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29349.json | 56 ++++++++++++++++++++++++++++++----
 2 files changed, 100 insertions(+), 12 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28994.json b/2021/28xxx/CVE-2021-28994.json
index a1a5300d952..6950c38d6ee 100644
--- a/2021/28xxx/CVE-2021-28994.json
+++ b/2021/28xxx/CVE-2021-28994.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28994",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28994",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "kopano-ical (formerly zarafa-ical) in Kopano Groupware Core through 8.7.16, 9.x through 9.1.0, 10.x through 10.0.7, and 11.x through 11.0.1 and Zarafa 6.30.x through 7.2.x allows memory exhaustion via long HTTP headers."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.openwall.com/lists/oss-security/2021/03/19/6",
+                "refsource": "MISC",
+                "name": "https://www.openwall.com/lists/oss-security/2021/03/19/6"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29349.json b/2021/29xxx/CVE-2021-29349.json
index a37ecf55442..5f4706ca28c 100644
--- a/2021/29xxx/CVE-2021-29349.json
+++ b/2021/29xxx/CVE-2021-29349.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29349",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29349",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/0xBaz/CVE-2021-29349/issues/1",
+                "url": "https://github.com/0xBaz/CVE-2021-29349/issues/1"
             }
         ]
     }

From a9fe4d796da186d82f465cee6384e8fa44f2447c Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 00:00:39 +0000
Subject: [PATCH 807/845] "-Synchronized-Data."

---
 2020/8xxx/CVE-2020-8169.json   | 5 +++++
 2020/8xxx/CVE-2020-8177.json   | 5 +++++
 2020/8xxx/CVE-2020-8231.json   | 5 +++++
 2020/8xxx/CVE-2020-8284.json   | 5 +++++
 2020/8xxx/CVE-2020-8285.json   | 5 +++++
 2020/8xxx/CVE-2020-8286.json   | 5 +++++
 2021/23xxx/CVE-2021-23358.json | 5 +++++
 7 files changed, 35 insertions(+)

diff --git a/2020/8xxx/CVE-2020-8169.json b/2020/8xxx/CVE-2020-8169.json
index f3ace708336..93f5c217dea 100644
--- a/2020/8xxx/CVE-2020-8169.json
+++ b/2020/8xxx/CVE-2020-8169.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://curl.se/docs/CVE-2020-8169.html",
                 "url": "https://curl.se/docs/CVE-2020-8169.html"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4881",
+                "url": "https://www.debian.org/security/2021/dsa-4881"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8177.json b/2020/8xxx/CVE-2020-8177.json
index 50da1480ef6..43de141388b 100644
--- a/2020/8xxx/CVE-2020-8177.json
+++ b/2020/8xxx/CVE-2020-8177.json
@@ -53,6 +53,11 @@
                 "refsource": "MISC",
                 "name": "https://curl.se/docs/CVE-2020-8177.html",
                 "url": "https://curl.se/docs/CVE-2020-8177.html"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4881",
+                "url": "https://www.debian.org/security/2021/dsa-4881"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8231.json b/2020/8xxx/CVE-2020-8231.json
index 3ae461d000b..c52a41d303d 100644
--- a/2020/8xxx/CVE-2020-8231.json
+++ b/2020/8xxx/CVE-2020-8231.json
@@ -58,6 +58,11 @@
                 "refsource": "GENTOO",
                 "name": "GLSA-202012-14",
                 "url": "https://security.gentoo.org/glsa/202012-14"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4881",
+                "url": "https://www.debian.org/security/2021/dsa-4881"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8284.json b/2020/8xxx/CVE-2020-8284.json
index 0ac143c3238..0108dd097fc 100644
--- a/2020/8xxx/CVE-2020-8284.json
+++ b/2020/8xxx/CVE-2020-8284.json
@@ -78,6 +78,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
                 "url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4881",
+                "url": "https://www.debian.org/security/2021/dsa-4881"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8285.json b/2020/8xxx/CVE-2020-8285.json
index a07c9cb00af..e3fc02ecdfd 100644
--- a/2020/8xxx/CVE-2020-8285.json
+++ b/2020/8xxx/CVE-2020-8285.json
@@ -83,6 +83,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
                 "url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4881",
+                "url": "https://www.debian.org/security/2021/dsa-4881"
             }
         ]
     },
diff --git a/2020/8xxx/CVE-2020-8286.json b/2020/8xxx/CVE-2020-8286.json
index 9cc00b557d2..f14e0115c45 100644
--- a/2020/8xxx/CVE-2020-8286.json
+++ b/2020/8xxx/CVE-2020-8286.json
@@ -78,6 +78,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
                 "url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
+            },
+            {
+                "refsource": "DEBIAN",
+                "name": "DSA-4881",
+                "url": "https://www.debian.org/security/2021/dsa-4881"
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23358.json b/2021/23xxx/CVE-2021-23358.json
index 1072afa2f40..a954a452584 100644
--- a/2021/23xxx/CVE-2021-23358.json
+++ b/2021/23xxx/CVE-2021-23358.json
@@ -83,6 +83,11 @@
                 "refsource": "MISC",
                 "url": "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71",
                 "name": "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2613-1] underscore security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html"
             }
         ]
     },

From 633d5c9c289cebc4ed349695bf1aa8389c15ddc3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 02:00:40 +0000
Subject: [PATCH 808/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29914.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29915.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29916.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29917.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29918.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29919.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29920.json | 18 ++++++++++++++++++
 7 files changed, 126 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29914.json
 create mode 100644 2021/29xxx/CVE-2021-29915.json
 create mode 100644 2021/29xxx/CVE-2021-29916.json
 create mode 100644 2021/29xxx/CVE-2021-29917.json
 create mode 100644 2021/29xxx/CVE-2021-29918.json
 create mode 100644 2021/29xxx/CVE-2021-29919.json
 create mode 100644 2021/29xxx/CVE-2021-29920.json

diff --git a/2021/29xxx/CVE-2021-29914.json b/2021/29xxx/CVE-2021-29914.json
new file mode 100644
index 00000000000..64459e79bce
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29914.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29914",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29915.json b/2021/29xxx/CVE-2021-29915.json
new file mode 100644
index 00000000000..b0c8282d4ec
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29915.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29915",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29916.json b/2021/29xxx/CVE-2021-29916.json
new file mode 100644
index 00000000000..429b13bf535
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29916.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29916",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29917.json b/2021/29xxx/CVE-2021-29917.json
new file mode 100644
index 00000000000..8036977ac52
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29917.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29917",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29918.json b/2021/29xxx/CVE-2021-29918.json
new file mode 100644
index 00000000000..5df4109b30a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29918.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29918",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29919.json b/2021/29xxx/CVE-2021-29919.json
new file mode 100644
index 00000000000..2dea9bf5e93
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29919.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29919",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29920.json b/2021/29xxx/CVE-2021-29920.json
new file mode 100644
index 00000000000..9ca36076617
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29920.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29920",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From dd89c81116c05d29c9ed1da19373b3c24725bec8 Mon Sep 17 00:00:00 2001
From: David Black 
Date: Thu, 1 Apr 2021 13:25:29 +1100
Subject: [PATCH 809/845] Add CVE-2020-36238 CVE-2021-26071

---
 2020/36xxx/CVE-2020-36238.json | 117 ++++++++++++++++++++++++++++-----
 2021/26xxx/CVE-2021-26071.json | 117 ++++++++++++++++++++++++++++-----
 2 files changed, 204 insertions(+), 30 deletions(-)

diff --git a/2020/36xxx/CVE-2020-36238.json b/2020/36xxx/CVE-2020-36238.json
index 24057dac4a4..cf242ab6c12 100644
--- a/2020/36xxx/CVE-2020-36238.json
+++ b/2020/36xxx/CVE-2020-36238.json
@@ -1,18 +1,105 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-36238",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta": {
+      "ASSIGNER": "security@atlassian.com",
+      "DATE_PUBLIC": "2021-04-01T00:00:00",
+      "ID": "CVE-2020-36238",
+      "STATE": "PUBLIC"
+   },
+   "affects": {
+      "vendor": {
+         "vendor_data": [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product": {
+                  "product_data": [
+                     {
+                        "product_name": "Jira Server",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.13",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.5",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name": "Jira Data Center",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.13",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.5",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name": "Atlassian"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format": "MITRE",
+   "data_type": "CVE",
+   "data_version": "4.0",
+   "description": {
+      "description_data": [
+         {
+            "lang": "eng",
+            "value": "The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check."
+         }
+      ]
+   },
+   "problemtype": {
+      "problemtype_data": [
+         {
+            "description": [
+               {
+                  "lang": "eng",
+                  "value": "Incorrect Authorization (CWE-863)"
+               }
+            ]
+         }
+      ]
+   },
+   "references": {
+      "reference_data": [
+         {
+            "url": "https://jira.atlassian.com/browse/JRASERVER-72249"
+         }
+      ]
+   }
+}
diff --git a/2021/26xxx/CVE-2021-26071.json b/2021/26xxx/CVE-2021-26071.json
index d35f0e16da6..e131b8024ed 100644
--- a/2021/26xxx/CVE-2021-26071.json
+++ b/2021/26xxx/CVE-2021-26071.json
@@ -1,18 +1,105 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-26071",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta": {
+      "ASSIGNER": "security@atlassian.com",
+      "DATE_PUBLIC": "2021-04-01T00:00:00",
+      "ID": "CVE-2021-26071",
+      "STATE": "PUBLIC"
+   },
+   "affects": {
+      "vendor": {
+         "vendor_data": [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product": {
+                  "product_data": [
+                     {
+                        "product_name": "Jira Server",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.13",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.5",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name": "Jira Data Center",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.13",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.5",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name": "Atlassian"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format": "MITRE",
+   "data_type": "CVE",
+   "data_version": "4.0",
+   "description": {
+      "description_data": [
+         {
+            "lang": "eng",
+            "value": "The SetFeatureEnabled.jspa resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF) vulnerability."
+         }
+      ]
+   },
+   "problemtype": {
+      "problemtype_data": [
+         {
+            "description": [
+               {
+                  "lang": "eng",
+                  "value": "Cross-Site Request Forgery (CSRF)"
+               }
+            ]
+         }
+      ]
+   },
+   "references": {
+      "reference_data": [
+         {
+            "url": "https://jira.atlassian.com/browse/JRASERVER-72233"
+         }
+      ]
+   }
+}

From 77ce334a40ec7020d95c49fd4c7f6099dd7144f1 Mon Sep 17 00:00:00 2001
From: David Black 
Date: Thu, 1 Apr 2021 13:59:41 +1100
Subject: [PATCH 810/845] Add CVE-2020-36286

---
 2020/36xxx/CVE-2020-36286.json | 117 ++++++++++++++++++++++++++++-----
 1 file changed, 102 insertions(+), 15 deletions(-)

diff --git a/2020/36xxx/CVE-2020-36286.json b/2020/36xxx/CVE-2020-36286.json
index c04ea87f8e1..36e5b208c99 100644
--- a/2020/36xxx/CVE-2020-36286.json
+++ b/2020/36xxx/CVE-2020-36286.json
@@ -1,18 +1,105 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2020-36286",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta": {
+      "ASSIGNER": "security@atlassian.com",
+      "DATE_PUBLIC": "2021-04-01T00:00:00",
+      "ID": "CVE-2020-36286",
+      "STATE": "PUBLIC"
+   },
+   "affects": {
+      "vendor": {
+         "vendor_data": [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product": {
+                  "product_data": [
+                     {
+                        "product_name": "Jira Server",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.13",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.5",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name": "Jira Data Center",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "8.5.13",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.6.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.13.5",
+                                 "version_affected": "<"
+                              },
+                              {
+                                 "version_value": "8.14.0",
+                                 "version_affected": ">="
+                              },
+                              {
+                                 "version_value": "8.15.1",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name": "Atlassian"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format": "MITRE",
+   "data_type": "CVE",
+   "data_version": "4.0",
+   "description": {
+      "description_data": [
+         {
+            "lang": "eng",
+            "value": "The membersOf of JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
+         }
+      ]
+   },
+   "problemtype": {
+      "problemtype_data": [
+         {
+            "description": [
+               {
+                  "lang": "eng",
+                  "value": "Information Disclosure"
+               }
+            ]
+         }
+      ]
+   },
+   "references": {
+      "reference_data": [
+         {
+            "url": "https://jira.atlassian.com/browse/JRASERVER-72272"
+         }
+      ]
+   }
+}

From c53722f26b3fb59de7b60c7f08d6f9ad726e6ca8 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 03:00:42 +0000
Subject: [PATCH 811/845] "-Synchronized-Data."

---
 2020/36xxx/CVE-2020-36238.json | 208 +++++++++++++++++----------------
 2021/21xxx/CVE-2021-21295.json |   5 +
 2021/26xxx/CVE-2021-26071.json | 208 +++++++++++++++++----------------
 2021/29xxx/CVE-2021-29921.json |  18 +++
 2021/29xxx/CVE-2021-29922.json |  18 +++
 2021/29xxx/CVE-2021-29923.json |  18 +++
 2021/29xxx/CVE-2021-29924.json |  18 +++
 2021/29xxx/CVE-2021-29925.json |  18 +++
 2021/29xxx/CVE-2021-29926.json |  18 +++
 2021/29xxx/CVE-2021-29927.json |  18 +++
 10 files changed, 341 insertions(+), 206 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29921.json
 create mode 100644 2021/29xxx/CVE-2021-29922.json
 create mode 100644 2021/29xxx/CVE-2021-29923.json
 create mode 100644 2021/29xxx/CVE-2021-29924.json
 create mode 100644 2021/29xxx/CVE-2021-29925.json
 create mode 100644 2021/29xxx/CVE-2021-29926.json
 create mode 100644 2021/29xxx/CVE-2021-29927.json

diff --git a/2020/36xxx/CVE-2020-36238.json b/2020/36xxx/CVE-2020-36238.json
index cf242ab6c12..a556e408ca8 100644
--- a/2020/36xxx/CVE-2020-36238.json
+++ b/2020/36xxx/CVE-2020-36238.json
@@ -1,105 +1,107 @@
 {
-   "CVE_data_meta": {
-      "ASSIGNER": "security@atlassian.com",
-      "DATE_PUBLIC": "2021-04-01T00:00:00",
-      "ID": "CVE-2020-36238",
-      "STATE": "PUBLIC"
-   },
-   "affects": {
-      "vendor": {
-         "vendor_data": [
-            {
-               "product": {
-                  "product_data": [
-                     {
-                        "product_name": "Jira Server",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name": "Jira Data Center",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name": "Atlassian"
-            }
-         ]
-      }
-   },
-   "data_format": "MITRE",
-   "data_type": "CVE",
-   "data_version": "4.0",
-   "description": {
-      "description_data": [
-         {
-            "lang": "eng",
-            "value": "The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check."
-         }
-      ]
-   },
-   "problemtype": {
-      "problemtype_data": [
-         {
-            "description": [
-               {
-                  "lang": "eng",
-                  "value": "Incorrect Authorization (CWE-863)"
-               }
+    "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-04-01T00:00:00",
+        "ID": "CVE-2020-36238",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jira Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Jira Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Atlassian"
+                }
             ]
-         }
-      ]
-   },
-   "references": {
-      "reference_data": [
-         {
-            "url": "https://jira.atlassian.com/browse/JRASERVER-72249"
-         }
-      ]
-   }
-}
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Incorrect Authorization (CWE-863)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72249",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/JRASERVER-72249"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 0ea7861ea13..5b5d9675a0b 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -258,6 +258,11 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-issues] 20210331 [jira] [Resolved] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E",
+                "url": "https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E"
             }
         ]
     },
diff --git a/2021/26xxx/CVE-2021-26071.json b/2021/26xxx/CVE-2021-26071.json
index e131b8024ed..4451ca3839a 100644
--- a/2021/26xxx/CVE-2021-26071.json
+++ b/2021/26xxx/CVE-2021-26071.json
@@ -1,105 +1,107 @@
 {
-   "CVE_data_meta": {
-      "ASSIGNER": "security@atlassian.com",
-      "DATE_PUBLIC": "2021-04-01T00:00:00",
-      "ID": "CVE-2021-26071",
-      "STATE": "PUBLIC"
-   },
-   "affects": {
-      "vendor": {
-         "vendor_data": [
-            {
-               "product": {
-                  "product_data": [
-                     {
-                        "product_name": "Jira Server",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name": "Jira Data Center",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name": "Atlassian"
-            }
-         ]
-      }
-   },
-   "data_format": "MITRE",
-   "data_type": "CVE",
-   "data_version": "4.0",
-   "description": {
-      "description_data": [
-         {
-            "lang": "eng",
-            "value": "The SetFeatureEnabled.jspa resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF) vulnerability."
-         }
-      ]
-   },
-   "problemtype": {
-      "problemtype_data": [
-         {
-            "description": [
-               {
-                  "lang": "eng",
-                  "value": "Cross-Site Request Forgery (CSRF)"
-               }
+    "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-04-01T00:00:00",
+        "ID": "CVE-2021-26071",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jira Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Jira Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Atlassian"
+                }
             ]
-         }
-      ]
-   },
-   "references": {
-      "reference_data": [
-         {
-            "url": "https://jira.atlassian.com/browse/JRASERVER-72233"
-         }
-      ]
-   }
-}
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The SetFeatureEnabled.jspa resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF) vulnerability."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site Request Forgery (CSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72233",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/JRASERVER-72233"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29921.json b/2021/29xxx/CVE-2021-29921.json
new file mode 100644
index 00000000000..7002bb87c73
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29921.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29921",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29922.json b/2021/29xxx/CVE-2021-29922.json
new file mode 100644
index 00000000000..e5073139059
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29922.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29922",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29923.json b/2021/29xxx/CVE-2021-29923.json
new file mode 100644
index 00000000000..7c604610583
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29923.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29923",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29924.json b/2021/29xxx/CVE-2021-29924.json
new file mode 100644
index 00000000000..e7345e43b8a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29924.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29924",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29925.json b/2021/29xxx/CVE-2021-29925.json
new file mode 100644
index 00000000000..4ef70c32453
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29925.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29925",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29926.json b/2021/29xxx/CVE-2021-29926.json
new file mode 100644
index 00000000000..f0fbf7e634c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29926.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29926",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29927.json b/2021/29xxx/CVE-2021-29927.json
new file mode 100644
index 00000000000..a91d446591c
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29927.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29927",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 9e920c726fc5e61bd6d1e01f75b57319ea441a57 Mon Sep 17 00:00:00 2001
From: David Black 
Date: Thu, 1 Apr 2021 14:41:34 +1100
Subject: [PATCH 812/845] Fix up.

---
 2020/36xxx/CVE-2020-36286.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/2020/36xxx/CVE-2020-36286.json b/2020/36xxx/CVE-2020-36286.json
index 36e5b208c99..ee99023d830 100644
--- a/2020/36xxx/CVE-2020-36286.json
+++ b/2020/36xxx/CVE-2020-36286.json
@@ -79,7 +79,7 @@
       "description_data": [
          {
             "lang": "eng",
-            "value": "The membersOf of JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
+            "value": "The membersOf JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
          }
       ]
    },

From 9d1f877b3273b31e311d3a0dec5f3d66ee40b0c1 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 04:00:41 +0000
Subject: [PATCH 813/845] "-Synchronized-Data."

---
 2020/36xxx/CVE-2020-36286.json | 208 +++++++++++++++++----------------
 2021/29xxx/CVE-2021-29928.json |  18 +++
 2 files changed, 123 insertions(+), 103 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29928.json

diff --git a/2020/36xxx/CVE-2020-36286.json b/2020/36xxx/CVE-2020-36286.json
index 36e5b208c99..809fa116646 100644
--- a/2020/36xxx/CVE-2020-36286.json
+++ b/2020/36xxx/CVE-2020-36286.json
@@ -1,105 +1,107 @@
 {
-   "CVE_data_meta": {
-      "ASSIGNER": "security@atlassian.com",
-      "DATE_PUBLIC": "2021-04-01T00:00:00",
-      "ID": "CVE-2020-36286",
-      "STATE": "PUBLIC"
-   },
-   "affects": {
-      "vendor": {
-         "vendor_data": [
-            {
-               "product": {
-                  "product_data": [
-                     {
-                        "product_name": "Jira Server",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name": "Jira Data Center",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name": "Atlassian"
-            }
-         ]
-      }
-   },
-   "data_format": "MITRE",
-   "data_type": "CVE",
-   "data_version": "4.0",
-   "description": {
-      "description_data": [
-         {
-            "lang": "eng",
-            "value": "The membersOf of JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
-         }
-      ]
-   },
-   "problemtype": {
-      "problemtype_data": [
-         {
-            "description": [
-               {
-                  "lang": "eng",
-                  "value": "Information Disclosure"
-               }
+    "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-04-01T00:00:00",
+        "ID": "CVE-2020-36286",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jira Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Jira Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Atlassian"
+                }
             ]
-         }
-      ]
-   },
-   "references": {
-      "reference_data": [
-         {
-            "url": "https://jira.atlassian.com/browse/JRASERVER-72272"
-         }
-      ]
-   }
-}
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The membersOf of JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72272",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/JRASERVER-72272"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29928.json b/2021/29xxx/CVE-2021-29928.json
new file mode 100644
index 00000000000..26005fb5f43
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29928.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29928",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 16ec35f4e2db0b3691ac4024a099a0a4ecd49df0 Mon Sep 17 00:00:00 2001
From: David Black 
Date: Thu, 1 Apr 2021 15:02:07 +1100
Subject: [PATCH 814/845] Add CVE-2021-26072

---
 2021/26xxx/CVE-2021-26072.json | 87 ++++++++++++++++++++++++++++------
 1 file changed, 72 insertions(+), 15 deletions(-)

diff --git a/2021/26xxx/CVE-2021-26072.json b/2021/26xxx/CVE-2021-26072.json
index bfdbc93c416..81f2722e92a 100644
--- a/2021/26xxx/CVE-2021-26072.json
+++ b/2021/26xxx/CVE-2021-26072.json
@@ -1,18 +1,75 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
-    "CVE_data_meta": {
-        "ID": "CVE-2021-26072",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
-    },
-    "description": {
-        "description_data": [
+   "CVE_data_meta": {
+      "ASSIGNER": "security@atlassian.com",
+      "DATE_PUBLIC": "2021-04-01T00:00:00",
+      "ID": "CVE-2021-26072",
+      "STATE": "PUBLIC"
+   },
+   "affects": {
+      "vendor": {
+         "vendor_data": [
             {
-                "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+               "product": {
+                  "product_data": [
+                     {
+                        "product_name": "Confluence Server",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "5.8.6",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     },
+                     {
+                        "product_name": "Confluence Data Center",
+                        "version": {
+                           "version_data": [
+                              {
+                                 "version_value": "5.8.6",
+                                 "version_affected": "<"
+                              }
+                           ]
+                        }
+                     }
+                  ]
+               },
+               "vendor_name": "Atlassian"
             }
-        ]
-    }
-}
\ No newline at end of file
+         ]
+      }
+   },
+   "data_format": "MITRE",
+   "data_type": "CVE",
+   "data_version": "4.0",
+   "description": {
+      "description_data": [
+         {
+            "lang": "eng",
+            "value": "The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability."
+
+
+         }
+      ]
+   },
+   "problemtype": {
+      "problemtype_data": [
+         {
+            "description": [
+               {
+                  "lang": "eng",
+                  "value": "Server Side Request Forgery (SSRF)"
+               }
+            ]
+         }
+      ]
+   },
+   "references": {
+      "reference_data": [
+         {
+            "url": "https://jira.atlassian.com/browse/CONFSERVER-61399"
+         }
+      ]
+   }
+}

From ffa321ccf881a14081e1f345a4c5b9986a953e56 Mon Sep 17 00:00:00 2001
From: David Black 
Date: Thu, 1 Apr 2021 15:05:34 +1100
Subject: [PATCH 815/845] Resolve conflict.

---
 2020/36xxx/CVE-2020-36286.json | 206 +++++++++++++++++----------------
 1 file changed, 104 insertions(+), 102 deletions(-)

diff --git a/2020/36xxx/CVE-2020-36286.json b/2020/36xxx/CVE-2020-36286.json
index ee99023d830..bd06120e3b6 100644
--- a/2020/36xxx/CVE-2020-36286.json
+++ b/2020/36xxx/CVE-2020-36286.json
@@ -1,105 +1,107 @@
 {
-   "CVE_data_meta": {
-      "ASSIGNER": "security@atlassian.com",
-      "DATE_PUBLIC": "2021-04-01T00:00:00",
-      "ID": "CVE-2020-36286",
-      "STATE": "PUBLIC"
-   },
-   "affects": {
-      "vendor": {
-         "vendor_data": [
-            {
-               "product": {
-                  "product_data": [
-                     {
-                        "product_name": "Jira Server",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name": "Jira Data Center",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "8.5.13",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.6.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.13.5",
-                                 "version_affected": "<"
-                              },
-                              {
-                                 "version_value": "8.14.0",
-                                 "version_affected": ">="
-                              },
-                              {
-                                 "version_value": "8.15.1",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name": "Atlassian"
-            }
-         ]
-      }
-   },
-   "data_format": "MITRE",
-   "data_type": "CVE",
-   "data_version": "4.0",
-   "description": {
-      "description_data": [
-         {
-            "lang": "eng",
-            "value": "The membersOf JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
-         }
-      ]
-   },
-   "problemtype": {
-      "problemtype_data": [
-         {
-            "description": [
-               {
-                  "lang": "eng",
-                  "value": "Information Disclosure"
-               }
+    "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-04-01T00:00:00",
+        "ID": "CVE-2020-36286",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Jira Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Jira Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "8.5.13",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.6.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.13.5",
+                                            "version_affected": "<"
+                                        },
+                                        {
+                                            "version_value": "8.14.0",
+                                            "version_affected": ">="
+                                        },
+                                        {
+                                            "version_value": "8.15.1",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Atlassian"
+                }
             ]
-         }
-      ]
-   },
-   "references": {
-      "reference_data": [
-         {
-            "url": "https://jira.atlassian.com/browse/JRASERVER-72272"
-         }
-      ]
-   }
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The membersOf JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Information Disclosure"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/JRASERVER-72272",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/JRASERVER-72272"
+            }
+        ]
+    }
 }

From 4aa0d8ffcfd2f1d6ec98f0a7d413628f58a8eb38 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 05:00:39 +0000
Subject: [PATCH 816/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29251.json | 56 ++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29929.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29930.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29931.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29932.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29933.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29934.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29935.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29936.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29937.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29938.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29939.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29940.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29941.json | 62 ++++++++++++++++++++++++++++++++++
 2021/29xxx/CVE-2021-29942.json | 62 ++++++++++++++++++++++++++++++++++
 15 files changed, 918 insertions(+), 6 deletions(-)
 create mode 100644 2021/29xxx/CVE-2021-29929.json
 create mode 100644 2021/29xxx/CVE-2021-29930.json
 create mode 100644 2021/29xxx/CVE-2021-29931.json
 create mode 100644 2021/29xxx/CVE-2021-29932.json
 create mode 100644 2021/29xxx/CVE-2021-29933.json
 create mode 100644 2021/29xxx/CVE-2021-29934.json
 create mode 100644 2021/29xxx/CVE-2021-29935.json
 create mode 100644 2021/29xxx/CVE-2021-29936.json
 create mode 100644 2021/29xxx/CVE-2021-29937.json
 create mode 100644 2021/29xxx/CVE-2021-29938.json
 create mode 100644 2021/29xxx/CVE-2021-29939.json
 create mode 100644 2021/29xxx/CVE-2021-29940.json
 create mode 100644 2021/29xxx/CVE-2021-29941.json
 create mode 100644 2021/29xxx/CVE-2021-29942.json

diff --git a/2021/29xxx/CVE-2021-29251.json b/2021/29xxx/CVE-2021-29251.json
index 5d735f0b517..ac6e3ddceeb 100644
--- a/2021/29xxx/CVE-2021-29251.json
+++ b/2021/29xxx/CVE-2021-29251.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29251",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29251",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "BTCPay Server before 1.0.7.1 mishandles the policy setting in which users can register (in Server Settings > Policies). This affects Docker use cases in which a mail server is configured."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/btcpayserver/btcpayserver/releases/tag/v1.0.7.1",
+                "url": "https://github.com/btcpayserver/btcpayserver/releases/tag/v1.0.7.1"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29929.json b/2021/29xxx/CVE-2021-29929.json
new file mode 100644
index 00000000000..b0e469ddf8d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29929.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29929",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the endian_trait crate through 2021-01-04 for Rust. A double drop can occur when a user-provided Endian impl panics."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0039.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0039.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29930.json b/2021/29xxx/CVE-2021-29930.json
new file mode 100644
index 00000000000..6ca4791f5ae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29930.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29930",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A drop of uninitialized memory can sometimes occur upon a panic in T::default()."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0040.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0040.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29931.json b/2021/29xxx/CVE-2021-29931.json
new file mode 100644
index 00000000000..af6c372203f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29931.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29931",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A double drop can sometimes occur upon a panic in T::drop()."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0040.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0040.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29932.json b/2021/29xxx/CVE-2021-29932.json
new file mode 100644
index 00000000000..1d1eb5caf3f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29932.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29932",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0041.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0041.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29933.json b/2021/29xxx/CVE-2021-29933.json
new file mode 100644
index 00000000000..04d2e5c3587
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29933.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29933",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the insert_many crate through 2021-01-26 for Rust. Elements may be dropped twice if a .next() method panics."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0042.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0042.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29934.json b/2021/29xxx/CVE-2021-29934.json
new file mode 100644
index 00000000000..d68e95ec63b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29934.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29934",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in PartialReader in the uu_od crate before 0.0.4 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0043.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0043.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29935.json b/2021/29xxx/CVE-2021-29935.json
new file mode 100644
index 00000000000..e13626c0ea9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29935.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29935",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the rocket crate before 0.4.7 for Rust. uri::Formatter can have a use-after-free if a user-provided function panics."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0044.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0044.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29936.json b/2021/29xxx/CVE-2021-29936.json
new file mode 100644
index 00000000000..7f134418b87
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29936.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29936",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the adtensor crate through 2021-01-11 for Rust. There is a drop of uninitialized memory via the FromIterator implementation for Vector and Matrix."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0045.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0045.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29937.json b/2021/29xxx/CVE-2021-29937.json
new file mode 100644
index 00000000000..002164fe7f5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29937.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29937",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the telemetry crate through 2021-02-17 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size()."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0046.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0046.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29938.json b/2021/29xxx/CVE-2021-29938.json
new file mode 100644
index 00000000000..965e3a51a75
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29938.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29938",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter upon a panic in a predicate function."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0047.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0047.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29939.json b/2021/29xxx/CVE-2021-29939.json
new file mode 100644
index 00000000000..662b97b44b3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29939.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29939",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the stackvector crate through 2021-02-19 for Rust. There is an out-of-bounds write in StackVec::extend if size_hint provides certain anomalous data."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0048.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0048.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29940.json b/2021/29xxx/CVE-2021-29940.json
new file mode 100644
index 00000000000..836d2a8d5e2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29940.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29940",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the through crate through 2021-02-18 for Rust. There is a double free (in through and through_and) upon a panic of the map function."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0049.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0049.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29941.json b/2021/29xxx/CVE-2021-29941.json
new file mode 100644
index 00000000000..02080dba359
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29941.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29941",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index has an out-of-bounds write if an iterator returns a len() that is too small."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0050.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0050.html"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29942.json b/2021/29xxx/CVE-2021-29942.json
new file mode 100644
index 00000000000..b24389f8047
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29942.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-29942",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index can return uninitialized values if an iterator returns a len() that is too large."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://rustsec.org/advisories/RUSTSEC-2021-0050.html",
+                "refsource": "MISC",
+                "name": "https://rustsec.org/advisories/RUSTSEC-2021-0050.html"
+            }
+        ]
+    }
+}
\ No newline at end of file

From 479c9826f965e6c35e6914467dc69b119badc3a2 Mon Sep 17 00:00:00 2001
From: SynologyCVE 
Date: Thu, 1 Apr 2021 05:14:36 +0000
Subject: [PATCH 817/845] Add CVE-2021-29083

---
 2021/29xxx/CVE-2021-29083.json | 59 ++++++++++++++++++++++++++++++++--
 1 file changed, 56 insertions(+), 3 deletions(-)

diff --git a/2021/29xxx/CVE-2021-29083.json b/2021/29xxx/CVE-2021-29083.json
index 0cdca6ad59d..6f15872cdba 100644
--- a/2021/29xxx/CVE-2021-29083.json
+++ b/2021/29xxx/CVE-2021-29083.json
@@ -3,15 +3,68 @@
     "data_format": "MITRE",
     "data_version": "4.0",
     "CVE_data_meta": {
+        "STATE": "PUBLIC",
         "ID": "CVE-2021-29083",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@synology.com",
+        "DATE_PUBLIC": "2021-04-01T05:14:36.718969"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "affected": "<",
+                                            "version_value": "6.2.3-25426-3"
+                                        }
+                                    ]
+                                },
+                                "product_name": "Synology DiskStation Manager (DSM)"
+                            }
+                        ]
+                    },
+                    "vendor_name": "Synology"
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper neutralization of special elements used in an OS command in SYNO.Core.Network.PPPoE in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote authenticated users to execute arbitrary code via realname parameter."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.1",
+            "baseScore": "7.2"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.synology.com/security/advisory/Synology_SA_20_26",
+                "refsource": "CONFIRM",
+                "name": "https://www.synology.com/security/advisory/Synology_SA_20_26"
             }
         ]
     }

From a8f1d1f19d84320829a256bbf41d3a271f681ed3 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 06:00:44 +0000
Subject: [PATCH 818/845] "-Synchronized-Data."

---
 2019/20xxx/CVE-2019-20367.json | 5 +++++
 2020/11xxx/CVE-2020-11988.json | 5 +++++
 2021/21xxx/CVE-2021-21159.json | 5 +++++
 2021/21xxx/CVE-2021-21160.json | 5 +++++
 2021/21xxx/CVE-2021-21161.json | 5 +++++
 2021/21xxx/CVE-2021-21162.json | 5 +++++
 2021/21xxx/CVE-2021-21163.json | 5 +++++
 2021/21xxx/CVE-2021-21164.json | 5 +++++
 2021/21xxx/CVE-2021-21165.json | 5 +++++
 2021/21xxx/CVE-2021-21166.json | 5 +++++
 2021/21xxx/CVE-2021-21167.json | 5 +++++
 2021/21xxx/CVE-2021-21168.json | 5 +++++
 2021/21xxx/CVE-2021-21169.json | 5 +++++
 2021/21xxx/CVE-2021-21170.json | 5 +++++
 2021/21xxx/CVE-2021-21171.json | 5 +++++
 2021/21xxx/CVE-2021-21172.json | 5 +++++
 2021/21xxx/CVE-2021-21173.json | 5 +++++
 2021/21xxx/CVE-2021-21174.json | 5 +++++
 2021/21xxx/CVE-2021-21175.json | 5 +++++
 2021/21xxx/CVE-2021-21176.json | 5 +++++
 2021/21xxx/CVE-2021-21177.json | 5 +++++
 2021/21xxx/CVE-2021-21178.json | 5 +++++
 2021/21xxx/CVE-2021-21179.json | 5 +++++
 2021/21xxx/CVE-2021-21180.json | 5 +++++
 2021/21xxx/CVE-2021-21181.json | 5 +++++
 2021/21xxx/CVE-2021-21182.json | 5 +++++
 2021/21xxx/CVE-2021-21183.json | 5 +++++
 2021/21xxx/CVE-2021-21184.json | 5 +++++
 2021/21xxx/CVE-2021-21185.json | 5 +++++
 2021/21xxx/CVE-2021-21186.json | 5 +++++
 2021/21xxx/CVE-2021-21187.json | 5 +++++
 2021/21xxx/CVE-2021-21188.json | 5 +++++
 2021/21xxx/CVE-2021-21189.json | 5 +++++
 2021/21xxx/CVE-2021-21190.json | 5 +++++
 2021/28xxx/CVE-2021-28831.json | 5 +++++
 35 files changed, 175 insertions(+)

diff --git a/2019/20xxx/CVE-2019-20367.json b/2019/20xxx/CVE-2019-20367.json
index 79d8142c293..15a876116c6 100644
--- a/2019/20xxx/CVE-2019-20367.json
+++ b/2019/20xxx/CVE-2019-20367.json
@@ -76,6 +76,11 @@
                 "refsource": "MLIST",
                 "name": "[debian-lts-announce] 20210218 [SECURITY] [DLA 2566-1] libbsd security update",
                 "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00027.html"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[tomee-dev] 20210401 CVE-2019-20367 - TomEE not affected",
+                "url": "https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550@%3Cdev.tomee.apache.org%3E"
             }
         ]
     }
diff --git a/2020/11xxx/CVE-2020-11988.json b/2020/11xxx/CVE-2020-11988.json
index 7d7cf0008ad..8524e2cfb1b 100644
--- a/2020/11xxx/CVE-2020-11988.json
+++ b/2020/11xxx/CVE-2020-11988.json
@@ -68,6 +68,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-aa2936e810",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-c07a9e79cf",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21159.json b/2021/21xxx/CVE-2021-21159.json
index c3197b104b9..3fadde36b71 100644
--- a/2021/21xxx/CVE-2021-21159.json
+++ b/2021/21xxx/CVE-2021-21159.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21160.json b/2021/21xxx/CVE-2021-21160.json
index 2e9c7f7ba46..ada938a0008 100644
--- a/2021/21xxx/CVE-2021-21160.json
+++ b/2021/21xxx/CVE-2021-21160.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21161.json b/2021/21xxx/CVE-2021-21161.json
index c8267a79c30..40ded8cc0b4 100644
--- a/2021/21xxx/CVE-2021-21161.json
+++ b/2021/21xxx/CVE-2021-21161.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21162.json b/2021/21xxx/CVE-2021-21162.json
index 12c1c6e1f5c..4c053a734f2 100644
--- a/2021/21xxx/CVE-2021-21162.json
+++ b/2021/21xxx/CVE-2021-21162.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21163.json b/2021/21xxx/CVE-2021-21163.json
index 1881e05b19d..faae00d7610 100644
--- a/2021/21xxx/CVE-2021-21163.json
+++ b/2021/21xxx/CVE-2021-21163.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21164.json b/2021/21xxx/CVE-2021-21164.json
index 3202783cba1..13cf68a3f4f 100644
--- a/2021/21xxx/CVE-2021-21164.json
+++ b/2021/21xxx/CVE-2021-21164.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21165.json b/2021/21xxx/CVE-2021-21165.json
index ebe8410e6a2..a7208b7af87 100644
--- a/2021/21xxx/CVE-2021-21165.json
+++ b/2021/21xxx/CVE-2021-21165.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21166.json b/2021/21xxx/CVE-2021-21166.json
index 95cf38d47d3..5e8e1617730 100644
--- a/2021/21xxx/CVE-2021-21166.json
+++ b/2021/21xxx/CVE-2021-21166.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21167.json b/2021/21xxx/CVE-2021-21167.json
index bc68a7eb853..13ccaa59e6c 100644
--- a/2021/21xxx/CVE-2021-21167.json
+++ b/2021/21xxx/CVE-2021-21167.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21168.json b/2021/21xxx/CVE-2021-21168.json
index f4413b59400..f4045322bd4 100644
--- a/2021/21xxx/CVE-2021-21168.json
+++ b/2021/21xxx/CVE-2021-21168.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21169.json b/2021/21xxx/CVE-2021-21169.json
index ac80f9fa215..d0a1bd42e14 100644
--- a/2021/21xxx/CVE-2021-21169.json
+++ b/2021/21xxx/CVE-2021-21169.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21170.json b/2021/21xxx/CVE-2021-21170.json
index 297082737f5..db095b3d0d0 100644
--- a/2021/21xxx/CVE-2021-21170.json
+++ b/2021/21xxx/CVE-2021-21170.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21171.json b/2021/21xxx/CVE-2021-21171.json
index 1283974c918..b89dcc6c4d8 100644
--- a/2021/21xxx/CVE-2021-21171.json
+++ b/2021/21xxx/CVE-2021-21171.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21172.json b/2021/21xxx/CVE-2021-21172.json
index bbe3a24856a..6e361809c7b 100644
--- a/2021/21xxx/CVE-2021-21172.json
+++ b/2021/21xxx/CVE-2021-21172.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21173.json b/2021/21xxx/CVE-2021-21173.json
index 6b473262acb..f6bd1287a9f 100644
--- a/2021/21xxx/CVE-2021-21173.json
+++ b/2021/21xxx/CVE-2021-21173.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21174.json b/2021/21xxx/CVE-2021-21174.json
index b4badb1058c..624d861e6a6 100644
--- a/2021/21xxx/CVE-2021-21174.json
+++ b/2021/21xxx/CVE-2021-21174.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21175.json b/2021/21xxx/CVE-2021-21175.json
index 90c658beaee..98696dd6bbd 100644
--- a/2021/21xxx/CVE-2021-21175.json
+++ b/2021/21xxx/CVE-2021-21175.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21176.json b/2021/21xxx/CVE-2021-21176.json
index 62772bd8f7d..1fb8e5408ef 100644
--- a/2021/21xxx/CVE-2021-21176.json
+++ b/2021/21xxx/CVE-2021-21176.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21177.json b/2021/21xxx/CVE-2021-21177.json
index 252a245c7d7..70ba5af55bc 100644
--- a/2021/21xxx/CVE-2021-21177.json
+++ b/2021/21xxx/CVE-2021-21177.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21178.json b/2021/21xxx/CVE-2021-21178.json
index eedd6e2e1a2..4dcb2df33a7 100644
--- a/2021/21xxx/CVE-2021-21178.json
+++ b/2021/21xxx/CVE-2021-21178.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21179.json b/2021/21xxx/CVE-2021-21179.json
index 8dddf7ea00a..8f1f12c7e88 100644
--- a/2021/21xxx/CVE-2021-21179.json
+++ b/2021/21xxx/CVE-2021-21179.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21180.json b/2021/21xxx/CVE-2021-21180.json
index 9831d48699b..d6673771fd3 100644
--- a/2021/21xxx/CVE-2021-21180.json
+++ b/2021/21xxx/CVE-2021-21180.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21181.json b/2021/21xxx/CVE-2021-21181.json
index 650f79bd4d2..fd809d84878 100644
--- a/2021/21xxx/CVE-2021-21181.json
+++ b/2021/21xxx/CVE-2021-21181.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21182.json b/2021/21xxx/CVE-2021-21182.json
index d438ce945b2..257ea7123d6 100644
--- a/2021/21xxx/CVE-2021-21182.json
+++ b/2021/21xxx/CVE-2021-21182.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21183.json b/2021/21xxx/CVE-2021-21183.json
index cef38adf28a..141cc238b5d 100644
--- a/2021/21xxx/CVE-2021-21183.json
+++ b/2021/21xxx/CVE-2021-21183.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21184.json b/2021/21xxx/CVE-2021-21184.json
index 1a1bc505df9..85067a37ed2 100644
--- a/2021/21xxx/CVE-2021-21184.json
+++ b/2021/21xxx/CVE-2021-21184.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21185.json b/2021/21xxx/CVE-2021-21185.json
index e41aaa7881a..2be7450a40f 100644
--- a/2021/21xxx/CVE-2021-21185.json
+++ b/2021/21xxx/CVE-2021-21185.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21186.json b/2021/21xxx/CVE-2021-21186.json
index 0dcfe600170..e5234f267ab 100644
--- a/2021/21xxx/CVE-2021-21186.json
+++ b/2021/21xxx/CVE-2021-21186.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21187.json b/2021/21xxx/CVE-2021-21187.json
index 8f7cee45cfb..e8d00a67e42 100644
--- a/2021/21xxx/CVE-2021-21187.json
+++ b/2021/21xxx/CVE-2021-21187.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21188.json b/2021/21xxx/CVE-2021-21188.json
index 1c8394704e8..09c5518d9cf 100644
--- a/2021/21xxx/CVE-2021-21188.json
+++ b/2021/21xxx/CVE-2021-21188.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21189.json b/2021/21xxx/CVE-2021-21189.json
index 87af5a449ad..00379c80688 100644
--- a/2021/21xxx/CVE-2021-21189.json
+++ b/2021/21xxx/CVE-2021-21189.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21190.json b/2021/21xxx/CVE-2021-21190.json
index 3518a116376..dc743b0c713 100644
--- a/2021/21xxx/CVE-2021-21190.json
+++ b/2021/21xxx/CVE-2021-21190.json
@@ -59,6 +59,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-c88a96bd4b",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-4740239e28",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28831.json b/2021/28xxx/CVE-2021-28831.json
index 54eff32ae0b..990c3cb4078 100644
--- a/2021/28xxx/CVE-2021-28831.json
+++ b/2021/28xxx/CVE-2021-28831.json
@@ -66,6 +66,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-d20c8a4730",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2024803354",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/"
             }
         ]
     },

From d2c514e45e37075448f4b04f20e129f967da9f4f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 08:00:40 +0000
Subject: [PATCH 819/845] "-Synchronized-Data."

---
 2020/13xxx/CVE-2020-13936.json | 5 +++++
 2020/27xxx/CVE-2020-27223.json | 5 +++++
 2020/27xxx/CVE-2020-27543.json | 5 +++++
 2020/27xxx/CVE-2020-27618.json | 5 +++++
 2021/20xxx/CVE-2021-20226.json | 5 +++++
 2021/28xxx/CVE-2021-28375.json | 5 +++++
 2021/3xxx/CVE-2021-3189.json   | 5 +++++
 7 files changed, 35 insertions(+)

diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json
index 97904860036..13ae03c18f1 100644
--- a/2020/13xxx/CVE-2020-13936.json
+++ b/2020/13xxx/CVE-2020-13936.json
@@ -154,6 +154,11 @@
                 "refsource": "MLIST",
                 "name": "[ws-dev] 20210331 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
                 "url": "https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad@%3Cdev.ws.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[ws-dev] 20210401 [jira] [Commented] (WSS-683) WSS4J depends on Velocity 1.7 which contains a security vulnerability (CVE-2020-13936)",
+                "url": "https://lists.apache.org/thread.html/rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436@%3Cdev.ws.apache.org%3E"
             }
         ]
     },
diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json
index 76177f52554..680809dd60b 100644
--- a/2020/27xxx/CVE-2020-27223.json
+++ b/2020/27xxx/CVE-2020-27223.json
@@ -366,6 +366,11 @@
                 "refsource": "MLIST",
                 "name": "[spark-reviews] 20210316 [GitHub] [spark] xkrogen commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223",
                 "url": "https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210401-0005/",
+                "url": "https://security.netapp.com/advisory/ntap-20210401-0005/"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27543.json b/2020/27xxx/CVE-2020-27543.json
index df68c521d71..fa7a7294d9a 100644
--- a/2020/27xxx/CVE-2020-27543.json
+++ b/2020/27xxx/CVE-2020-27543.json
@@ -66,6 +66,11 @@
                 "refsource": "MISC",
                 "name": "https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate",
                 "url": "https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210401-0002/",
+                "url": "https://security.netapp.com/advisory/ntap-20210401-0002/"
             }
         ]
     }
diff --git a/2020/27xxx/CVE-2020-27618.json b/2020/27xxx/CVE-2020-27618.json
index 433b1d5c3d0..fc006f1e028 100644
--- a/2020/27xxx/CVE-2020-27618.json
+++ b/2020/27xxx/CVE-2020-27618.json
@@ -61,6 +61,11 @@
                 "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21",
                 "refsource": "MISC",
                 "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210401-0006/",
+                "url": "https://security.netapp.com/advisory/ntap-20210401-0006/"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20226.json b/2021/20xxx/CVE-2021-20226.json
index be84788bdc9..e4e4a237c56 100644
--- a/2021/20xxx/CVE-2021-20226.json
+++ b/2021/20xxx/CVE-2021-20226.json
@@ -48,6 +48,11 @@
                 "refsource": "MISC",
                 "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1873476",
                 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873476"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210401-0001/",
+                "url": "https://security.netapp.com/advisory/ntap-20210401-0001/"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28375.json b/2021/28xxx/CVE-2021-28375.json
index 75fd1a754ae..bbd637b020c 100644
--- a/2021/28xxx/CVE-2021-28375.json
+++ b/2021/28xxx/CVE-2021-28375.json
@@ -76,6 +76,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-14f6642aa6",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XAUNYDTGE6MB4NWL2SIHPCODCLET3JZB/"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210401-0003/",
+                "url": "https://security.netapp.com/advisory/ntap-20210401-0003/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3189.json b/2021/3xxx/CVE-2021-3189.json
index 66ff284cdd9..ae0de9d282d 100644
--- a/2021/3xxx/CVE-2021-3189.json
+++ b/2021/3xxx/CVE-2021-3189.json
@@ -61,6 +61,11 @@
                 "refsource": "MISC",
                 "name": "https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify",
                 "url": "https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://security.netapp.com/advisory/ntap-20210401-0004/",
+                "url": "https://security.netapp.com/advisory/ntap-20210401-0004/"
             }
         ]
     }

From 24f75b4f08ea42a32d4757148faa1ca33bb551ca Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 09:00:39 +0000
Subject: [PATCH 820/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json |  5 +++++
 2021/28xxx/CVE-2021-28994.json |  5 +++++
 2021/29xxx/CVE-2021-29943.json | 18 ++++++++++++++++++
 3 files changed, 28 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29943.json

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 5b5d9675a0b..68f5b3c48f4 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -263,6 +263,11 @@
                 "refsource": "MISC",
                 "name": "https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E",
                 "url": "https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[zookeeper-issues] 20210401 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28994.json b/2021/28xxx/CVE-2021-28994.json
index 6950c38d6ee..2aa8f60da76 100644
--- a/2021/28xxx/CVE-2021-28994.json
+++ b/2021/28xxx/CVE-2021-28994.json
@@ -56,6 +56,11 @@
                 "url": "https://www.openwall.com/lists/oss-security/2021/03/19/6",
                 "refsource": "MISC",
                 "name": "https://www.openwall.com/lists/oss-security/2021/03/19/6"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[oss-security] 20210401 Re: kopano-core 11.0.1: Remote DoS by memory exhaustion",
+                "url": "http://www.openwall.com/lists/oss-security/2021/04/01/1"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29943.json b/2021/29xxx/CVE-2021-29943.json
new file mode 100644
index 00000000000..c4eb41785cd
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29943.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29943",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From f13eb7afe96e0a74a1ab76114db6181817162214 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 11:00:38 +0000
Subject: [PATCH 821/845] "-Synchronized-Data."

---
 2021/3xxx/CVE-2021-3481.json | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 2021/3xxx/CVE-2021-3481.json

diff --git a/2021/3xxx/CVE-2021-3481.json b/2021/3xxx/CVE-2021-3481.json
new file mode 100644
index 00000000000..9910317841a
--- /dev/null
+++ b/2021/3xxx/CVE-2021-3481.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-3481",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From b9bfd6c4442f4ec59dd88a11347d5376283d6094 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 13:00:39 +0000
Subject: [PATCH 822/845] "-Synchronized-Data."

---
 2019/20xxx/CVE-2019-20367.json |  5 +++
 2021/28xxx/CVE-2021-28918.json | 76 +++++++++++++++++++++++++++++++---
 2 files changed, 75 insertions(+), 6 deletions(-)

diff --git a/2019/20xxx/CVE-2019-20367.json b/2019/20xxx/CVE-2019-20367.json
index 15a876116c6..a0a072d8f17 100644
--- a/2019/20xxx/CVE-2019-20367.json
+++ b/2019/20xxx/CVE-2019-20367.json
@@ -81,6 +81,11 @@
                 "refsource": "MLIST",
                 "name": "[tomee-dev] 20210401 CVE-2019-20367 - TomEE not affected",
                 "url": "https://lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550@%3Cdev.tomee.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[tomee-dev] 20210401 Re: CVE-2019-20367 - TomEE not affected",
+                "url": "https://lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5@%3Cdev.tomee.apache.org%3E"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28918.json b/2021/28xxx/CVE-2021-28918.json
index 3f5efeaa5f0..6e2001de63b 100644
--- a/2021/28xxx/CVE-2021-28918.json
+++ b/2021/28xxx/CVE-2021-28918.json
@@ -1,17 +1,81 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28918",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28918",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.npmjs.com/package/netmask",
+                "refsource": "MISC",
+                "name": "https://www.npmjs.com/package/netmask"
+            },
+            {
+                "url": "https://github.com/rs/node-netmask",
+                "refsource": "MISC",
+                "name": "https://github.com/rs/node-netmask"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/",
+                "url": "https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/advisories/GHSA-pch5-whg9-qr2r",
+                "url": "https://github.com/advisories/GHSA-pch5-whg9-qr2r"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md",
+                "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md"
             }
         ]
     }

From e22119e4ce35b71d835f54f1379c85798bec9738 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 14:00:38 +0000
Subject: [PATCH 823/845] "-Synchronized-Data."

---
 2021/20xxx/CVE-2021-20234.json | 55 +++++++++++++++++++--
 2021/20xxx/CVE-2021-20235.json | 55 +++++++++++++++++++--
 2021/20xxx/CVE-2021-20296.json | 55 +++++++++++++++++++--
 2021/28xxx/CVE-2021-28545.json | 90 +++++++++++++++++++++++++++++++---
 2021/28xxx/CVE-2021-28546.json | 90 +++++++++++++++++++++++++++++++---
 2021/3xxx/CVE-2021-3393.json   | 50 +++++++++++++++++--
 6 files changed, 371 insertions(+), 24 deletions(-)

diff --git a/2021/20xxx/CVE-2021-20234.json b/2021/20xxx/CVE-2021-20234.json
index 294edfbd582..26d810a906b 100644
--- a/2021/20xxx/CVE-2021-20234.json
+++ b/2021/20xxx/CVE-2021-20234.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20234",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "zeromq",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "zeromq 4.3.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1921972",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921972"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/zeromq/libzmq/security/advisories/GHSA-wfr2-29gj-5w87",
+                "url": "https://github.com/zeromq/libzmq/security/advisories/GHSA-wfr2-29gj-5w87"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20235.json b/2021/20xxx/CVE-2021-20235.json
index 9e8670ded8a..275eee5a52e 100644
--- a/2021/20xxx/CVE-2021-20235.json
+++ b/2021/20xxx/CVE-2021-20235.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20235",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "zeromq",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "zeromq 4.3.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-120->CWE-787"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1921983",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921983"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6",
+                "url": "https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20296.json b/2021/20xxx/CVE-2021-20296.json
index 3c16d08fd5b..4f084bc83f4 100644
--- a/2021/20xxx/CVE-2021-20296.json
+++ b/2021/20xxx/CVE-2021-20296.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20296",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "OpenEXR",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "OpenEXR 3.0.0-beta"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-476"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939141",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939141"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854",
+                "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability."
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28545.json b/2021/28xxx/CVE-2021-28545.json
index 216430ce534..29a6a911e32 100644
--- a/2021/28xxx/CVE-2021-28545.json
+++ b/2021/28xxx/CVE-2021-28545.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@adobe.com",
+        "DATE_PUBLIC": "2021-02-09T23:00:00.000Z",
         "ID": "CVE-2021-28545",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Acrobat Reader DC Missing Support for Integrity Check "
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Acrobat Reader",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2020.013.20074"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2020.001.30018"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2017.011.30188"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "None"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Adobe"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to show arbitrary content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "None",
+            "attackVector": "None",
+            "availabilityImpact": "None",
+            "baseScore": 8.1,
+            "baseSeverity": "High",
+            "confidentialityImpact": "None",
+            "integrityImpact": "None",
+            "privilegesRequired": "None",
+            "scope": "None",
+            "userInteraction": "None",
+            "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Missing Support for Integrity Check (CWE-353)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html",
+                "name": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/28xxx/CVE-2021-28546.json b/2021/28xxx/CVE-2021-28546.json
index 239f66d5e76..836c7500880 100644
--- a/2021/28xxx/CVE-2021-28546.json
+++ b/2021/28xxx/CVE-2021-28546.json
@@ -1,18 +1,96 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "psirt@adobe.com",
+        "DATE_PUBLIC": "2021-02-09T23:00:00.000Z",
         "ID": "CVE-2021-28546",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Acrobat Reader DC Missing Support for Integrity Check"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Acrobat Reader",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2020.013.20074"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2020.001.30018"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "2017.011.30188"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "None"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Adobe"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to modify content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "None",
+            "attackVector": "None",
+            "availabilityImpact": "None",
+            "baseScore": 8.1,
+            "baseSeverity": "High",
+            "confidentialityImpact": "None",
+            "integrityImpact": "None",
+            "privilegesRequired": "None",
+            "scope": "None",
+            "userInteraction": "None",
+            "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Missing Support for Integrity Check (CWE-353)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html",
+                "name": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3393.json b/2021/3xxx/CVE-2021-3393.json
index d83d854e308..b7f222f5761 100644
--- a/2021/3xxx/CVE-2021-3393.json
+++ b/2021/3xxx/CVE-2021-3393.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3393",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "postgresql",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "postgresql 13.2, postgresql 12.6, postgresql 11.11"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-209"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924005"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read."
             }
         ]
     }

From 0034ae16ccfd6cb728e42056dc6a445237788d0c Mon Sep 17 00:00:00 2001
From: Wayne Beaton 
Date: Thu, 1 Apr 2021 10:13:46 -0400
Subject: [PATCH 824/845] Eclipse Jetty CVEs

Signed-off-by: Wayne Beaton 
---
 2021/28xxx/CVE-2021-28163.json | 80 +++++++++++++++++++++++++++++--
 2021/28xxx/CVE-2021-28164.json | 72 ++++++++++++++++++++++++++--
 2021/28xxx/CVE-2021-28165.json | 88 ++++++++++++++++++++++++++++++++--
 3 files changed, 228 insertions(+), 12 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28163.json b/2021/28xxx/CVE-2021-28163.json
index a292a38e67f..15f8bdac7e8 100644
--- a/2021/28xxx/CVE-2021-28163.json
+++ b/2021/28xxx/CVE-2021-28163.json
@@ -4,15 +4,87 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-28163",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@eclipse.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "The Eclipse Foundation",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Eclipse Jetty",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "9.4.32"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "9.4.38"
+                                        },
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "10.0.0.beta2"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "10.0.1"
+                                        },
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "11.0.0.beta2"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "11.0.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": 2.7,
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq"
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2021/28xxx/CVE-2021-28164.json b/2021/28xxx/CVE-2021-28164.json
index da354877331..a9c34755488 100644
--- a/2021/28xxx/CVE-2021-28164.json
+++ b/2021/28xxx/CVE-2021-28164.json
@@ -4,15 +4,79 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-28164",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@eclipse.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "The Eclipse Foundation",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Eclipse Jetty",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "9.4.37.v20210219"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "9.4.38.v20210224"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": 5.3,
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-200"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-551"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5"
             }
         ]
     }
-}
\ No newline at end of file
+}
diff --git a/2021/28xxx/CVE-2021-28165.json b/2021/28xxx/CVE-2021-28165.json
index e5f43adfe7e..b71b1e1d67f 100644
--- a/2021/28xxx/CVE-2021-28165.json
+++ b/2021/28xxx/CVE-2021-28165.json
@@ -4,15 +4,95 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-28165",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@eclipse.org",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "The Eclipse Foundation",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Eclipse Jetty",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "7.2.2"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "9.4.38"
+                                        },
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "10.0.0.alpha0"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "10.0.1"
+                                        },
+                                        {
+                                            "version_affected": ">=",
+                                            "version_value": "11.0.0.alpha0"
+                                        },
+                                        {
+                                            "version_affected": "<=",
+                                            "version_value": "11.0.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame."
+            }
+        ]
+    },
+    "impact": {
+        "cvss": {
+            "baseScore": 7.5,
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-551"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w"
             }
         ]
     }
-}
\ No newline at end of file
+}

From 8324f3c56b59746f6c655a3e20b567da7e212ac7 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 15:00:41 +0000
Subject: [PATCH 825/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json | 15 ++++++
 2021/22xxx/CVE-2021-22177.json | 90 ++++++++++++++++++++++++++++++++--
 2 files changed, 101 insertions(+), 4 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 68f5b3c48f4..0937bacfb19 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -268,6 +268,21 @@
                 "refsource": "MLIST",
                 "name": "[zookeeper-issues] 20210401 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-dev] 20210401 [jira] [Resolved] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210401 [jira] [Commented] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[kafka-jira] 20210401 [jira] [Resolved] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
+                "url": "https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E"
             }
         ]
     },
diff --git a/2021/22xxx/CVE-2021-22177.json b/2021/22xxx/CVE-2021-22177.json
index f06f5c7b135..d9309c67ba7 100644
--- a/2021/22xxx/CVE-2021-22177.json
+++ b/2021/22xxx/CVE-2021-22177.json
@@ -4,15 +4,97 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22177",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "GitLab",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=12.6, <13.6.7"
+                                        },
+                                        {
+                                            "version_value": ">=13.7, <13.7.7"
+                                        },
+                                        {
+                                            "version_value": ">=13.8, <13.8.4"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Uncontrolled resource consumption in GitLab"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/238988",
+                "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/238988",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://hackerone.com/reports/953444",
+                "url": "https://hackerone.com/reports/953444",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22177.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22177.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command."
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "LOW",
+            "confidentialityImpact": "NONE",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "version": "3.1",
+            "baseScore": 4.2,
+            "baseSeverity": "MEDIUM"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Thanks [yvvdwf](https://hackerone.com/yvvdwf?type=user) for reporting this vulnerability through our HackerOne bug bounty program"
+        }
+    ]
 }
\ No newline at end of file

From 440c51f0e2c89863e8ff0285f7faeddf5dc6e85f Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 17:00:38 +0000
Subject: [PATCH 826/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22986.json | 5 +++++
 2021/25xxx/CVE-2021-25281.json | 5 +++++
 2021/25xxx/CVE-2021-25282.json | 5 +++++
 3 files changed, 15 insertions(+)

diff --git a/2021/22xxx/CVE-2021-22986.json b/2021/22xxx/CVE-2021-22986.json
index 25fb819fca3..46e88e48ad8 100644
--- a/2021/22xxx/CVE-2021-22986.json
+++ b/2021/22xxx/CVE-2021-22986.json
@@ -51,6 +51,11 @@
                 "refsource": "MISC",
                 "name": "https://support.f5.com/csp/article/K03009991",
                 "url": "https://support.f5.com/csp/article/K03009991"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html",
+                "url": "http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html"
             }
         ]
     },
diff --git a/2021/25xxx/CVE-2021-25281.json b/2021/25xxx/CVE-2021-25281.json
index 2459bc19e0f..85ad1e89dfd 100644
--- a/2021/25xxx/CVE-2021-25281.json
+++ b/2021/25xxx/CVE-2021-25281.json
@@ -86,6 +86,11 @@
                 "refsource": "GENTOO",
                 "name": "GLSA-202103-01",
                 "url": "https://security.gentoo.org/glsa/202103-01"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html",
+                "url": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html"
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25282.json b/2021/25xxx/CVE-2021-25282.json
index 262650be5da..b385886e1bc 100644
--- a/2021/25xxx/CVE-2021-25282.json
+++ b/2021/25xxx/CVE-2021-25282.json
@@ -81,6 +81,11 @@
                 "refsource": "GENTOO",
                 "name": "GLSA-202103-01",
                 "url": "https://security.gentoo.org/glsa/202103-01"
+            },
+            {
+                "refsource": "MISC",
+                "name": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html",
+                "url": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html"
             }
         ]
     }

From 7d78de2ff2ce7fbb94926490ce3b23826ba723ba Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 18:00:38 +0000
Subject: [PATCH 827/845] "-Synchronized-Data."

---
 2020/9xxx/CVE-2020-9146.json   | 53 +++++++++++++++++++++--
 2020/9xxx/CVE-2020-9147.json   | 53 +++++++++++++++++++++--
 2020/9xxx/CVE-2020-9148.json   | 53 +++++++++++++++++++++--
 2020/9xxx/CVE-2020-9149.json   | 53 +++++++++++++++++++++--
 2021/20xxx/CVE-2021-20291.json | 50 +++++++++++++++++++--
 2021/22xxx/CVE-2021-22195.json | 79 ++++++++++++++++++++++++++++++++--
 2021/22xxx/CVE-2021-22876.json | 55 +++++++++++++++++++++--
 2021/22xxx/CVE-2021-22890.json | 55 +++++++++++++++++++++--
 2021/25xxx/CVE-2021-25924.json | 55 +++++++++++++++++++++--
 2021/3xxx/CVE-2021-3447.json   | 50 +++++++++++++++++++--
 10 files changed, 525 insertions(+), 31 deletions(-)

diff --git a/2020/9xxx/CVE-2020-9146.json b/2020/9xxx/CVE-2020-9146.json
index d7e8e1a98e8..78e9cef2553 100644
--- a/2020/9xxx/CVE-2020-9146.json
+++ b/2020/9xxx/CVE-2020-9146.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9146",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "EMUI;Magic UI",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0"
+                                        },
+                                        {
+                                            "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Out-of-bounds Read"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1",
+                "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios."
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9147.json b/2020/9xxx/CVE-2020-9147.json
index cde1cdb7668..5e3f21fed1a 100644
--- a/2020/9xxx/CVE-2020-9147.json
+++ b/2020/9xxx/CVE-2020-9147.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9147",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "EMUI;Magic UI",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0"
+                                        },
+                                        {
+                                            "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Buffer Underwrite"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1",
+                "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read."
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9148.json b/2020/9xxx/CVE-2020-9148.json
index 0b1c0afe53e..2e61c106b75 100644
--- a/2020/9xxx/CVE-2020-9148.json
+++ b/2020/9xxx/CVE-2020-9148.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9148",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "EMUI;Magic UI",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.0"
+                                        },
+                                        {
+                                            "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Multiple Unlocks of a Critical Resource"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1",
+                "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages."
             }
         ]
     }
diff --git a/2020/9xxx/CVE-2020-9149.json b/2020/9xxx/CVE-2020-9149.json
index 32e5b52ec1e..193f94f07c5 100644
--- a/2020/9xxx/CVE-2020-9149.json
+++ b/2020/9xxx/CVE-2020-9149.json
@@ -4,14 +4,61 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2020-9149",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "psirt@huawei.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "EMUI;Magic UI",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0"
+                                        },
+                                        {
+                                            "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Incorrect Authorization"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1",
+                "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages."
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20291.json b/2021/20xxx/CVE-2021-20291.json
index 5d7292aaf62..50e725a2db7 100644
--- a/2021/20xxx/CVE-2021-20291.json
+++ b/2021/20xxx/CVE-2021-20291.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20291",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "containers/storage",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "containers/storage 1.28.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-667"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS)."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22195.json b/2021/22xxx/CVE-2021-22195.json
index 15834c93702..dee5e82b56f 100644
--- a/2021/22xxx/CVE-2021-22195.json
+++ b/2021/22xxx/CVE-2021-22195.json
@@ -4,15 +4,86 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22195",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "cve@gitlab.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "GitLab",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "gitlab-vscode-extension",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "<=3.15.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Improper neutralization of special elements used in a command ('command injection') in gitlab-vscode-extension"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://gitlab.com/gitlab-org/gitlab-vscode-extension/-/issues/325",
+                "url": "https://gitlab.com/gitlab-org/gitlab-vscode-extension/-/issues/325",
+                "refsource": "MISC"
+            },
+            {
+                "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22195.json",
+                "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22195.json",
+                "refsource": "CONFIRM"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Client side code execution in gitlab-vscode-extension v3.15.0 and earlier allows attacker to execute code on user system"
             }
         ]
-    }
+    },
+    "impact": {
+        "cvss": {
+            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+            "attackComplexity": "LOW",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "version": "3.1",
+            "baseScore": 8.5,
+            "baseSeverity": "HIGH"
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "GitLab security research team"
+        }
+    ]
 }
\ No newline at end of file
diff --git a/2021/22xxx/CVE-2021-22876.json b/2021/22xxx/CVE-2021-22876.json
index 856c17e0832..c3305d34dc2 100644
--- a/2021/22xxx/CVE-2021-22876.json
+++ b/2021/22xxx/CVE-2021-22876.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22876",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "support@hackerone.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "https://github.com/curl/curl",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.1.1 to and including 7.75.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Privacy Violation (CWE-359)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://hackerone.com/reports/1101882",
+                "url": "https://hackerone.com/reports/1101882"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://curl.se/docs/CVE-2021-22876.html",
+                "url": "https://curl.se/docs/CVE-2021-22876.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request."
             }
         ]
     }
diff --git a/2021/22xxx/CVE-2021-22890.json b/2021/22xxx/CVE-2021-22890.json
index 9f95cf8f599..b4a2cad6742 100644
--- a/2021/22xxx/CVE-2021-22890.json
+++ b/2021/22xxx/CVE-2021-22890.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-22890",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "support@hackerone.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "https://github.com/curl/curl",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "7.63.0 to and including 7.75.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Man-in-the-Middle (CWE-300)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://hackerone.com/reports/1129529",
+                "url": "https://hackerone.com/reports/1129529"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://curl.se/docs/CVE-2021-22890.html",
+                "url": "https://curl.se/docs/CVE-2021-22890.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check."
             }
         ]
     }
diff --git a/2021/25xxx/CVE-2021-25924.json b/2021/25xxx/CVE-2021-25924.json
index 432cd68884b..c669acbd363 100644
--- a/2021/25xxx/CVE-2021-25924.json
+++ b/2021/25xxx/CVE-2021-25924.json
@@ -4,14 +4,63 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-25924",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "gocd",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "19.6.0, 19.7.0, 19.8.0, 19.9.0, 19.10.0, 19.11.0, 19.12.0, 20.1.0, 20.2.0, 20.3.0, 20.4.0, 20.5.0, 20.6.0, 20.7.0, 20.8.0, 20.9.0, 20.10.0, 21.1.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Cross-Site Request Forgery"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924,",
+                "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924,"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/gocd/gocd/commit/7d0baab0d361c377af84994f95ba76c280048548",
+                "url": "https://github.com/gocd/gocd/commit/7d0baab0d361c377af84994f95ba76c280048548"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "In GoCD, versions 19.6.0 to 21.1.0 are vulnerable to Cross-Site Request Forgery due to missing CSRF protection at the `/go/api/config/backup` endpoint. An attacker can trick a victim to click on a malicious link which could change backup configurations or execute system commands in the post_backup_script field."
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3447.json b/2021/3xxx/CVE-2021-3447.json
index 5116c21facf..13ed72575bb 100644
--- a/2021/3xxx/CVE-2021-3447.json
+++ b/2021/3xxx/CVE-2021-3447.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-3447",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "secalert@redhat.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "ansible",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Red Hat Ansible Automation Platform 1.2.2, Ansible Tower 3.8.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-532"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349",
+                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2."
             }
         ]
     }

From 54808dd2cb89bb6c783c085da9ef9bdcc40e843a Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 19:00:46 +0000
Subject: [PATCH 828/845] "-Synchronized-Data."

---
 2020/19xxx/CVE-2020-19613.json |  56 +++++++++++--
 2020/19xxx/CVE-2020-19616.json |  56 +++++++++++--
 2020/19xxx/CVE-2020-19617.json |  56 +++++++++++--
 2021/20xxx/CVE-2021-20078.json |  50 ++++++++++-
 2021/21xxx/CVE-2021-21982.json |  50 ++++++++++-
 2021/26xxx/CVE-2021-26072.json | 146 ++++++++++++++++-----------------
 2021/26xxx/CVE-2021-26580.json |  50 ++++++++++-
 2021/26xxx/CVE-2021-26581.json |  50 ++++++++++-
 2021/26xxx/CVE-2021-26718.json |  50 ++++++++++-
 2021/27xxx/CVE-2021-27653.json |  85 +++++++++++++++++--
 2021/3xxx/CVE-2021-3449.json   |   5 ++
 11 files changed, 542 insertions(+), 112 deletions(-)

diff --git a/2020/19xxx/CVE-2020-19613.json b/2020/19xxx/CVE-2020-19613.json
index f95ceab853e..e1bc13feb90 100644
--- a/2020/19xxx/CVE-2020-19613.json
+++ b/2020/19xxx/CVE-2020-19613.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19613",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19613",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Server Side Request Forgery (SSRF) vulnerability in saveUrlAs function in ImagesService.java in sunkaifei FlyCMS version 20190503."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/sunkaifei/FlyCms/issues/1",
+                "refsource": "MISC",
+                "name": "https://github.com/sunkaifei/FlyCms/issues/1"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19616.json b/2020/19xxx/CVE-2020-19616.json
index f097101e6d6..eab034b6cce 100644
--- a/2020/19xxx/CVE-2020-19616.json
+++ b/2020/19xxx/CVE-2020-19616.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19616",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19616",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the post header field to /post/editing."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/langhsu/mblog/issues/27",
+                "refsource": "MISC",
+                "name": "https://github.com/langhsu/mblog/issues/27"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19617.json b/2020/19xxx/CVE-2020-19617.json
index ce707c7de8b..9e217bd632c 100644
--- a/2020/19xxx/CVE-2020-19617.json
+++ b/2020/19xxx/CVE-2020-19617.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19617",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19617",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the nickname field to /settings/profile."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/langhsu/mblog/issues/27",
+                "refsource": "MISC",
+                "name": "https://github.com/langhsu/mblog/issues/27"
             }
         ]
     }
diff --git a/2021/20xxx/CVE-2021-20078.json b/2021/20xxx/CVE-2021-20078.json
index 96c6c4f6267..a83ead463ac 100644
--- a/2021/20xxx/CVE-2021-20078.json
+++ b/2021/20xxx/CVE-2021-20078.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-20078",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnreport@tenable.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Manage Engine OpManager",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "All versions prior to version build 125346"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Denial of Service"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.tenable.com/security/research/tra-2021-10",
+                "url": "https://www.tenable.com/security/research/tra-2021-10"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS."
             }
         ]
     }
diff --git a/2021/21xxx/CVE-2021-21982.json b/2021/21xxx/CVE-2021-21982.json
index 0f7697eed1f..8a59551974f 100644
--- a/2021/21xxx/CVE-2021-21982.json
+++ b/2021/21xxx/CVE-2021-21982.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-21982",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security@vmware.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "VMware Carbon Black Cloud Workload appliance",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "VMware Carbon Black Cloud Workload appliance 1.0.0 and 1.01"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Authentication bypass"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://www.vmware.com/security/advisories/VMSA-2021-0005.html",
+                "url": "https://www.vmware.com/security/advisories/VMSA-2021-0005.html"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "VMware Carbon Black Cloud Workload appliance 1.0.0 and 1.01 has an authentication bypass vulnerability that may allow a malicious actor with network access to the administrative interface of the VMware Carbon Black Cloud Workload appliance to obtain a valid authentication token. Successful exploitation of this issue would result in the attacker being able to view and alter administrative configuration settings."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26072.json b/2021/26xxx/CVE-2021-26072.json
index 81f2722e92a..a4629c30a53 100644
--- a/2021/26xxx/CVE-2021-26072.json
+++ b/2021/26xxx/CVE-2021-26072.json
@@ -1,75 +1,75 @@
 {
-   "CVE_data_meta": {
-      "ASSIGNER": "security@atlassian.com",
-      "DATE_PUBLIC": "2021-04-01T00:00:00",
-      "ID": "CVE-2021-26072",
-      "STATE": "PUBLIC"
-   },
-   "affects": {
-      "vendor": {
-         "vendor_data": [
-            {
-               "product": {
-                  "product_data": [
-                     {
-                        "product_name": "Confluence Server",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "5.8.6",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     },
-                     {
-                        "product_name": "Confluence Data Center",
-                        "version": {
-                           "version_data": [
-                              {
-                                 "version_value": "5.8.6",
-                                 "version_affected": "<"
-                              }
-                           ]
-                        }
-                     }
-                  ]
-               },
-               "vendor_name": "Atlassian"
-            }
-         ]
-      }
-   },
-   "data_format": "MITRE",
-   "data_type": "CVE",
-   "data_version": "4.0",
-   "description": {
-      "description_data": [
-         {
-            "lang": "eng",
-            "value": "The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability."
-
-
-         }
-      ]
-   },
-   "problemtype": {
-      "problemtype_data": [
-         {
-            "description": [
-               {
-                  "lang": "eng",
-                  "value": "Server Side Request Forgery (SSRF)"
-               }
+    "CVE_data_meta": {
+        "ASSIGNER": "security@atlassian.com",
+        "DATE_PUBLIC": "2021-04-01T00:00:00",
+        "ID": "CVE-2021-26072",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Confluence Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.8.6",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            },
+                            {
+                                "product_name": "Confluence Data Center",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "5.8.6",
+                                            "version_affected": "<"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Atlassian"
+                }
             ]
-         }
-      ]
-   },
-   "references": {
-      "reference_data": [
-         {
-            "url": "https://jira.atlassian.com/browse/CONFSERVER-61399"
-         }
-      ]
-   }
-}
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Server Side Request Forgery (SSRF)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://jira.atlassian.com/browse/CONFSERVER-61399",
+                "refsource": "MISC",
+                "name": "https://jira.atlassian.com/browse/CONFSERVER-61399"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/26xxx/CVE-2021-26580.json b/2021/26xxx/CVE-2021-26580.json
index 6d7cb2f3969..0855a4b0b60 100644
--- a/2021/26xxx/CVE-2021-26580.json
+++ b/2021/26xxx/CVE-2021-26580.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26580",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "iLO Amplifier Pack",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Prior to version 1.80"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote cross-site scripting (xss)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04107en_us",
+                "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04107en_us"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A potential security vulnerability has been identified in HPE iLO Amplifier Pack. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS). HPE has provided the following software update to resolve the vulnerability in HPE iLO Amplifier Pack: HPE iLO Amplifier Pack 1.80 or later."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26581.json b/2021/26xxx/CVE-2021-26581.json
index 039dccda2f2..3e6babe936b 100644
--- a/2021/26xxx/CVE-2021-26581.json
+++ b/2021/26xxx/CVE-2021-26581.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26581",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "security-alert@hpe.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "HPE Superdome Flex Server",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "Prior to version 3.30.142"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "remote denial of service (dos)"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04102en_us",
+                "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04102en_us"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "A potential security vulnerability has been identified in HPE Superdome Flex server. A denial of service attack can be remotely exploited leaving hung connections to the BMC web interface. The monarch BMC must be rebooted to recover from this situation. Other BMC management is not impacted. HPE has made the following software update to resolve the vulnerability in HPE Superdome Flex Server: Superdome Flex Server Firmware 3.30.142 or later."
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26718.json b/2021/26xxx/CVE-2021-26718.json
index b49cf029321..e241f3264d7 100644
--- a/2021/26xxx/CVE-2021-26718.json
+++ b/2021/26xxx/CVE-2021-26718.json
@@ -4,14 +4,58 @@
     "data_version": "4.0",
     "CVE_data_meta": {
         "ID": "CVE-2021-26718",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ASSIGNER": "vulnerability@kaspersky.com",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "vendor_name": "n/a",
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Kaspersky Internet Security for Mac",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "prior to 21.1"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    }
+                }
+            ]
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "Bypass"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "name": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310321",
+                "url": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310321"
+            }
+        ]
     },
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "KIS for macOS in some use cases was vulnerable to AV bypass that potentially allowed an attacker to disable anti-virus protection."
             }
         ]
     }
diff --git a/2021/27xxx/CVE-2021-27653.json b/2021/27xxx/CVE-2021-27653.json
index d34fbbc2b93..0a8e8a29632 100644
--- a/2021/27xxx/CVE-2021-27653.json
+++ b/2021/27xxx/CVE-2021-27653.json
@@ -1,18 +1,91 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@pega.com",
+        "DATE_PUBLIC": "2021-03-30T16:45:00.000Z",
         "ID": "CVE-2021-27653",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Pega Infinity",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": ">=7.4.0, <8.5.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Pega Systems"
+                }
+            ]
+        }
+    },
+    "credit": [
+        {
+            "lang": "eng",
+            "value": "Sakura Samurai Robert Willis, Aubrey Cottle, Jackson Henry, and John Jackson,  Collaborator Break3r"
+        }
+    ],
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Misconfiguration of the Pega Chat Access Group portal in Pega platform 7.4.0 - 8.5.x could lead to unintended data exposure."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 6.6,
+            "baseSeverity": "MEDIUM",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "HIGH",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-284 Improper Access Control"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "MISC",
+                "url": "https://collaborate.pega.com/discussion/pega-security-advisory-%E2%80%93-b21",
+                "name": "https://collaborate.pega.com/discussion/pega-security-advisory-%E2%80%93-b21"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "EXTERNAL"
     }
 }
\ No newline at end of file
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index f537155b0e8..7ab49fa8e46 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -121,6 +121,11 @@
                 "refsource": "GENTOO",
                 "name": "GLSA-202103-03",
                 "url": "https://security.gentoo.org/glsa/202103-03"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.tenable.com/security/tns-2021-06",
+                "url": "https://www.tenable.com/security/tns-2021-06"
             }
         ]
     }

From f5e5b45539d40d09a0b87ab47c5ec6eee98c3589 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 20:00:39 +0000
Subject: [PATCH 829/845] "-Synchronized-Data."

---
 2020/19xxx/CVE-2020-19618.json | 56 ++++++++++++++++++++++++++++++----
 2020/19xxx/CVE-2020-19619.json | 56 ++++++++++++++++++++++++++++++----
 2020/23xxx/CVE-2020-23839.json | 10 ++++++
 2020/36xxx/CVE-2020-36002.json |  2 +-
 2021/28xxx/CVE-2021-28969.json | 56 ++++++++++++++++++++++++++++++----
 2021/28xxx/CVE-2021-28970.json | 56 ++++++++++++++++++++++++++++++----
 2021/29xxx/CVE-2021-29421.json | 56 ++++++++++++++++++++++++++++++----
 7 files changed, 261 insertions(+), 31 deletions(-)

diff --git a/2020/19xxx/CVE-2020-19618.json b/2020/19xxx/CVE-2020-19618.json
index 9023292c017..d491df3ede1 100644
--- a/2020/19xxx/CVE-2020-19618.json
+++ b/2020/19xxx/CVE-2020-19618.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19618",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19618",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the post content field to /post/editing."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/langhsu/mblog/issues/27",
+                "refsource": "MISC",
+                "name": "https://github.com/langhsu/mblog/issues/27"
             }
         ]
     }
diff --git a/2020/19xxx/CVE-2020-19619.json b/2020/19xxx/CVE-2020-19619.json
index 58b17b1793f..11dc7c145cb 100644
--- a/2020/19xxx/CVE-2020-19619.json
+++ b/2020/19xxx/CVE-2020-19619.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2020-19619",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2020-19619",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the signature field to /settings/profile."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://github.com/langhsu/mblog/issues/27",
+                "refsource": "MISC",
+                "name": "https://github.com/langhsu/mblog/issues/27"
             }
         ]
     }
diff --git a/2020/23xxx/CVE-2020-23839.json b/2020/23xxx/CVE-2020-23839.json
index 15c0b2142c9..9c237ebee5b 100644
--- a/2020/23xxx/CVE-2020-23839.json
+++ b/2020/23xxx/CVE-2020-23839.json
@@ -61,6 +61,16 @@
                 "refsource": "MISC",
                 "name": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html",
                 "url": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html"
+            },
+            {
+                "refsource": "EXPLOIT-DB",
+                "name": "49726",
+                "url": "https://www.exploit-db.com/exploits/49726"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/boku7/CVE-2020-23839",
+                "url": "https://github.com/boku7/CVE-2020-23839"
             }
         ]
     }
diff --git a/2020/36xxx/CVE-2020-36002.json b/2020/36xxx/CVE-2020-36002.json
index 93b0547f15a..78d6985b4f2 100644
--- a/2020/36xxx/CVE-2020-36002.json
+++ b/2020/36xxx/CVE-2020-36002.json
@@ -34,7 +34,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "Seat-Reservation-System 1.0 has a SQL injection vulnerability in index.php in the id and file parameters where attackers can obtain sensitive database information."
+                "value": "Seat-Reservation-System 1.0 has a SQL injection vulnerability in index.php in the id parameter where attackers can obtain sensitive database information."
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28969.json b/2021/28xxx/CVE-2021-28969.json
index 68c0eb6c6d5..59630b0e519 100644
--- a/2021/28xxx/CVE-2021-28969.json
+++ b/2021/28xxx/CVE-2021-28969.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28969",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28969",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "eMPS 9.0.1.923211 on FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the sort_by parameter to the email search feature. According to the vendor, the issue is fixed in 9.0.3. NOTE: this is different from CVE-2020-25034 and affects newer versions of the software."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-005.txt",
+                "refsource": "MISC",
+                "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-005.txt"
             }
         ]
     }
diff --git a/2021/28xxx/CVE-2021-28970.json b/2021/28xxx/CVE-2021-28970.json
index 28b38c73fac..6ad8d488c4e 100644
--- a/2021/28xxx/CVE-2021-28970.json
+++ b/2021/28xxx/CVE-2021-28970.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28970",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28970",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "eMPS 9.0.1.923211 on the Central Management of FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the job_id parameter to the email search feature. According to the vendor, the issue is fixed in 9.0.3."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt",
+                "refsource": "MISC",
+                "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29421.json b/2021/29xxx/CVE-2021-29421.json
index cb8bbd2be50..659b478e117 100644
--- a/2021/29xxx/CVE-2021-29421.json
+++ b/2021/29xxx/CVE-2021-29421.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-29421",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-29421",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a",
+                "url": "https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a"
             }
         ]
     }

From 2de23b901db568839de99ade3147241d1f5120c4 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 21:00:40 +0000
Subject: [PATCH 830/845] "-Synchronized-Data."

---
 2021/28xxx/CVE-2021-28047.json | 56 ++++++++++++++++++++++++++++++----
 1 file changed, 50 insertions(+), 6 deletions(-)

diff --git a/2021/28xxx/CVE-2021-28047.json b/2021/28xxx/CVE-2021-28047.json
index 384f15d8f22..8051c7fce70 100644
--- a/2021/28xxx/CVE-2021-28047.json
+++ b/2021/28xxx/CVE-2021-28047.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-28047",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-28047",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "Cross-Site Scripting (XSS) in Administrative Reports in Devolutions Remote Desktop Manager before 2021.1 allows remote authenticated users to inject arbitrary web script or HTML via multiple input fields."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://devolutions.net/security/advisories/devo-2021-0003",
+                "url": "https://devolutions.net/security/advisories/devo-2021-0003"
             }
         ]
     }

From d287dbe8ecf533b4d658e8b66dc9d6211a05fd3f Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Thu, 1 Apr 2021 14:08:29 -0700
Subject: [PATCH 831/845] Add CVE-2021-21416 for GHSA-58c7-px5v-82hh

---
 2021/21xxx/CVE-2021-21416.json | 77 +++++++++++++++++++++++++++++++---
 1 file changed, 71 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21416.json b/2021/21xxx/CVE-2021-21416.json
index dfa8f2f20d8..9ed4b6e9629 100644
--- a/2021/21xxx/CVE-2021-21416.json
+++ b/2021/21xxx/CVE-2021-21416.json
@@ -1,18 +1,83 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21416",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Potential sensitive information disclosed in error reports"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "django-registration",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 3.1.2"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "ubernostrum"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django.\n\nTriggering this requires: A site is using django-registration < 3.1.2, The site has detailed error reports (such as Django's emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account.\n\nUnder these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password)."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "LOCAL",
+            "availabilityImpact": "NONE",
+            "baseScore": 3.7,
+            "baseSeverity": "LOW",
+            "confidentialityImpact": "LOW",
+            "integrityImpact": "LOW",
+            "privilegesRequired": "HIGH",
+            "scope": "CHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "{\"CWE-209\":\"Generation of Error Message Containing Sensitive Information\"}"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-58c7-px5v-82hh",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 4f388590c08b3f7fb8cdd36dc8bfe9988586334c Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Thu, 1 Apr 2021 14:36:38 -0700
Subject: [PATCH 832/845] Add CVE-2021-21420 for GHSA-j6x4-4622-8vv3

---
 2021/21xxx/CVE-2021-21420.json | 77 +++++++++++++++++++++++++++++++---
 1 file changed, 71 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21420.json b/2021/21xxx/CVE-2021-21420.json
index 2b6ad3917dd..224c65a58b0 100644
--- a/2021/21xxx/CVE-2021-21420.json
+++ b/2021/21xxx/CVE-2021-21420.json
@@ -1,18 +1,83 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21420",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "Vulnerability in Stripe for Visual Studio Code < 1.7.3"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "vscode-stripe",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 1.7.3"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "stripe"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "vscode-stripe is an extension for Visual Studio Code. A vulnerability in Stripe for Visual Studio Code extension exists when it loads an untrusted source-code repository containing malicious settings.\nAn attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The update addresses the vulnerability by modifying the way the extension validates its settings."
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "HIGH",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 7.5,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "HIGH",
+            "privilegesRequired": "NONE",
+            "scope": "UNCHANGED",
+            "userInteraction": "REQUIRED",
+            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "{\"CWE-74\":\"Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')\"}"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/stripe/vscode-stripe/security/advisories/GHSA-j6x4-4622-8vv3",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/stripe/vscode-stripe/security/advisories/GHSA-j6x4-4622-8vv3"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-j6x4-4622-8vv3",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 00a70787d18bc99eeb0277c467a513652133145d Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 22:00:40 +0000
Subject: [PATCH 833/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21416.json |  2 +-
 2021/21xxx/CVE-2021-21420.json |  2 +-
 2021/23xxx/CVE-2021-23921.json | 56 ++++++++++++++++++++++++++++++----
 2021/23xxx/CVE-2021-23922.json | 56 ++++++++++++++++++++++++++++++----
 2021/23xxx/CVE-2021-23923.json | 56 ++++++++++++++++++++++++++++++----
 2021/23xxx/CVE-2021-23924.json | 56 ++++++++++++++++++++++++++++++----
 2021/23xxx/CVE-2021-23925.json | 56 ++++++++++++++++++++++++++++++----
 2021/26xxx/CVE-2021-26919.json |  5 +++
 2021/3xxx/CVE-2021-3449.json   |  5 +++
 2021/3xxx/CVE-2021-3450.json   |  5 +++
 10 files changed, 267 insertions(+), 32 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21416.json b/2021/21xxx/CVE-2021-21416.json
index 9ed4b6e9629..44f4010e748 100644
--- a/2021/21xxx/CVE-2021-21416.json
+++ b/2021/21xxx/CVE-2021-21416.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django.\n\nTriggering this requires: A site is using django-registration < 3.1.2, The site has detailed error reports (such as Django's emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account.\n\nUnder these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password)."
+                "value": "django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. Triggering this requires: A site is using django-registration < 3.1.2, The site has detailed error reports (such as Django's emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account. Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password)."
             }
         ]
     },
diff --git a/2021/21xxx/CVE-2021-21420.json b/2021/21xxx/CVE-2021-21420.json
index 224c65a58b0..535cc3831c4 100644
--- a/2021/21xxx/CVE-2021-21420.json
+++ b/2021/21xxx/CVE-2021-21420.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "vscode-stripe is an extension for Visual Studio Code. A vulnerability in Stripe for Visual Studio Code extension exists when it loads an untrusted source-code repository containing malicious settings.\nAn attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The update addresses the vulnerability by modifying the way the extension validates its settings."
+                "value": "vscode-stripe is an extension for Visual Studio Code. A vulnerability in Stripe for Visual Studio Code extension exists when it loads an untrusted source-code repository containing malicious settings. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The update addresses the vulnerability by modifying the way the extension validates its settings."
             }
         ]
     },
diff --git a/2021/23xxx/CVE-2021-23921.json b/2021/23xxx/CVE-2021-23921.json
index 603eff4ad9f..320e6f7d3b3 100644
--- a/2021/23xxx/CVE-2021-23921.json
+++ b/2021/23xxx/CVE-2021-23921.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-23921",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-23921",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://devolutions.net/security/advisories/devo-2021-0002",
+                "url": "https://devolutions.net/security/advisories/devo-2021-0002"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23922.json b/2021/23xxx/CVE-2021-23922.json
index dce9250458d..e61abbb8e25 100644
--- a/2021/23xxx/CVE-2021-23922.json
+++ b/2021/23xxx/CVE-2021-23922.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-23922",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-23922",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Devolutions Remote Desktop Manager before 2020.2.12. There is a cross-site scripting (XSS) vulnerability in webviews."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://devolutions.net/security/advisories/devo-2021-0001",
+                "url": "https://devolutions.net/security/advisories/devo-2021-0001"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23923.json b/2021/23xxx/CVE-2021-23923.json
index f35f5d3dd77..fe581c12493 100644
--- a/2021/23xxx/CVE-2021-23923.json
+++ b/2021/23xxx/CVE-2021-23923.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-23923",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-23923",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://devolutions.net/security/advisories/devo-2021-0002",
+                "url": "https://devolutions.net/security/advisories/devo-2021-0002"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23924.json b/2021/23xxx/CVE-2021-23924.json
index 3408fe9931a..95d50c2eef9 100644
--- a/2021/23xxx/CVE-2021-23924.json
+++ b/2021/23xxx/CVE-2021-23924.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-23924",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-23924",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://devolutions.net/security/advisories/devo-2021-0002",
+                "url": "https://devolutions.net/security/advisories/devo-2021-0002"
             }
         ]
     }
diff --git a/2021/23xxx/CVE-2021-23925.json b/2021/23xxx/CVE-2021-23925.json
index be039795b46..e467b095e06 100644
--- a/2021/23xxx/CVE-2021-23925.json
+++ b/2021/23xxx/CVE-2021-23925.json
@@ -1,17 +1,61 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-23925",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-23925",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "name": "https://devolutions.net/security/advisories/devo-2021-0002",
+                "url": "https://devolutions.net/security/advisories/devo-2021-0002"
             }
         ]
     }
diff --git a/2021/26xxx/CVE-2021-26919.json b/2021/26xxx/CVE-2021-26919.json
index ca3f4711a05..7aec32f4da1 100644
--- a/2021/26xxx/CVE-2021-26919.json
+++ b/2021/26xxx/CVE-2021-26919.json
@@ -74,6 +74,11 @@
                 "refsource": "MLIST",
                 "name": "[druid-dev] 20210331 Regarding the 0.21.0 release",
                 "url": "https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-dev] 20210401 Re: Subject: [CVE-2021-26919] Authenticated users can execute arbitrary code from malicious MySQL database systems",
+                "url": "https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index 7ab49fa8e46..69813ba7dfb 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -126,6 +126,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-06",
                 "url": "https://www.tenable.com/security/tns-2021-06"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.tenable.com/security/tns-2021-05",
+                "url": "https://www.tenable.com/security/tns-2021-05"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index 921c846018c..d0809918949 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -116,6 +116,11 @@
                 "refsource": "GENTOO",
                 "name": "GLSA-202103-03",
                 "url": "https://security.gentoo.org/glsa/202103-03"
+            },
+            {
+                "refsource": "CONFIRM",
+                "name": "https://www.tenable.com/security/tns-2021-05",
+                "url": "https://www.tenable.com/security/tns-2021-05"
             }
         ]
     }

From f7839cc8f9c58a2377a5571a9bb325fe23b1f919 Mon Sep 17 00:00:00 2001
From: Jonathan Moroney 
Date: Thu, 1 Apr 2021 15:05:05 -0700
Subject: [PATCH 834/845] Add CVE-2021-21421 for GHSA-xw22-wv29-3299

---
 2021/21xxx/CVE-2021-21421.json | 82 +++++++++++++++++++++++++++++++---
 1 file changed, 76 insertions(+), 6 deletions(-)

diff --git a/2021/21xxx/CVE-2021-21421.json b/2021/21xxx/CVE-2021-21421.json
index 2ea92e67a98..e77549d469b 100644
--- a/2021/21xxx/CVE-2021-21421.json
+++ b/2021/21xxx/CVE-2021-21421.json
@@ -1,18 +1,88 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security-advisories@github.com",
         "ID": "CVE-2021-21421",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "ApiKey secret could be revelated on network issue"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "node-etsy-client",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "< 0.3.0"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "creharmony"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "node-etsy-client is a NodeJs Etsy ReST API Client.\n\nApplications that are using node-etsy-client and reporting client error to the end user will offer api key value too\n\nThis is fixed in node-etsy-client v0.3.0 and later.\n"
             }
         ]
+    },
+    "impact": {
+        "cvss": {
+            "attackComplexity": "LOW",
+            "attackVector": "NETWORK",
+            "availabilityImpact": "HIGH",
+            "baseScore": 8.1,
+            "baseSeverity": "HIGH",
+            "confidentialityImpact": "HIGH",
+            "integrityImpact": "NONE",
+            "privilegesRequired": "LOW",
+            "scope": "UNCHANGED",
+            "userInteraction": "NONE",
+            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
+            "version": "3.1"
+        }
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "{\"CWE-200\":\"Exposure of Sensitive Information to an Unauthorized Actor\"}"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "name": "https://github.com/creharmony/node-etsy-client/security/advisories/GHSA-xw22-wv29-3299",
+                "refsource": "CONFIRM",
+                "url": "https://github.com/creharmony/node-etsy-client/security/advisories/GHSA-xw22-wv29-3299"
+            },
+            {
+                "name": "https://github.com/creharmony/node-etsy-client/commit/b4beb8ef080366c1a87dbf9e163051a446acaa7d",
+                "refsource": "MISC",
+                "url": "https://github.com/creharmony/node-etsy-client/commit/b4beb8ef080366c1a87dbf9e163051a446acaa7d"
+            }
+        ]
+    },
+    "source": {
+        "advisory": "GHSA-xw22-wv29-3299",
+        "discovery": "UNKNOWN"
     }
 }
\ No newline at end of file

From 35a8eee3da055abad3d44748984d098a26ccdc71 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Thu, 1 Apr 2021 23:00:40 +0000
Subject: [PATCH 835/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21421.json |  2 +-
 2021/29xxx/CVE-2021-29944.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29945.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29946.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29947.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29948.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29949.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29950.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29951.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29952.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29953.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29954.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29955.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29956.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29957.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29958.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29959.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29960.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29961.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29962.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29963.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29964.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29965.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29966.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29967.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29968.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29969.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29970.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29971.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29972.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29973.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29974.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29975.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29976.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29977.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29978.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29979.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29980.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29981.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29982.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29983.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29984.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29985.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29986.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29987.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29988.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29989.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29990.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29991.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29992.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29993.json | 18 ++++++++++++++++++
 51 files changed, 901 insertions(+), 1 deletion(-)
 create mode 100644 2021/29xxx/CVE-2021-29944.json
 create mode 100644 2021/29xxx/CVE-2021-29945.json
 create mode 100644 2021/29xxx/CVE-2021-29946.json
 create mode 100644 2021/29xxx/CVE-2021-29947.json
 create mode 100644 2021/29xxx/CVE-2021-29948.json
 create mode 100644 2021/29xxx/CVE-2021-29949.json
 create mode 100644 2021/29xxx/CVE-2021-29950.json
 create mode 100644 2021/29xxx/CVE-2021-29951.json
 create mode 100644 2021/29xxx/CVE-2021-29952.json
 create mode 100644 2021/29xxx/CVE-2021-29953.json
 create mode 100644 2021/29xxx/CVE-2021-29954.json
 create mode 100644 2021/29xxx/CVE-2021-29955.json
 create mode 100644 2021/29xxx/CVE-2021-29956.json
 create mode 100644 2021/29xxx/CVE-2021-29957.json
 create mode 100644 2021/29xxx/CVE-2021-29958.json
 create mode 100644 2021/29xxx/CVE-2021-29959.json
 create mode 100644 2021/29xxx/CVE-2021-29960.json
 create mode 100644 2021/29xxx/CVE-2021-29961.json
 create mode 100644 2021/29xxx/CVE-2021-29962.json
 create mode 100644 2021/29xxx/CVE-2021-29963.json
 create mode 100644 2021/29xxx/CVE-2021-29964.json
 create mode 100644 2021/29xxx/CVE-2021-29965.json
 create mode 100644 2021/29xxx/CVE-2021-29966.json
 create mode 100644 2021/29xxx/CVE-2021-29967.json
 create mode 100644 2021/29xxx/CVE-2021-29968.json
 create mode 100644 2021/29xxx/CVE-2021-29969.json
 create mode 100644 2021/29xxx/CVE-2021-29970.json
 create mode 100644 2021/29xxx/CVE-2021-29971.json
 create mode 100644 2021/29xxx/CVE-2021-29972.json
 create mode 100644 2021/29xxx/CVE-2021-29973.json
 create mode 100644 2021/29xxx/CVE-2021-29974.json
 create mode 100644 2021/29xxx/CVE-2021-29975.json
 create mode 100644 2021/29xxx/CVE-2021-29976.json
 create mode 100644 2021/29xxx/CVE-2021-29977.json
 create mode 100644 2021/29xxx/CVE-2021-29978.json
 create mode 100644 2021/29xxx/CVE-2021-29979.json
 create mode 100644 2021/29xxx/CVE-2021-29980.json
 create mode 100644 2021/29xxx/CVE-2021-29981.json
 create mode 100644 2021/29xxx/CVE-2021-29982.json
 create mode 100644 2021/29xxx/CVE-2021-29983.json
 create mode 100644 2021/29xxx/CVE-2021-29984.json
 create mode 100644 2021/29xxx/CVE-2021-29985.json
 create mode 100644 2021/29xxx/CVE-2021-29986.json
 create mode 100644 2021/29xxx/CVE-2021-29987.json
 create mode 100644 2021/29xxx/CVE-2021-29988.json
 create mode 100644 2021/29xxx/CVE-2021-29989.json
 create mode 100644 2021/29xxx/CVE-2021-29990.json
 create mode 100644 2021/29xxx/CVE-2021-29991.json
 create mode 100644 2021/29xxx/CVE-2021-29992.json
 create mode 100644 2021/29xxx/CVE-2021-29993.json

diff --git a/2021/21xxx/CVE-2021-21421.json b/2021/21xxx/CVE-2021-21421.json
index e77549d469b..45e65342e2c 100644
--- a/2021/21xxx/CVE-2021-21421.json
+++ b/2021/21xxx/CVE-2021-21421.json
@@ -35,7 +35,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "node-etsy-client is a NodeJs Etsy ReST API Client.\n\nApplications that are using node-etsy-client and reporting client error to the end user will offer api key value too\n\nThis is fixed in node-etsy-client v0.3.0 and later.\n"
+                "value": "node-etsy-client is a NodeJs Etsy ReST API Client. Applications that are using node-etsy-client and reporting client error to the end user will offer api key value too This is fixed in node-etsy-client v0.3.0 and later."
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29944.json b/2021/29xxx/CVE-2021-29944.json
new file mode 100644
index 00000000000..5f2c02826c8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29944.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29944",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29945.json b/2021/29xxx/CVE-2021-29945.json
new file mode 100644
index 00000000000..add2d5a20da
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29945.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29945",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29946.json b/2021/29xxx/CVE-2021-29946.json
new file mode 100644
index 00000000000..7ff03d04b09
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29946.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29946",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29947.json b/2021/29xxx/CVE-2021-29947.json
new file mode 100644
index 00000000000..6bb9b3b8a32
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29947.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29947",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29948.json b/2021/29xxx/CVE-2021-29948.json
new file mode 100644
index 00000000000..654210d27d8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29948.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29948",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29949.json b/2021/29xxx/CVE-2021-29949.json
new file mode 100644
index 00000000000..93d5ea0a6a2
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29949.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29949",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29950.json b/2021/29xxx/CVE-2021-29950.json
new file mode 100644
index 00000000000..e7a36dc6e21
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29950.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29950",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29951.json b/2021/29xxx/CVE-2021-29951.json
new file mode 100644
index 00000000000..cbf32eb8c7b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29951.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29951",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29952.json b/2021/29xxx/CVE-2021-29952.json
new file mode 100644
index 00000000000..61fe253e20d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29952.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29952",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29953.json b/2021/29xxx/CVE-2021-29953.json
new file mode 100644
index 00000000000..7f5c928ff83
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29953.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29953",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29954.json b/2021/29xxx/CVE-2021-29954.json
new file mode 100644
index 00000000000..0fe3308d4c3
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29954.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29954",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29955.json b/2021/29xxx/CVE-2021-29955.json
new file mode 100644
index 00000000000..c9b1958ac0a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29955.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29955",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29956.json b/2021/29xxx/CVE-2021-29956.json
new file mode 100644
index 00000000000..c905ec78d8b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29956.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29956",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29957.json b/2021/29xxx/CVE-2021-29957.json
new file mode 100644
index 00000000000..ec215ec1ed7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29957.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29957",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29958.json b/2021/29xxx/CVE-2021-29958.json
new file mode 100644
index 00000000000..35c2203991e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29958.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29958",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29959.json b/2021/29xxx/CVE-2021-29959.json
new file mode 100644
index 00000000000..2592a1b8336
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29959.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29959",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29960.json b/2021/29xxx/CVE-2021-29960.json
new file mode 100644
index 00000000000..5565ce113d6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29960.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29960",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29961.json b/2021/29xxx/CVE-2021-29961.json
new file mode 100644
index 00000000000..952ca576659
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29961.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29961",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29962.json b/2021/29xxx/CVE-2021-29962.json
new file mode 100644
index 00000000000..7d1ad722c4b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29962.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29962",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29963.json b/2021/29xxx/CVE-2021-29963.json
new file mode 100644
index 00000000000..9a56294ce03
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29963.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29963",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29964.json b/2021/29xxx/CVE-2021-29964.json
new file mode 100644
index 00000000000..2655a0f6e7b
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29964.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29964",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29965.json b/2021/29xxx/CVE-2021-29965.json
new file mode 100644
index 00000000000..a644ef8a17d
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29965.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29965",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29966.json b/2021/29xxx/CVE-2021-29966.json
new file mode 100644
index 00000000000..5319fe0af18
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29966.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29966",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29967.json b/2021/29xxx/CVE-2021-29967.json
new file mode 100644
index 00000000000..c874d336142
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29967.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29967",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29968.json b/2021/29xxx/CVE-2021-29968.json
new file mode 100644
index 00000000000..bfd53a34cec
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29968.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29968",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29969.json b/2021/29xxx/CVE-2021-29969.json
new file mode 100644
index 00000000000..e3268741854
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29969.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29969",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29970.json b/2021/29xxx/CVE-2021-29970.json
new file mode 100644
index 00000000000..09eb1125b42
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29970.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29970",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29971.json b/2021/29xxx/CVE-2021-29971.json
new file mode 100644
index 00000000000..62e1ba126e1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29971.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29971",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29972.json b/2021/29xxx/CVE-2021-29972.json
new file mode 100644
index 00000000000..df356d7c2d9
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29972.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29972",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29973.json b/2021/29xxx/CVE-2021-29973.json
new file mode 100644
index 00000000000..f8efaab4b58
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29973.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29973",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29974.json b/2021/29xxx/CVE-2021-29974.json
new file mode 100644
index 00000000000..7b302ea963e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29974.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29974",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29975.json b/2021/29xxx/CVE-2021-29975.json
new file mode 100644
index 00000000000..a312e2fc5b5
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29975.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29975",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29976.json b/2021/29xxx/CVE-2021-29976.json
new file mode 100644
index 00000000000..70335b39a3a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29976.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29976",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29977.json b/2021/29xxx/CVE-2021-29977.json
new file mode 100644
index 00000000000..90ebef4258e
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29977.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29977",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29978.json b/2021/29xxx/CVE-2021-29978.json
new file mode 100644
index 00000000000..ed3fb85f8be
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29978.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29978",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29979.json b/2021/29xxx/CVE-2021-29979.json
new file mode 100644
index 00000000000..58356cd4bf7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29979.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29979",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29980.json b/2021/29xxx/CVE-2021-29980.json
new file mode 100644
index 00000000000..f07c61539bc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29980.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29980",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29981.json b/2021/29xxx/CVE-2021-29981.json
new file mode 100644
index 00000000000..837d5bcb44f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29981.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29981",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29982.json b/2021/29xxx/CVE-2021-29982.json
new file mode 100644
index 00000000000..b5244b9cfdc
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29982.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29982",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29983.json b/2021/29xxx/CVE-2021-29983.json
new file mode 100644
index 00000000000..a27161faea6
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29983.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29983",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29984.json b/2021/29xxx/CVE-2021-29984.json
new file mode 100644
index 00000000000..28b90989e15
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29984.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29984",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29985.json b/2021/29xxx/CVE-2021-29985.json
new file mode 100644
index 00000000000..b82352e1ad8
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29985.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29985",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29986.json b/2021/29xxx/CVE-2021-29986.json
new file mode 100644
index 00000000000..d6635c4fbbe
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29986.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29986",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29987.json b/2021/29xxx/CVE-2021-29987.json
new file mode 100644
index 00000000000..4d622885451
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29987.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29987",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29988.json b/2021/29xxx/CVE-2021-29988.json
new file mode 100644
index 00000000000..600cf321ce7
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29988.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29988",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29989.json b/2021/29xxx/CVE-2021-29989.json
new file mode 100644
index 00000000000..384b0859e66
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29989.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29989",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29990.json b/2021/29xxx/CVE-2021-29990.json
new file mode 100644
index 00000000000..eff65757ee4
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29990.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29990",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29991.json b/2021/29xxx/CVE-2021-29991.json
new file mode 100644
index 00000000000..156bc9bc1e1
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29991.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29991",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29992.json b/2021/29xxx/CVE-2021-29992.json
new file mode 100644
index 00000000000..b2c71c42fab
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29992.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29992",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29993.json b/2021/29xxx/CVE-2021-29993.json
new file mode 100644
index 00000000000..de6350ce505
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29993.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29993",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From ac2393ed0383fcfae091c5bdf53774e404d23f33 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 00:00:41 +0000
Subject: [PATCH 836/845] "-Synchronized-Data."

---
 2020/1xxx/CVE-2020-1946.json   | 5 +++++
 2021/28xxx/CVE-2021-28831.json | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/2020/1xxx/CVE-2020-1946.json b/2020/1xxx/CVE-2020-1946.json
index 62166d5602a..03477cc380d 100644
--- a/2020/1xxx/CVE-2020-1946.json
+++ b/2020/1xxx/CVE-2020-1946.json
@@ -79,6 +79,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-bf06dcffa8",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V2SBVTKVLFFT36ECJQ7TQ7KAQCQZDRZ/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210401 [SECURITY] [DLA 2615-1] spamassassin security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00000.html"
             }
         ]
     },
diff --git a/2021/28xxx/CVE-2021-28831.json b/2021/28xxx/CVE-2021-28831.json
index 990c3cb4078..82185aeb03e 100644
--- a/2021/28xxx/CVE-2021-28831.json
+++ b/2021/28xxx/CVE-2021-28831.json
@@ -71,6 +71,11 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-2024803354",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update",
+                "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html"
             }
         ]
     },

From e86d874980e53729bcaa2c4e873f65cd2ef20426 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 02:00:43 +0000
Subject: [PATCH 837/845] "-Synchronized-Data."

---
 2021/26xxx/CVE-2021-26919.json | 5 +++++
 2021/29xxx/CVE-2021-29646.json | 5 +++++
 2021/29xxx/CVE-2021-29647.json | 5 +++++
 2021/29xxx/CVE-2021-29648.json | 5 +++++
 2021/29xxx/CVE-2021-29649.json | 5 +++++
 2021/29xxx/CVE-2021-29650.json | 5 +++++
 2021/3xxx/CVE-2021-3449.json   | 5 +++++
 2021/3xxx/CVE-2021-3450.json   | 5 +++++
 8 files changed, 40 insertions(+)

diff --git a/2021/26xxx/CVE-2021-26919.json b/2021/26xxx/CVE-2021-26919.json
index 7aec32f4da1..18d7934a7de 100644
--- a/2021/26xxx/CVE-2021-26919.json
+++ b/2021/26xxx/CVE-2021-26919.json
@@ -79,6 +79,11 @@
                 "refsource": "MLIST",
                 "name": "[druid-dev] 20210401 Re: Subject: [CVE-2021-26919] Authenticated users can execute arbitrary code from malicious MySQL database systems",
                 "url": "https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E"
+            },
+            {
+                "refsource": "MLIST",
+                "name": "[druid-commits] 20210401 [GitHub] [druid] jihoonson merged pull request #11047: Allow list for JDBC connection properties to address CVE-2021-26919",
+                "url": "https://lists.apache.org/thread.html/re0910cf4c784897774427fecd95912fb565a6bd06d924a55e70bbbfc@%3Ccommits.druid.apache.org%3E"
             }
         ]
     },
diff --git a/2021/29xxx/CVE-2021-29646.json b/2021/29xxx/CVE-2021-29646.json
index 3ea750d8beb..4bc98743eed 100644
--- a/2021/29xxx/CVE-2021-29646.json
+++ b/2021/29xxx/CVE-2021-29646.json
@@ -61,6 +61,11 @@
                 "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11",
                 "refsource": "MISC",
                 "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-41fb54ae9f",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29647.json b/2021/29xxx/CVE-2021-29647.json
index 9f45e763ab1..2e3f31ac83d 100644
--- a/2021/29xxx/CVE-2021-29647.json
+++ b/2021/29xxx/CVE-2021-29647.json
@@ -61,6 +61,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-41fb54ae9f",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29648.json b/2021/29xxx/CVE-2021-29648.json
index 87ae378e1db..896e4af27bd 100644
--- a/2021/29xxx/CVE-2021-29648.json
+++ b/2021/29xxx/CVE-2021-29648.json
@@ -61,6 +61,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-41fb54ae9f",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29649.json b/2021/29xxx/CVE-2021-29649.json
index c195d1e1f8e..d183fb48b07 100644
--- a/2021/29xxx/CVE-2021-29649.json
+++ b/2021/29xxx/CVE-2021-29649.json
@@ -61,6 +61,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-41fb54ae9f",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29650.json b/2021/29xxx/CVE-2021-29650.json
index 81ba76e6d7a..c7c296096d5 100644
--- a/2021/29xxx/CVE-2021-29650.json
+++ b/2021/29xxx/CVE-2021-29650.json
@@ -61,6 +61,11 @@
                 "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
                 "refsource": "MISC",
                 "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-41fb54ae9f",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json
index 69813ba7dfb..20eef912941 100644
--- a/2021/3xxx/CVE-2021-3449.json
+++ b/2021/3xxx/CVE-2021-3449.json
@@ -131,6 +131,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-05",
                 "url": "https://www.tenable.com/security/tns-2021-05"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-cbf14ab8f9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/"
             }
         ]
     }
diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json
index d0809918949..ca89a8ec46f 100644
--- a/2021/3xxx/CVE-2021-3450.json
+++ b/2021/3xxx/CVE-2021-3450.json
@@ -121,6 +121,11 @@
                 "refsource": "CONFIRM",
                 "name": "https://www.tenable.com/security/tns-2021-05",
                 "url": "https://www.tenable.com/security/tns-2021-05"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-cbf14ab8f9",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/"
             }
         ]
     }

From b7d51f903e9606b3c60a69eec8cdca99e9042cbd Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 04:00:40 +0000
Subject: [PATCH 838/845] "-Synchronized-Data."

---
 2021/29xxx/CVE-2021-29646.json | 10 ++++++++++
 2021/29xxx/CVE-2021-29647.json | 10 ++++++++++
 2021/29xxx/CVE-2021-29648.json | 10 ++++++++++
 2021/29xxx/CVE-2021-29649.json | 10 ++++++++++
 2021/29xxx/CVE-2021-29650.json | 10 ++++++++++
 2021/29xxx/CVE-2021-29994.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29995.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29996.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29997.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29998.json | 18 ++++++++++++++++++
 2021/29xxx/CVE-2021-29999.json | 18 ++++++++++++++++++
 11 files changed, 158 insertions(+)
 create mode 100644 2021/29xxx/CVE-2021-29994.json
 create mode 100644 2021/29xxx/CVE-2021-29995.json
 create mode 100644 2021/29xxx/CVE-2021-29996.json
 create mode 100644 2021/29xxx/CVE-2021-29997.json
 create mode 100644 2021/29xxx/CVE-2021-29998.json
 create mode 100644 2021/29xxx/CVE-2021-29999.json

diff --git a/2021/29xxx/CVE-2021-29646.json b/2021/29xxx/CVE-2021-29646.json
index 4bc98743eed..5753dad2ea9 100644
--- a/2021/29xxx/CVE-2021-29646.json
+++ b/2021/29xxx/CVE-2021-29646.json
@@ -66,6 +66,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-41fb54ae9f",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6b0f287b8b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2306e89112",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29647.json b/2021/29xxx/CVE-2021-29647.json
index 2e3f31ac83d..0ecc03176ca 100644
--- a/2021/29xxx/CVE-2021-29647.json
+++ b/2021/29xxx/CVE-2021-29647.json
@@ -66,6 +66,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-41fb54ae9f",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6b0f287b8b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2306e89112",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29648.json b/2021/29xxx/CVE-2021-29648.json
index 896e4af27bd..80f87a45a73 100644
--- a/2021/29xxx/CVE-2021-29648.json
+++ b/2021/29xxx/CVE-2021-29648.json
@@ -66,6 +66,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-41fb54ae9f",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6b0f287b8b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2306e89112",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29649.json b/2021/29xxx/CVE-2021-29649.json
index d183fb48b07..b5479253cce 100644
--- a/2021/29xxx/CVE-2021-29649.json
+++ b/2021/29xxx/CVE-2021-29649.json
@@ -66,6 +66,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-41fb54ae9f",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6b0f287b8b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2306e89112",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29650.json b/2021/29xxx/CVE-2021-29650.json
index c7c296096d5..1695117b2e2 100644
--- a/2021/29xxx/CVE-2021-29650.json
+++ b/2021/29xxx/CVE-2021-29650.json
@@ -66,6 +66,16 @@
                 "refsource": "FEDORA",
                 "name": "FEDORA-2021-41fb54ae9f",
                 "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKRNELXLVFDY6Y5XDMWLIH3VKIMQXLLR/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-6b0f287b8b",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZGMUP6QEHJJEKPMLKOSPWYMW7PXFC2M/"
+            },
+            {
+                "refsource": "FEDORA",
+                "name": "FEDORA-2021-2306e89112",
+                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTADK5ELGTATGW2RK3K5MBJ2WGYCPZCM/"
             }
         ]
     }
diff --git a/2021/29xxx/CVE-2021-29994.json b/2021/29xxx/CVE-2021-29994.json
new file mode 100644
index 00000000000..0de005e3928
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29994.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29994",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29995.json b/2021/29xxx/CVE-2021-29995.json
new file mode 100644
index 00000000000..1c5e30b8243
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29995.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29995",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29996.json b/2021/29xxx/CVE-2021-29996.json
new file mode 100644
index 00000000000..104e220b354
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29996.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29996",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29997.json b/2021/29xxx/CVE-2021-29997.json
new file mode 100644
index 00000000000..51ce9827b7f
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29997.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29997",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29998.json b/2021/29xxx/CVE-2021-29998.json
new file mode 100644
index 00000000000..35a0ae254ae
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29998.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29998",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/29xxx/CVE-2021-29999.json b/2021/29xxx/CVE-2021-29999.json
new file mode 100644
index 00000000000..ec2c6cb6d3a
--- /dev/null
+++ b/2021/29xxx/CVE-2021-29999.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-29999",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 3c136224a6e95efc61518b113f1c113a92e2ae04 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 05:00:38 +0000
Subject: [PATCH 839/845] "-Synchronized-Data."

---
 2021/30xxx/CVE-2021-30000.json | 18 +++++++++
 2021/30xxx/CVE-2021-30001.json | 18 +++++++++
 2021/30xxx/CVE-2021-30002.json | 72 ++++++++++++++++++++++++++++++++++
 2021/30xxx/CVE-2021-30003.json | 62 +++++++++++++++++++++++++++++
 2021/30xxx/CVE-2021-30004.json | 62 +++++++++++++++++++++++++++++
 5 files changed, 232 insertions(+)
 create mode 100644 2021/30xxx/CVE-2021-30000.json
 create mode 100644 2021/30xxx/CVE-2021-30001.json
 create mode 100644 2021/30xxx/CVE-2021-30002.json
 create mode 100644 2021/30xxx/CVE-2021-30003.json
 create mode 100644 2021/30xxx/CVE-2021-30004.json

diff --git a/2021/30xxx/CVE-2021-30000.json b/2021/30xxx/CVE-2021-30000.json
new file mode 100644
index 00000000000..da63e1b0299
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30000.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30000",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30001.json b/2021/30xxx/CVE-2021-30001.json
new file mode 100644
index 00000000000..1821e8dc3f2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30001.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30001",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30002.json b/2021/30xxx/CVE-2021-30002.json
new file mode 100644
index 00000000000..a3b9664a31e
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30002.json
@@ -0,0 +1,72 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-30002",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899",
+                "refsource": "MISC",
+                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899"
+            },
+            {
+                "url": "https://bugzilla.suse.com/show_bug.cgi?id=1184120",
+                "refsource": "MISC",
+                "name": "https://bugzilla.suse.com/show_bug.cgi?id=1184120"
+            },
+            {
+                "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3",
+                "refsource": "MISC",
+                "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30003.json b/2021/30xxx/CVE-2021-30003.json
new file mode 100644
index 00000000000..2939b1171cf
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30003.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-30003",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "An issue was discovered on Nokia G-120W-F 3FE46606AGAB91 devices. There is Stored XSS in the administrative interface via urlfilter.cgi?add url_address."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://research.0xdutra.com/posts/router-g120w-f/",
+                "refsource": "MISC",
+                "name": "https://research.0xdutra.com/posts/router-g120w-f/"
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30004.json b/2021/30xxx/CVE-2021-30004.json
new file mode 100644
index 00000000000..4e805fbe9cb
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30004.json
@@ -0,0 +1,62 @@
+{
+    "CVE_data_meta": {
+        "ASSIGNER": "cve@mitre.org",
+        "ID": "CVE-2021-30004",
+        "STATE": "PUBLIC"
+    },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15",
+                "refsource": "MISC",
+                "name": "https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15"
+            }
+        ]
+    }
+}
\ No newline at end of file

From f625773f126bcbfb8446a619b6704a92dffdc072 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 07:00:40 +0000
Subject: [PATCH 840/845] "-Synchronized-Data."

---
 2021/30xxx/CVE-2021-30005.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30006.json | 18 ++++++++++++++++++
 2 files changed, 36 insertions(+)
 create mode 100644 2021/30xxx/CVE-2021-30005.json
 create mode 100644 2021/30xxx/CVE-2021-30006.json

diff --git a/2021/30xxx/CVE-2021-30005.json b/2021/30xxx/CVE-2021-30005.json
new file mode 100644
index 00000000000..807f941e9ee
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30005.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30005",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30006.json b/2021/30xxx/CVE-2021-30006.json
new file mode 100644
index 00000000000..a07b03933e2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30006.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30006",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 344a67617af214be38a5ced5e3e6fe381cab18f0 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 08:00:39 +0000
Subject: [PATCH 841/845] "-Synchronized-Data."

---
 2021/30xxx/CVE-2021-30007.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30008.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30009.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30010.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30011.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30012.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30013.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30014.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30015.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30016.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30017.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30018.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30019.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30020.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30021.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30022.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30023.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30024.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30025.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30026.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30027.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30028.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30029.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30030.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30031.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30032.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30033.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30034.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30035.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30036.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30037.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30038.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30039.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30040.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30041.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30042.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30043.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30044.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30045.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30046.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30047.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30048.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30049.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30050.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30051.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30052.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30053.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30054.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30055.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30056.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30057.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30058.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30059.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30060.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30061.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30062.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30063.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30064.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30065.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30066.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30067.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30068.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30069.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30070.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30071.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30072.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30073.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30074.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30075.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30076.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30077.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30078.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30079.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30080.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30081.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30082.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30083.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30084.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30085.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30086.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30087.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30088.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30089.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30090.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30091.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30092.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30093.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30094.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30095.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30096.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30097.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30098.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30099.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30100.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30101.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30102.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30103.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30104.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30105.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30106.json | 18 ++++++++++++++++++
 100 files changed, 1800 insertions(+)
 create mode 100644 2021/30xxx/CVE-2021-30007.json
 create mode 100644 2021/30xxx/CVE-2021-30008.json
 create mode 100644 2021/30xxx/CVE-2021-30009.json
 create mode 100644 2021/30xxx/CVE-2021-30010.json
 create mode 100644 2021/30xxx/CVE-2021-30011.json
 create mode 100644 2021/30xxx/CVE-2021-30012.json
 create mode 100644 2021/30xxx/CVE-2021-30013.json
 create mode 100644 2021/30xxx/CVE-2021-30014.json
 create mode 100644 2021/30xxx/CVE-2021-30015.json
 create mode 100644 2021/30xxx/CVE-2021-30016.json
 create mode 100644 2021/30xxx/CVE-2021-30017.json
 create mode 100644 2021/30xxx/CVE-2021-30018.json
 create mode 100644 2021/30xxx/CVE-2021-30019.json
 create mode 100644 2021/30xxx/CVE-2021-30020.json
 create mode 100644 2021/30xxx/CVE-2021-30021.json
 create mode 100644 2021/30xxx/CVE-2021-30022.json
 create mode 100644 2021/30xxx/CVE-2021-30023.json
 create mode 100644 2021/30xxx/CVE-2021-30024.json
 create mode 100644 2021/30xxx/CVE-2021-30025.json
 create mode 100644 2021/30xxx/CVE-2021-30026.json
 create mode 100644 2021/30xxx/CVE-2021-30027.json
 create mode 100644 2021/30xxx/CVE-2021-30028.json
 create mode 100644 2021/30xxx/CVE-2021-30029.json
 create mode 100644 2021/30xxx/CVE-2021-30030.json
 create mode 100644 2021/30xxx/CVE-2021-30031.json
 create mode 100644 2021/30xxx/CVE-2021-30032.json
 create mode 100644 2021/30xxx/CVE-2021-30033.json
 create mode 100644 2021/30xxx/CVE-2021-30034.json
 create mode 100644 2021/30xxx/CVE-2021-30035.json
 create mode 100644 2021/30xxx/CVE-2021-30036.json
 create mode 100644 2021/30xxx/CVE-2021-30037.json
 create mode 100644 2021/30xxx/CVE-2021-30038.json
 create mode 100644 2021/30xxx/CVE-2021-30039.json
 create mode 100644 2021/30xxx/CVE-2021-30040.json
 create mode 100644 2021/30xxx/CVE-2021-30041.json
 create mode 100644 2021/30xxx/CVE-2021-30042.json
 create mode 100644 2021/30xxx/CVE-2021-30043.json
 create mode 100644 2021/30xxx/CVE-2021-30044.json
 create mode 100644 2021/30xxx/CVE-2021-30045.json
 create mode 100644 2021/30xxx/CVE-2021-30046.json
 create mode 100644 2021/30xxx/CVE-2021-30047.json
 create mode 100644 2021/30xxx/CVE-2021-30048.json
 create mode 100644 2021/30xxx/CVE-2021-30049.json
 create mode 100644 2021/30xxx/CVE-2021-30050.json
 create mode 100644 2021/30xxx/CVE-2021-30051.json
 create mode 100644 2021/30xxx/CVE-2021-30052.json
 create mode 100644 2021/30xxx/CVE-2021-30053.json
 create mode 100644 2021/30xxx/CVE-2021-30054.json
 create mode 100644 2021/30xxx/CVE-2021-30055.json
 create mode 100644 2021/30xxx/CVE-2021-30056.json
 create mode 100644 2021/30xxx/CVE-2021-30057.json
 create mode 100644 2021/30xxx/CVE-2021-30058.json
 create mode 100644 2021/30xxx/CVE-2021-30059.json
 create mode 100644 2021/30xxx/CVE-2021-30060.json
 create mode 100644 2021/30xxx/CVE-2021-30061.json
 create mode 100644 2021/30xxx/CVE-2021-30062.json
 create mode 100644 2021/30xxx/CVE-2021-30063.json
 create mode 100644 2021/30xxx/CVE-2021-30064.json
 create mode 100644 2021/30xxx/CVE-2021-30065.json
 create mode 100644 2021/30xxx/CVE-2021-30066.json
 create mode 100644 2021/30xxx/CVE-2021-30067.json
 create mode 100644 2021/30xxx/CVE-2021-30068.json
 create mode 100644 2021/30xxx/CVE-2021-30069.json
 create mode 100644 2021/30xxx/CVE-2021-30070.json
 create mode 100644 2021/30xxx/CVE-2021-30071.json
 create mode 100644 2021/30xxx/CVE-2021-30072.json
 create mode 100644 2021/30xxx/CVE-2021-30073.json
 create mode 100644 2021/30xxx/CVE-2021-30074.json
 create mode 100644 2021/30xxx/CVE-2021-30075.json
 create mode 100644 2021/30xxx/CVE-2021-30076.json
 create mode 100644 2021/30xxx/CVE-2021-30077.json
 create mode 100644 2021/30xxx/CVE-2021-30078.json
 create mode 100644 2021/30xxx/CVE-2021-30079.json
 create mode 100644 2021/30xxx/CVE-2021-30080.json
 create mode 100644 2021/30xxx/CVE-2021-30081.json
 create mode 100644 2021/30xxx/CVE-2021-30082.json
 create mode 100644 2021/30xxx/CVE-2021-30083.json
 create mode 100644 2021/30xxx/CVE-2021-30084.json
 create mode 100644 2021/30xxx/CVE-2021-30085.json
 create mode 100644 2021/30xxx/CVE-2021-30086.json
 create mode 100644 2021/30xxx/CVE-2021-30087.json
 create mode 100644 2021/30xxx/CVE-2021-30088.json
 create mode 100644 2021/30xxx/CVE-2021-30089.json
 create mode 100644 2021/30xxx/CVE-2021-30090.json
 create mode 100644 2021/30xxx/CVE-2021-30091.json
 create mode 100644 2021/30xxx/CVE-2021-30092.json
 create mode 100644 2021/30xxx/CVE-2021-30093.json
 create mode 100644 2021/30xxx/CVE-2021-30094.json
 create mode 100644 2021/30xxx/CVE-2021-30095.json
 create mode 100644 2021/30xxx/CVE-2021-30096.json
 create mode 100644 2021/30xxx/CVE-2021-30097.json
 create mode 100644 2021/30xxx/CVE-2021-30098.json
 create mode 100644 2021/30xxx/CVE-2021-30099.json
 create mode 100644 2021/30xxx/CVE-2021-30100.json
 create mode 100644 2021/30xxx/CVE-2021-30101.json
 create mode 100644 2021/30xxx/CVE-2021-30102.json
 create mode 100644 2021/30xxx/CVE-2021-30103.json
 create mode 100644 2021/30xxx/CVE-2021-30104.json
 create mode 100644 2021/30xxx/CVE-2021-30105.json
 create mode 100644 2021/30xxx/CVE-2021-30106.json

diff --git a/2021/30xxx/CVE-2021-30007.json b/2021/30xxx/CVE-2021-30007.json
new file mode 100644
index 00000000000..af7af6829a6
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30007.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30007",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30008.json b/2021/30xxx/CVE-2021-30008.json
new file mode 100644
index 00000000000..2e8284e1776
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30008.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30008",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30009.json b/2021/30xxx/CVE-2021-30009.json
new file mode 100644
index 00000000000..31babe698b8
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30009.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30009",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30010.json b/2021/30xxx/CVE-2021-30010.json
new file mode 100644
index 00000000000..80a8693cd64
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30010.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30010",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30011.json b/2021/30xxx/CVE-2021-30011.json
new file mode 100644
index 00000000000..925cd0bda3c
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30011.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30011",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30012.json b/2021/30xxx/CVE-2021-30012.json
new file mode 100644
index 00000000000..97c241783e5
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30012.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30012",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30013.json b/2021/30xxx/CVE-2021-30013.json
new file mode 100644
index 00000000000..0e8bbc5a948
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30013.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30013",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30014.json b/2021/30xxx/CVE-2021-30014.json
new file mode 100644
index 00000000000..d7d018dc23b
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30014.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30014",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30015.json b/2021/30xxx/CVE-2021-30015.json
new file mode 100644
index 00000000000..922c494f1c2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30015.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30015",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30016.json b/2021/30xxx/CVE-2021-30016.json
new file mode 100644
index 00000000000..b6759988513
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30016.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30016",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30017.json b/2021/30xxx/CVE-2021-30017.json
new file mode 100644
index 00000000000..da76dc9d5e1
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30017.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30017",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30018.json b/2021/30xxx/CVE-2021-30018.json
new file mode 100644
index 00000000000..81f6b9e2716
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30018.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30018",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30019.json b/2021/30xxx/CVE-2021-30019.json
new file mode 100644
index 00000000000..c842d9ee619
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30019.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30019",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30020.json b/2021/30xxx/CVE-2021-30020.json
new file mode 100644
index 00000000000..06670ac3ed8
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30020.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30020",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30021.json b/2021/30xxx/CVE-2021-30021.json
new file mode 100644
index 00000000000..b850aa8e73b
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30021.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30021",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30022.json b/2021/30xxx/CVE-2021-30022.json
new file mode 100644
index 00000000000..0df575d046a
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30022.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30022",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30023.json b/2021/30xxx/CVE-2021-30023.json
new file mode 100644
index 00000000000..6514897368e
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30023.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30023",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30024.json b/2021/30xxx/CVE-2021-30024.json
new file mode 100644
index 00000000000..c1ba6d7e169
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30024.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30024",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30025.json b/2021/30xxx/CVE-2021-30025.json
new file mode 100644
index 00000000000..37ea9a458c2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30025.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30025",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30026.json b/2021/30xxx/CVE-2021-30026.json
new file mode 100644
index 00000000000..6cc5759ca4c
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30026.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30026",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30027.json b/2021/30xxx/CVE-2021-30027.json
new file mode 100644
index 00000000000..19c4c07b2bf
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30027.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30027",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30028.json b/2021/30xxx/CVE-2021-30028.json
new file mode 100644
index 00000000000..cc7fa8e0bf1
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30028.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30028",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30029.json b/2021/30xxx/CVE-2021-30029.json
new file mode 100644
index 00000000000..8034b7e137c
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30029.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30029",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30030.json b/2021/30xxx/CVE-2021-30030.json
new file mode 100644
index 00000000000..bb53f15af34
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30030.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30030",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30031.json b/2021/30xxx/CVE-2021-30031.json
new file mode 100644
index 00000000000..33bf0616f9f
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30031.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30031",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30032.json b/2021/30xxx/CVE-2021-30032.json
new file mode 100644
index 00000000000..715f465c32e
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30032.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30032",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30033.json b/2021/30xxx/CVE-2021-30033.json
new file mode 100644
index 00000000000..6a7c12278c2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30033.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30033",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30034.json b/2021/30xxx/CVE-2021-30034.json
new file mode 100644
index 00000000000..285e055d630
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30034.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30034",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30035.json b/2021/30xxx/CVE-2021-30035.json
new file mode 100644
index 00000000000..d57293cd656
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30035.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30035",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30036.json b/2021/30xxx/CVE-2021-30036.json
new file mode 100644
index 00000000000..385d536c6a6
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30036.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30036",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30037.json b/2021/30xxx/CVE-2021-30037.json
new file mode 100644
index 00000000000..46c819b1e0b
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30037.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30037",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30038.json b/2021/30xxx/CVE-2021-30038.json
new file mode 100644
index 00000000000..aa04a59e4b5
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30038.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30038",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30039.json b/2021/30xxx/CVE-2021-30039.json
new file mode 100644
index 00000000000..ece1359b2b1
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30039.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30039",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30040.json b/2021/30xxx/CVE-2021-30040.json
new file mode 100644
index 00000000000..c1992381108
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30040.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30040",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30041.json b/2021/30xxx/CVE-2021-30041.json
new file mode 100644
index 00000000000..6c1970747a0
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30041.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30041",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30042.json b/2021/30xxx/CVE-2021-30042.json
new file mode 100644
index 00000000000..1ce0dd70178
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30042.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30042",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30043.json b/2021/30xxx/CVE-2021-30043.json
new file mode 100644
index 00000000000..d76fdae2a76
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30043.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30043",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30044.json b/2021/30xxx/CVE-2021-30044.json
new file mode 100644
index 00000000000..edc265af984
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30044.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30044",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30045.json b/2021/30xxx/CVE-2021-30045.json
new file mode 100644
index 00000000000..9fd8f8419fc
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30045.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30045",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30046.json b/2021/30xxx/CVE-2021-30046.json
new file mode 100644
index 00000000000..79306d4737a
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30046.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30046",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30047.json b/2021/30xxx/CVE-2021-30047.json
new file mode 100644
index 00000000000..8b8c1778976
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30047.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30047",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30048.json b/2021/30xxx/CVE-2021-30048.json
new file mode 100644
index 00000000000..925d16d5704
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30048.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30048",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30049.json b/2021/30xxx/CVE-2021-30049.json
new file mode 100644
index 00000000000..ebdcc9088d6
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30049.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30049",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30050.json b/2021/30xxx/CVE-2021-30050.json
new file mode 100644
index 00000000000..b6697cdbf2e
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30050.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30050",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30051.json b/2021/30xxx/CVE-2021-30051.json
new file mode 100644
index 00000000000..dfdf9ed4cf5
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30051.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30051",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30052.json b/2021/30xxx/CVE-2021-30052.json
new file mode 100644
index 00000000000..b7cdb6c64bb
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30052.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30052",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30053.json b/2021/30xxx/CVE-2021-30053.json
new file mode 100644
index 00000000000..a48c91472ea
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30053.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30053",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30054.json b/2021/30xxx/CVE-2021-30054.json
new file mode 100644
index 00000000000..4f0820f36e2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30054.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30054",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30055.json b/2021/30xxx/CVE-2021-30055.json
new file mode 100644
index 00000000000..9ed3df1f6be
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30055.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30055",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30056.json b/2021/30xxx/CVE-2021-30056.json
new file mode 100644
index 00000000000..dff246730d9
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30056.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30056",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30057.json b/2021/30xxx/CVE-2021-30057.json
new file mode 100644
index 00000000000..dd8205ce424
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30057.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30057",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30058.json b/2021/30xxx/CVE-2021-30058.json
new file mode 100644
index 00000000000..86b57f338b1
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30058.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30058",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30059.json b/2021/30xxx/CVE-2021-30059.json
new file mode 100644
index 00000000000..797250f66bb
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30059.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30059",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30060.json b/2021/30xxx/CVE-2021-30060.json
new file mode 100644
index 00000000000..6d75a439f24
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30060.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30060",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30061.json b/2021/30xxx/CVE-2021-30061.json
new file mode 100644
index 00000000000..50aafd2f3af
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30061.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30061",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30062.json b/2021/30xxx/CVE-2021-30062.json
new file mode 100644
index 00000000000..83943ba235e
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30062.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30062",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30063.json b/2021/30xxx/CVE-2021-30063.json
new file mode 100644
index 00000000000..c52cfbaf3e3
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30063.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30063",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30064.json b/2021/30xxx/CVE-2021-30064.json
new file mode 100644
index 00000000000..c6a1d677a93
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30064.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30064",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30065.json b/2021/30xxx/CVE-2021-30065.json
new file mode 100644
index 00000000000..c87952114ea
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30065.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30065",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30066.json b/2021/30xxx/CVE-2021-30066.json
new file mode 100644
index 00000000000..8a3282ff727
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30066.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30066",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30067.json b/2021/30xxx/CVE-2021-30067.json
new file mode 100644
index 00000000000..d7eff928e21
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30067.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30067",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30068.json b/2021/30xxx/CVE-2021-30068.json
new file mode 100644
index 00000000000..b90913c1ef4
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30068.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30068",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30069.json b/2021/30xxx/CVE-2021-30069.json
new file mode 100644
index 00000000000..b52ee61b6ad
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30069.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30069",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30070.json b/2021/30xxx/CVE-2021-30070.json
new file mode 100644
index 00000000000..aaf4ad062f2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30070.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30070",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30071.json b/2021/30xxx/CVE-2021-30071.json
new file mode 100644
index 00000000000..dfbd2d67641
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30071.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30071",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30072.json b/2021/30xxx/CVE-2021-30072.json
new file mode 100644
index 00000000000..8db4efb9a9b
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30072.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30072",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30073.json b/2021/30xxx/CVE-2021-30073.json
new file mode 100644
index 00000000000..d99a54b69bd
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30073.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30073",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30074.json b/2021/30xxx/CVE-2021-30074.json
new file mode 100644
index 00000000000..870f5ca1470
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30074.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30074",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30075.json b/2021/30xxx/CVE-2021-30075.json
new file mode 100644
index 00000000000..6ccc11bb817
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30075.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30075",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30076.json b/2021/30xxx/CVE-2021-30076.json
new file mode 100644
index 00000000000..17f2399cc83
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30076.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30076",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30077.json b/2021/30xxx/CVE-2021-30077.json
new file mode 100644
index 00000000000..083592fcf79
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30077.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30077",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30078.json b/2021/30xxx/CVE-2021-30078.json
new file mode 100644
index 00000000000..246a73c34f8
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30078.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30078",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30079.json b/2021/30xxx/CVE-2021-30079.json
new file mode 100644
index 00000000000..ae1acb6af75
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30079.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30079",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30080.json b/2021/30xxx/CVE-2021-30080.json
new file mode 100644
index 00000000000..0be9a87eb92
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30080.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30080",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30081.json b/2021/30xxx/CVE-2021-30081.json
new file mode 100644
index 00000000000..7f642b3576e
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30081.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30081",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30082.json b/2021/30xxx/CVE-2021-30082.json
new file mode 100644
index 00000000000..131ab21b33f
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30082.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30082",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30083.json b/2021/30xxx/CVE-2021-30083.json
new file mode 100644
index 00000000000..75a46076b2c
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30083.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30083",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30084.json b/2021/30xxx/CVE-2021-30084.json
new file mode 100644
index 00000000000..f2407a191a3
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30084.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30084",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30085.json b/2021/30xxx/CVE-2021-30085.json
new file mode 100644
index 00000000000..11ccdd6da36
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30085.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30085",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30086.json b/2021/30xxx/CVE-2021-30086.json
new file mode 100644
index 00000000000..afdec31825f
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30086.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30086",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30087.json b/2021/30xxx/CVE-2021-30087.json
new file mode 100644
index 00000000000..5fd12a65ec6
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30087.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30087",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30088.json b/2021/30xxx/CVE-2021-30088.json
new file mode 100644
index 00000000000..99d717908c0
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30088.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30088",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30089.json b/2021/30xxx/CVE-2021-30089.json
new file mode 100644
index 00000000000..1628e4b0c8c
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30089.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30089",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30090.json b/2021/30xxx/CVE-2021-30090.json
new file mode 100644
index 00000000000..18023958c13
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30090.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30090",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30091.json b/2021/30xxx/CVE-2021-30091.json
new file mode 100644
index 00000000000..dd01f22b7fc
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30091.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30091",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30092.json b/2021/30xxx/CVE-2021-30092.json
new file mode 100644
index 00000000000..cad9c4ac6e2
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30092.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30092",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30093.json b/2021/30xxx/CVE-2021-30093.json
new file mode 100644
index 00000000000..9f764318505
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30093.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30093",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30094.json b/2021/30xxx/CVE-2021-30094.json
new file mode 100644
index 00000000000..924af3006cb
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30094.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30094",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30095.json b/2021/30xxx/CVE-2021-30095.json
new file mode 100644
index 00000000000..aa20904591d
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30095.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30095",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30096.json b/2021/30xxx/CVE-2021-30096.json
new file mode 100644
index 00000000000..c4214ea31bc
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30096.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30096",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30097.json b/2021/30xxx/CVE-2021-30097.json
new file mode 100644
index 00000000000..06ad9bc5e86
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30097.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30097",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30098.json b/2021/30xxx/CVE-2021-30098.json
new file mode 100644
index 00000000000..727962e09cc
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30098.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30098",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30099.json b/2021/30xxx/CVE-2021-30099.json
new file mode 100644
index 00000000000..4c6ed042bd7
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30099.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30099",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30100.json b/2021/30xxx/CVE-2021-30100.json
new file mode 100644
index 00000000000..29f4bc00f69
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30100.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30100",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30101.json b/2021/30xxx/CVE-2021-30101.json
new file mode 100644
index 00000000000..9624f816b1b
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30101.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30101",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30102.json b/2021/30xxx/CVE-2021-30102.json
new file mode 100644
index 00000000000..198a3a139b7
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30102.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30102",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30103.json b/2021/30xxx/CVE-2021-30103.json
new file mode 100644
index 00000000000..55fa4a8c13d
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30103.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30103",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30104.json b/2021/30xxx/CVE-2021-30104.json
new file mode 100644
index 00000000000..e2224dcc1b6
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30104.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30104",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30105.json b/2021/30xxx/CVE-2021-30105.json
new file mode 100644
index 00000000000..1075fe71fe7
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30105.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30105",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30106.json b/2021/30xxx/CVE-2021-30106.json
new file mode 100644
index 00000000000..368fd5eecdd
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30106.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30106",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 0631b5bda5c9dff6e229df0ad69ad418ef292f2e Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 08:00:54 +0000
Subject: [PATCH 842/845] "-Synchronized-Data."

---
 2021/30xxx/CVE-2021-30107.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30108.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30109.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30110.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30111.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30112.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30113.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30114.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30115.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30116.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30117.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30118.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30119.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30120.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30121.json | 18 ++++++++++++++++++
 2021/30xxx/CVE-2021-30122.json | 18 ++++++++++++++++++
 16 files changed, 288 insertions(+)
 create mode 100644 2021/30xxx/CVE-2021-30107.json
 create mode 100644 2021/30xxx/CVE-2021-30108.json
 create mode 100644 2021/30xxx/CVE-2021-30109.json
 create mode 100644 2021/30xxx/CVE-2021-30110.json
 create mode 100644 2021/30xxx/CVE-2021-30111.json
 create mode 100644 2021/30xxx/CVE-2021-30112.json
 create mode 100644 2021/30xxx/CVE-2021-30113.json
 create mode 100644 2021/30xxx/CVE-2021-30114.json
 create mode 100644 2021/30xxx/CVE-2021-30115.json
 create mode 100644 2021/30xxx/CVE-2021-30116.json
 create mode 100644 2021/30xxx/CVE-2021-30117.json
 create mode 100644 2021/30xxx/CVE-2021-30118.json
 create mode 100644 2021/30xxx/CVE-2021-30119.json
 create mode 100644 2021/30xxx/CVE-2021-30120.json
 create mode 100644 2021/30xxx/CVE-2021-30121.json
 create mode 100644 2021/30xxx/CVE-2021-30122.json

diff --git a/2021/30xxx/CVE-2021-30107.json b/2021/30xxx/CVE-2021-30107.json
new file mode 100644
index 00000000000..bb1308371d6
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30107.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30107",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30108.json b/2021/30xxx/CVE-2021-30108.json
new file mode 100644
index 00000000000..12761d30ff7
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30108.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30108",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30109.json b/2021/30xxx/CVE-2021-30109.json
new file mode 100644
index 00000000000..21c6e53b678
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30109.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30109",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30110.json b/2021/30xxx/CVE-2021-30110.json
new file mode 100644
index 00000000000..21c0e206313
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30110.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30110",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30111.json b/2021/30xxx/CVE-2021-30111.json
new file mode 100644
index 00000000000..a706bef997a
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30111.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30111",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30112.json b/2021/30xxx/CVE-2021-30112.json
new file mode 100644
index 00000000000..ee9980e99fd
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30112.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30112",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30113.json b/2021/30xxx/CVE-2021-30113.json
new file mode 100644
index 00000000000..a0655199c40
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30113.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30113",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30114.json b/2021/30xxx/CVE-2021-30114.json
new file mode 100644
index 00000000000..47a75a466ca
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30114.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30114",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30115.json b/2021/30xxx/CVE-2021-30115.json
new file mode 100644
index 00000000000..4d58850ee2b
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30115.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30115",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30116.json b/2021/30xxx/CVE-2021-30116.json
new file mode 100644
index 00000000000..6bc5a507737
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30116.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30116",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30117.json b/2021/30xxx/CVE-2021-30117.json
new file mode 100644
index 00000000000..f62224ba599
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30117.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30117",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30118.json b/2021/30xxx/CVE-2021-30118.json
new file mode 100644
index 00000000000..2c67e91016c
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30118.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30118",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30119.json b/2021/30xxx/CVE-2021-30119.json
new file mode 100644
index 00000000000..f4da5ffe652
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30119.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30119",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30120.json b/2021/30xxx/CVE-2021-30120.json
new file mode 100644
index 00000000000..3031f771467
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30120.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30120",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30121.json b/2021/30xxx/CVE-2021-30121.json
new file mode 100644
index 00000000000..8b35a19d467
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30121.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30121",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file
diff --git a/2021/30xxx/CVE-2021-30122.json b/2021/30xxx/CVE-2021-30122.json
new file mode 100644
index 00000000000..8e5e16e879a
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30122.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30122",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From f74a01df5cdb86e41bfc816851c8c9549bc2dcf2 Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 09:00:37 +0000
Subject: [PATCH 843/845] "-Synchronized-Data."

---
 2021/21xxx/CVE-2021-21295.json |  5 +++
 2021/30xxx/CVE-2021-30000.json | 61 ++++++++++++++++++++++++++++++----
 2021/30xxx/CVE-2021-30123.json | 18 ++++++++++
 3 files changed, 78 insertions(+), 6 deletions(-)
 create mode 100644 2021/30xxx/CVE-2021-30123.json

diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json
index 0937bacfb19..9b05e418a7a 100644
--- a/2021/21xxx/CVE-2021-21295.json
+++ b/2021/21xxx/CVE-2021-21295.json
@@ -283,6 +283,11 @@
                 "refsource": "MLIST",
                 "name": "[kafka-jira] 20210401 [jira] [Resolved] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
                 "url": "https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E",
+                "url": "https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E"
             }
         ]
     },
diff --git a/2021/30xxx/CVE-2021-30000.json b/2021/30xxx/CVE-2021-30000.json
index da63e1b0299..9df02a03296 100644
--- a/2021/30xxx/CVE-2021-30000.json
+++ b/2021/30xxx/CVE-2021-30000.json
@@ -1,17 +1,66 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
-        "ID": "CVE-2021-30000",
         "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "ID": "CVE-2021-30000",
+        "STATE": "PUBLIC"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "n/a",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_value": "n/a"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "n/a"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "An issue was discovered in LATRIX 0.6.0. SQL injection in the txtaccesscode parameter of inandout.php leads to information disclosure and code execution."
+            }
+        ]
+    },
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "n/a"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "url": "https://sourceforge.net/projects/latrix/",
+                "refsource": "MISC",
+                "name": "https://sourceforge.net/projects/latrix/"
+            },
+            {
+                "refsource": "MISC",
+                "name": "https://github.com/cptsticky/A-0day-Per-Day-Keeps-The-Cope-Away/blob/main/CVE-2021-30000",
+                "url": "https://github.com/cptsticky/A-0day-Per-Day-Keeps-The-Cope-Away/blob/main/CVE-2021-30000"
             }
         ]
     }
diff --git a/2021/30xxx/CVE-2021-30123.json b/2021/30xxx/CVE-2021-30123.json
new file mode 100644
index 00000000000..18e886f648f
--- /dev/null
+++ b/2021/30xxx/CVE-2021-30123.json
@@ -0,0 +1,18 @@
+{
+    "data_type": "CVE",
+    "data_format": "MITRE",
+    "data_version": "4.0",
+    "CVE_data_meta": {
+        "ID": "CVE-2021-30123",
+        "ASSIGNER": "cve@mitre.org",
+        "STATE": "RESERVED"
+    },
+    "description": {
+        "description_data": [
+            {
+                "lang": "eng",
+                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+            }
+        ]
+    }
+}
\ No newline at end of file

From 83ef50f5d16e7c0345fa19abc46bb6bc3f245ed2 Mon Sep 17 00:00:00 2001
From: "Mark J. Cox" 
Date: Fri, 2 Apr 2021 11:00:38 +0100
Subject: [PATCH 844/845] Add CXF CVE-2021-22696

---
 2021/22xxx/CVE-2021-22696.json | 78 +++++++++++++++++++++++++++++++---
 1 file changed, 71 insertions(+), 7 deletions(-)

diff --git a/2021/22xxx/CVE-2021-22696.json b/2021/22xxx/CVE-2021-22696.json
index c17e675991c..5ae209b0ee0 100644
--- a/2021/22xxx/CVE-2021-22696.json
+++ b/2021/22xxx/CVE-2021-22696.json
@@ -1,18 +1,82 @@
 {
-    "data_type": "CVE",
-    "data_format": "MITRE",
-    "data_version": "4.0",
     "CVE_data_meta": {
+        "ASSIGNER": "security@apache.org",
         "ID": "CVE-2021-22696",
-        "ASSIGNER": "cve@mitre.org",
-        "STATE": "RESERVED"
+        "STATE": "PUBLIC",
+        "TITLE": "OAuth 2 authorization service vulnerable to DDos attacks"
     },
+    "affects": {
+        "vendor": {
+            "vendor_data": [
+                {
+                    "product": {
+                        "product_data": [
+                            {
+                                "product_name": "Apache CXF",
+                                "version": {
+                                    "version_data": [
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "3.4.3"
+                                        },
+                                        {
+                                            "version_affected": "<",
+                                            "version_value": "3.3.10"
+                                        }
+                                    ]
+                                }
+                            }
+                        ]
+                    },
+                    "vendor_name": "Apache Software Foundation"
+                }
+            ]
+        }
+    },
+    "data_format": "MITRE",
+    "data_type": "CVE",
+    "data_version": "4.0",
     "description": {
         "description_data": [
             {
                 "lang": "eng",
-                "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+                "value": "CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a \"request\" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the \"request_uri\" parameter.\n\nCXF was not validating the \"request_uri\" parameter (apart from ensuring it uses \"https) and was making a REST request to the parameter in the request to retrieve a token.\n\nThis means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. \n\nThis issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10."
             }
         ]
+    },
+    "generator": {
+        "engine": "Vulnogram 0.0.9"
+    },
+    "impact": {},
+    "problemtype": {
+        "problemtype_data": [
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-918 Server-Side Request Forgery (SSRF)"
+                    }
+                ]
+            },
+            {
+                "description": [
+                    {
+                        "lang": "eng",
+                        "value": "CWE-400 Uncontrolled Resource Consumption"
+                    }
+                ]
+            }
+        ]
+    },
+    "references": {
+        "reference_data": [
+            {
+                "refsource": "CONFIRM",
+                "url": "https://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc"
+            }
+        ]
+    },
+    "source": {
+        "discovery": "UNKNOWN"
     }
-}
\ No newline at end of file
+}

From 8e68fe9abeddbcbfb7d4d5a75f21b2566278179b Mon Sep 17 00:00:00 2001
From: CVE Team 
Date: Fri, 2 Apr 2021 11:00:41 +0000
Subject: [PATCH 845/845] "-Synchronized-Data."

---
 2021/22xxx/CVE-2021-22696.json | 9 +++++----
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/2021/22xxx/CVE-2021-22696.json b/2021/22xxx/CVE-2021-22696.json
index 5ae209b0ee0..5c8aa73db54 100644
--- a/2021/22xxx/CVE-2021-22696.json
+++ b/2021/22xxx/CVE-2021-22696.json
@@ -40,7 +40,7 @@
         "description_data": [
             {
                 "lang": "eng",
-                "value": "CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a \"request\" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the \"request_uri\" parameter.\n\nCXF was not validating the \"request_uri\" parameter (apart from ensuring it uses \"https) and was making a REST request to the parameter in the request to retrieve a token.\n\nThis means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. \n\nThis issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10."
+                "value": "CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a \"request\" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the \"request_uri\" parameter. CXF was not validating the \"request_uri\" parameter (apart from ensuring it uses \"https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10."
             }
         ]
     },
@@ -71,12 +71,13 @@
     "references": {
         "reference_data": [
             {
-                "refsource": "CONFIRM",
-                "url": "https://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc"
+                "refsource": "MISC",
+                "url": "https://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc",
+                "name": "https://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc"
             }
         ]
     },
     "source": {
         "discovery": "UNKNOWN"
     }
-}
+}
\ No newline at end of file